How to make the record of the running software disappear under the win7 system

  
First, clean up the traces in the running box. In order to prevent others from sneaking into their own "running" privacy, you should best sort out the application traces in the running box in the following way;
1) First click on the "ghost win7 system" in the system - start - - Run ”, enter "ldedit" in the Run dialog box, press Enter to open the Registry Editor;
2) and then expand to locate the HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionEXPlorerRunMRU branch;
3) in the right sub-window corresponding to the RunMRU branch , select each record in turn, and perform “modify”“delete” instructions, delete them all, and finally restart the computer, you will find that the running traces have been cleared.
Second, each time you use the network ant to download programs or information, the system will actively retain the download address of the corresponding information in the download list of the program, illegal users can quietly your important files or programs based on these addresses. According to yourself, then bring you a security loss. In order to prevent the onset of this phenomenon, you must firmly establish a security awareness. After downloading important information, you must promptly sort out the address traces in the network ants. The specific method is as follows:
1) First open the network ant download In the list interface, select the more important address records in the list box, and then click the “Modify” menu item to delete the "deletion" instruction, so that the corresponding address record is deleted;
2) Similarly, select other important address records in turn, and perform the delete command, and clear them one by one from the list box.
Three, sorting the traces in the search box, each time using the "Find" dialog box to find important information, the recent policy keywords will be actively recalled by the "Find" dialog box, others When you use the "Find" dialog box, you can easily know how many times you look for privacy in recent times. In order to ensure the security of privacy, you should sort out the privacy records in the "Find" box.
Fourth, organize the traces in Office, use any of the programs in Office to modify or visit the document, will be in the corresponding program under the "Files" menu items, leave the recent browsing traces, click on these visits Traces, others can peek into your private information. For this reason, it is necessary for you to remove these traces in time.
Five, organize the traces in the clipboard. If the cut or imitation operation is performed, the system will “snap” a small amount of space to temporarily “reserve” the content that was cut or copied at the time, in some applications, the clipboard, and even You can actively save dozens of cuts and imitations. In order to prevent the leakage of private information, you must remember to delete the important contents of the clipboard in time.

Copyright © Windows knowledge All Rights Reserved