Super toolkit: computer universal expert trial record

  
Many friends have used a variety of system optimization and enhancement tools, but to cover some commonly used functions, a tool software is difficult to achieve - but If you have a "computer universal expert comprehensive version", the situation is different.

"Computer Universal Expert Comprehensive Edition" is a set of tools that make Windows more stable, faster and better. It includes Trojan analysis experts, computer anti-deletion experts, IE anti-change experts, QQ chat experts. 15 components, computer locking experts, merger crushing experts, startup restoration experts, and more than 600 management programs. Since these 15 components are actually independent software, naturally every "master" can easily be alone in the system application!

We first download the latest version, after installation and operation, the 15 majors on the main interface are lined up, enough to prevail? However, due to the teacher's coming out, the 15 recruits' "movements" (how to use them) are similar. Let's take a look at the big futures with distinctive features to show them their skills!

Adding a "iron cloth" to the file


"Computer anti-deletion expert" uses the latest VXD technology combined with the Windows kernel handle to monitor the mode. Monitor new file creation, renaming, moving, copying, deleting, etc., and generate a file operation monitoring record. We can set various protection schemes such as anti-delete, anti-copy, anti-new, anti-rename and other protection according to the record. Shut down or lock the computer) to protect our files from "outside winds and rains."

Click the "Computer Anti-Delete Expert" button in the main interface of the program. If we want to disable file deletion for all files on the hard disk, we can select "Record current operation and undo the original operation" in the "Delete" tab, and then click the "Modify" button. If we are going to take a more rigorous response to the offender, we can choose to "lock the computer, delete the password correctly" or "record the current operation, revoke the original operation, and finally lock the computer."

Click the "Advanced Settings 3" button on the right side of the "Computer Anti-Delete Expert" interface, you can also prohibit others from using Network Neighborhood, Control Panel, etc.; in the "Features" tab, we can disable " Recycle Bin attribute, MS-DOS mode and ACDSee browser; click the "Advanced Anti-Delete" button in the "Password" tab, you can also select the specified file for protection in the open window (that is, the file will not be Copy, rename, move or delete), now your files are safe enough?

To maintain your QQ comprehensively


"QQ Password Anti-theft Expert" is a comprehensive QQ anti-theft, anti-interference and optimization tool. We only need to select the check box in front of the corresponding option in the "Main Form" tab, or press the "Empty" button to set the QQ change title, close some of the ad windows in QQ, and even block the ads in the page. Window (check the box in front of "Automatically close the ad window popped up by IE browser").

In the "Personalization" tab, we enter your own QQ number after "Enter the QQ number to be discovered", and then select "Change this QQ window" under "Discover the processing after QQ title" "Headline", then enter the content you want, such as "My QQ", so when you use QQ in Internet cafes, others can not know your QQ number from the QQ title. Of course, choosing "Turn off this QQ program" can prevent others from using your QQ on this machine.

In the "Anti-theft Patch" tab, we can take preventive security measures against QQ, such as "block QQ from sending and receiving messages", so even if your QQ number is stolen, the hacker still can't Use your QQ on this unit. Of course, check all the options in "Kernel Modification" and click the "Save" button to make your QQ more secure.

The tool also provides "automatic chat", "friend search", "QQ virus killing", "invincible mode", "chat record" and other five plug-ins, so that users' QQ function is more powerful .

click interface such as our "invincible mode" tab below to select the check box "Use password protection QQ invincible mode", and then enter the QQ password and click "login QQ invincible" Just enter the QQ number and password in the QQ anti-theft plug-in to log in. Since the QQ login process is completely in memory, no matter what QQ hacking software can not steal your QQ password!





slap malicious pages


"IE experts universal tamper-resistant" can be a malicious web page " Buster." In "IE General", we can restore the title bar and IE homepage modified by malicious web pages. Of course, we can also prevent malicious web pages from illegally modifying the homepage in the future by "prohibiting the use of change homepage settings in IE". If you feel that it is more troublesome to click these icons one by one, you can also click the "IE full settings" icon to set the IE properties and menus at once, which is very convenient!

Home users can also try the "management program", which allows users to monitor and prohibit users from deleting any files and directories in real time, prohibiting users from using the "dial-up connection" to access the Internet, using IE to download software, is a great Network security management tool.

Adding locks to your own secrets


"Computer Universal Locking Expert" provides two functions of file locking and directory locking, using these two functions. We can almost hide all the content on the computer's hard drive that we want to keep secret.

Click the "Computer Lock Expert" button, first in the "Computer Universal Lock Expert 9.4" interface, click the "OK" button after the "Administrator Enter Password", and then enter Click the "File Lock" button in the interface, select the "File Lock" command to open the main interface. First click on the "Function Settings" tab, we can here define whether to encrypt the executable file and lock a certain type of file, such as a registry file (REG), text file (TXT), etc., and then click " Modify the button.

Switch to the open "File Lock" window and click the "Add" button, select a locked executable program, it will appear under the "List of programs to be locked", select The checkbox in front of it, and then check the box in front of "Do not lock the interface, let other users do not know what is the cause", your file is more secure.

Of course, we can first create a private folder on the hard disk, and then use the tool to its catalog plus pin lock, so that you can prevent others from unauthorized access and use of your personal files.

has a private folder /drive


If you are using a public computer, you may wish to set up private folders and drives himself. Click the “Folder Lock” button on the “Computer Universal Expert Comprehensive” main interface, click the “Private Folder” button in the “Private Folder (Personal Version) V4.0” main interface, and enter the user name in turn. , password and folder location, then click the "Modify" button. Of course, you can also make more settings for private folders by clicking the [Create/Modify/Delete More Private Folders] button in the lower left corner of the interface.

"Private Drive" can separate the remaining space in a partition from the partition and virtualize it into another drive letter for the user to use alone. In the "Private Folder (Personal Edition) V4.0" main interface, click the "Private Drive" button, in the "Select Private Drive Space Source", select a partition with a large remaining space, and then set the access password. Click "Test Effect" to test if the lock is successful. Once setup is complete, click "Save Settings" to take effect. Later, right-click in the explorer, select "Private Drive", and enter the correct "Private Drive Space Source" and password, you can use the space that belongs to you alone!





easily back up important data


system backup is a tedious but must often work . With the advanced backup feature in the "Power On Restore Expert", we can easily back up IE favorites, hard drive boot area, desktop icons and system registry.

to back up the boot sector as an example: Click "Backup boot sector" button, then click the "Backup" button in the boot sector backup interface will define the path for the backup file: A: \\ PCBOOT.IMG. Then put a floppy disk into the floppy disk drive and press the "OK" button. After a while, your hard drive partition information will be backed up to a floppy disk.

system optimization rounder


"universal computer expert integrated version" provided "expert system optimization", although other well-known optimized master system than Windows in function optimization The software is weaker, but it contains most of the features we use, and it provides some unique settings (please explore it yourself), which is enough for ordinary users. For example, we click "System Optimization 3" to perform security scans on the system, optimize the optical drive, and clear the history of commonly used software.

Overall, the "universal computer expert integrated version of" collection features a variety of software tools in one, with a software like have a lot of utility. Due to space limitations, this article only briefly introduces a few tools with more distinctive features. More functions are expected to be explored by readers (the help files are very detailed, you may wish to learn before using these tools).

However, the software also has a deficiency at: it at run time-consuming system resources, therefore, we recommended that we use the time it, try not to run other software require more system resources.

Copyright © Windows knowledge All Rights Reserved