No need exists - User summary of the five major useless features in Windows 7

  

Because Vista is unfavorable, Microsoft put all its energy on the development of Windows 7. Microsoft is also trying to use Windows 7 to play a beautiful turnaround, sweeping away the negative impact of Vista on Microsoft. In order to achieve this effect, Microsoft must eliminate some of the less useful but annoying features included in previous versions of Windows.

1.Windows Genuine Advantage Notifications (Windows Genuine Advantage)

Windows Genuine Advantage (also known as Microsoft Genuine Verification Program) in Vista is intended to determine whether the Windows system installed on your computer is It is genuine and reminds you to take action, that is, to resist piracy. If WGA detects that the system you are using is not a genuine system, it will take a series of actions on your system. In the early versions of WGA, it would directly deprive you of the right to access the system, which is somewhat sensational, isn't it? Now, WGA is no longer "severe". If the target user's computer is loaded with pirated Windows, then every time you start the user, you will be the victim of pirated software, and you can choose to do it later after 5 seconds. Although the window can be canceled by setting, but the verification icon on the tray after booting is not canceled, the verification icon will always exist unless the user purchases a genuine Windows key. Despite this, the real master knows how to avoid the harassment of WGA, so fundamentally, it has no purpose of existence. In general, WGA is a very impractical feature, and Microsoft should eliminate this annoying feature in Windows 7.

2. Registry

The Windows Registry is a central hierarchical database used in Microsoft Windows 9x, Windows CE, Windows NT, Windows 2000, Windows XP, and Windows Vista for storage. Information necessary to configure a system for one or more users, applications, and hardware devices. The registry contains information that Windows continuously references during runtime, for example, each user's profile, the applications installed on the computer, and the property sheet settings for the document types, folders, and application icons that each application can create, the system Which hardware is present and which ports are being used. The registry is a set of files that control the appearance of the operating system and how it responds to incoming events. These "events" range from direct access to a hardware device to how the interface responds to specific users to how the application works.

When a user is ready to run an application, the registry provides application information to the operating system so that the application can be found, the location of the correct data file is specified, and other settings can be used. The registration table holds location information about the default and auxiliary files, menus, button bars, window status, and other options. It also saves installation information (such as date), the user who installed the software, the software version number and date, serial number, and so on. It includes different information depending on the software installed.

So, the registry is a huge data repository, which stores the various information needed by the operating system and applications to run. Without it, the entire system will be in a state of paralysis. When you use an application to modify the behavior of Windows, it actually modifies the registry at the bottom. However, if you want to make a lot of changes to the system, then you have to edit the registry directly, which is a very cumbersome and highly dangerous thing. Because, with a little carelessness, you will make mistakes, and a small mistake in the registry may cause the entire system to collapse. Other operating systems, such as Apple's Mac OS X and open source Linux, do not have the concept of a registry, and they still perform very well. Microsoft should also consider giving up the use of the registry because it brings too much disaster to the Windows system.

3. ActiveX Controls

ActiveX is a technology that allows Web authors to embed small programs into Web pages or other interfaces to provide additional functionality. These embedded programs are called ActiveX Controls. Developers can create ActiveX controls using any programming language that supports the Microsoft Common Object Model. On the Internet, the features of the ActiveX plug-in software are: the general software requires the user to download and then perform the installation separately, while the ActiveX plug-in is when the user browses to a specific web page, the IE browser can automatically download and prompt the user to install. A prerequisite for the installation of the ActiveX plugin is that it must be approved and confirmed by the user.

Although ActiveX controls are powerful, they do not support other browsers. Moreover, it is very insecure and easy to be exploited by hackers as a very effective means of attacking the system. There are countless examples of using ActiveX controls for virus propagation. Although ActiveX controls are popular, they will never be long-term. Due to the rise of AJAX and Web 2.0 technologies, many websites are created using these two methods, so it is obvious that even without ActiveX, very complex applications can be provided through the browser. Due to external pressure, Microsoft should stop using this technology.

4. User Account Control

User Account Control (UAC: User Account Control) is a new technology introduced by Microsoft in Windows Vista to improve system security. All users run programs and tasks in standard account mode, prevent unauthenticated program installations, and prevent standard users from making inappropriate system settings changes. At the beginning, this feature was once called User Account Protection and was later renamed to the current User Account Control.

UAC is mainly used to solve the problem of users logging in as an administrator. Because some system functions or programs need to be operated as administrators, many users (including IT experts) usually log in to the system as administrators, which brings quite a lot of problems to system security. Microsoft has also tried to solve this problem in previous operating systems. Now UAC allows users to log in as an administrator, but most of the operations are performed with normal user privileges. When the user tries to perform some operations that require higher privileges, the system Will enhance the user's operating permissions.

Although user account control provides security to the system, the cost of this security is too high, and you need to tirelessly endure it over and over again - no meaning pop-ups and Absurd interruption. This is extremely inconvenient for users, and Microsoft should consider blocking this feature in Windows 7.

5. Windows Meeting Center

Windows Conference Center is a new feature in Windows Vista, and many users have not even heard of it. Even if you know that such a feature exists, you may never have used it. The Windows Conference Center can be understood as an online virtual meeting room. Through the program, we can create a password-protected virtual space on the Internet, accepting access from friends or colleagues. In this virtual space, you can share applications, share files, and modify files.

But the Windows Conference Center does not have a whiteboard. The chat mode is worthless and does not support VoIP. Who will use this conference center? Windows 7 should not have this feature that is not very useful.

Copyright © Windows knowledge All Rights Reserved