U disk is the most conveuient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation...U disk is the most conveuient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.展开更多
A new preventive software rejuvenation policy is proposed in this paper. This technique is implemented when additive consumption of physical memory has reached some level. Using the theory of cumulative damage process...A new preventive software rejuvenation policy is proposed in this paper. This technique is implemented when additive consumption of physical memory has reached some level. Using the theory of cumulative damage process, two models are given for two kinds of bugs. For the first model, aging-related bug is considered only and consumption of physical memory could be known by tests made at periodic times, optimal preventive rejuvenation policy is analytically derived and numerical example is given. As an extended preventive software rejuvenation policy, Heisenbug and aging-related bug are considered meanwhile in the second model.展开更多
文摘U disk is the most conveuient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.
基金This project is supported by National Natural Science Foundation of China (70471017, 70801036) Humanities and Social Science Research Foundation of China(05JA630027)
文摘A new preventive software rejuvenation policy is proposed in this paper. This technique is implemented when additive consumption of physical memory has reached some level. Using the theory of cumulative damage process, two models are given for two kinds of bugs. For the first model, aging-related bug is considered only and consumption of physical memory could be known by tests made at periodic times, optimal preventive rejuvenation policy is analytically derived and numerical example is given. As an extended preventive software rejuvenation policy, Heisenbug and aging-related bug are considered meanwhile in the second model.