-
Some programs run in the background...
You've seen it.!
It can be set under the start of the Run input mcsonfig startup.
Turn off programs that don't need to.!...
-
36 is not much, I turned on 39 as soon as I turned on the system, all of them are systematic, your 36 should also be the system, don't turn it off, if you want to improve efficiency, it's good to install an optimization master.
-
I don't see any problematic processes, these are the normal processes you are running now, if there are more. Generally, the boot process XP20-30, Vista, Win730-40; Every time a program is opened in operation, a process is generated, and the program is exited, and the process is also exited. Running processes will occupy CPU and memory, and too many processes will cause the computer to run slowly and even crash.
Here's how to do it: 1. Reduce the automatic operation items, and only keep two startup items at startup.
1) Start-Run-msconfig-Start-Reserve" ctfmon (provides language recognition......and other user input technology spine)" and "anti-virus program" (or 360-hour real-time monitoring), and all others are deleted. If you want to turn on your computer and automatically surf the Internet, keep your broadband connection. Deleting it is not uninstalling, but not letting it run automatically when it is turned on, and when it needs to run, it is just opened manually.
2) Cancel the automatic operation of the boot with the help of software. From the online **360 Security Guard, open 360 - Functions - Boot Acceleration - Startup Items - In the "Set Boot Mode", set the one that does not need to be started to "Prohibit Start".
2. Disable redundant service components.
Right-click "My Computer (Computer)" --Management" --Services and Applications "--Services", in the right pane, set the unwanted services to disabled, and set the services that are not commonly used by infiltration to manual, there are "Top 10 services that must be prohibited and services that can be banned" post on the Internet, which can be viewed.
3. Close apps you don't use at any time.
4. If you suspect the invasion of Trojan viruses, open the "Task Manager" in 360 Security Guard-My Gadget, and the 360 Task Manager window will display the running program in the form of a list: software name, resource, CPU, memory, network speed, read and write, cloud detection, management, etc. You can see which process is incorrect or redundant, and you can end it by "Manage".
If a Trojan virus is found in the process, it is necessary to end its operation in the process and remove it with a full check and kill by the Trojan virus software.
a.Create a new process.
b.Terminate the process of opening the skin into a finished celery. >>>More
I use a broken palm.
Groping for this vast land: >>>More
Low menstrual flow is caused by the deficiency of qi and blood. The key to solving the problem is blood replenishment. In addition to using traditional Chinese medicine to recuperate, it can also be used as a food supplement. >>>More
Fighting horses all his life, he was in the midst of war, constantly wrestling between the positive and the negative. Once invincible, it has also quietly fallen. In the future, he made a comeback and finally chose his own path. But what has not changed is. Hatred never fades with time.
1.This person sighed for what he had said and heard. Another way to break the sentence is: This person is a person who speaks one by one, and sighs when he hears it. >>>More