-
Start by opening the audit policy by:
In Control Panel - Management Tools - Local Security Settings - Local Policies - Audit Policies, turn on the policy of "Audit Object Access", and select the following "Success" item.
The second thing to do is to convert the partition where your files are located to NTFS, if it is fat32, run the command:
Convert X: fs:ntfs X indicates the disk where your file is located, please change it according to the actual situation.
Then, right-click on the partition, select Share & Security, then open the security item, (if there is no security option, please cancel the "Use Simple Sharing" option under the folder option), then click Advanced, select "Audit" to add, add everyone users to the list, and check the actions you want to review, here you only need to check "List folders to read data", and "Traverse folders to list files". The rest is not necessary, because auditing is inherently resource-intensive, and if you check them all, the logs will be large and the computer will run slower.
This will allow you to view the logs in the Security section of the Event Viewer.
Go to the inquiry, recommend the latter, convenient, detailed.
Look at the logs and you'll soon be a system expert.
Some third-party tools can do it, but some have already been proposed, and the principle is similar. Not much more.
-
Start with my recent documentation.
-
Right-click on the file to view the properties.
Creation time. Modify time.
Access time. The time viewer can't see it.
-
Use Optimizer to scan the history.
Because the scan is more comprehensive.
So if you look carefully in the scans, you'll be able to find it.
People who have seen it probably won't clear the history like that, so that's for sure.
-
Computer Supervisor.
I've used this software before, and it can record any step from your boot to shutdown, just a little bit of the author's hard work, hehe).
This is a very useful personal computer monitoring software, it includes screen monitoring, window monitoring, process monitoring, keyboard monitoring, disk monitoring, access to web page monitoring, sending monitoring records by email, hiding disks, disguised folders, disabling the registry, control panel, time proofreading, automatic shutdown and other functions, so that you can know the use of the computer without being in front of the computer. The monitoring operation is carried out completely in the background, and the monitored person cannot detect it, so please do not use this program for illegal purposes.
Monitoring function: Screen monitoring: Automatically record the screen, you can set the recording interval, automatic playback, and reproduce various operations of the computer realistically.
Window Monitoring: Records the time and window titles of all windows in the system when they were opened and closed.
Keyboard Monitoring: Records the key actions of any key on the keyboard and associates it with the corresponding window.
Disk Monitoring: Records information such as the creation, deletion, naming, relocation, addition, and modification of file associations and folders.
Control features: Disable the use of control panel, registry, task manager, etc.
It is forbidden to modify the taskbar, start menu, use of USB flash drive, modify the system date and time, etc.
Hide the desktop system icon and hide the disk partition.
Disguise a normal folder as a system folder to protect personal private information.
Time calibration, read the standard time of the world atomic clock, calibrate the date and time of the machine.
Automatic shutdown, you can set the time of computer use, and automatically turn off the computer at that time to limit the excessive use of children.
Hungry, if you really need it, use it, I hope it can help you
-
If you don't use third-party software, you can only get the last access time, but not your requirements...
The system log of file access is not logged. So, what you have heard is nonsense.
-
In the event viewer, you can know if the machine has been turned on.
As for whether your documents have been read or not.
If so, you can check when the file was viewed by checking the creation time of the shortcut.
Of course, if the other party also knows this method, and deletes the shortcut after reading it, even if he sees it, you can't find the corresponding shortcut. You can check if there is a shortcut for deletion through some anti-deletion software, but if it uses a file shredder to delete the shortcut generated by the system, this will be disabled again.
-
The problem with your operating system,Service Control Manager is due to the registration garbage left by the incomplete uninstall file last time,The system starts digging and shouting is caused by the file cannot be found when the service is started according to the registry information,You can judge Naye to **A registry doctor or the like (roguecleaner can also) software to remove the garbage of the registry,But before use, you must copy the registry by copying the registry。
Or run regedit to enter the registry and open hkey local machine system controlset001 services in turn
Find the subdirectory 00 c14722093 and delete it.
If it still doesn't work, it is recommended to reinstall the system.
-
Nokia C6, Nokia C6-00, Nokia C6-01 comparison, (from different aspects such as functions and **).
Compare Nokia 5230, Nokia 5238, Nokia 5800xm, and finally compare the six models in **, functions, configuration, operating system platform, performance and other aspects, recommend which model I should buy.
-
I don't understand so much, can't you go to ** to inquire ?? If you have money, buy 5800 or c6-01, if you don't have money, buy 5230 or c6, if you have money, you don't have a lot, just buy the middle.
-
The C6 is the same as the C6-00 licensed, just a side slider with a keyboard. C6-01 is full touch, CPU strong point, higher pixels, ** a little more expensive, 5230 is parallel imports, 5238 is licensed goods distinction, 5800XM is higher pixels, ** is also more expensive,.
I personally chose C6-01
-
It's so troublesome to buy a mobile phone, who has nothing to do will get a lot of mobile phones to study and evaluate carefully, if you want to compare them, you have to find a **search, one by one. By the way, show contempt for you.
-
I suggest you reinstall the system! A system with XP SP2!
Slow installation or ghost will do! It is recommended to use the Rainforest Wood Wind installation version and antivirus software with nod32.。。。
Hope your problem is solved soon!
-
Use Windows Optimizer to scan the startup items of the boot task, sometimes it will affect the startup of the boot task.
If it still doesn't work, use him to automatically optimize it, it may be that there is a conflict in the settings.
I've encountered it before, and a dialog box pops up saying it's not responding, but now I forgot it, it seems like it's just how it works.
-
You use the original version of the system, right? Just change to ghost
Because the original one needs to detect the hard disk before it can be shut down, it may be that your hardware is not very compatible
-
Brothers·· Your memory of who gave you the deputy...
That man is too arrogant, isn't it? Even the machine is the Core Q6600 (quad core) I don't dare to use 800 memory...
You actually plugged in two... Oh my God... That's what servers usually use·· In fact, like this problem, I sometimes think that it is best for you to directly find the person who sold your computer to solve it for you·· I don't even know if it's a memory problem... But it's a bit of an occasional thing to say: 8 and a half of Kingston's 10 memory are fake, don't believe you can go online SOU...
-
Your hardware is OK, try reinstalling the system.
-
Turn off everything that should be turned off in the startup item.
-
1 One incense stick at both ends, and one incense stick at one end; When the incense at both ends is burned, it is half an hour, and then the second end of another incense stick is lit; The time from burning the first incense stick to the second incense stick is 15 minutes.
There are 14 possibilities above, and the products are 11, 20, 27, 32, 35, 36, 36, 48, 56, 60, 42, 72, 75, and 80
The subordinate already knows the age of the manager, but still cannot determine the age of the manager's three daughters, indicating that the age of the three daughters is still not determined according to the age of the manager, and it can only be that the age of the manager is 36 years old, = 1 + 6 + 6 = 2 + 2 + 9
Only one daughter has black hair, so the three daughters are 2, 2, 9 years old.
4.This algorithm is wrong, three out of 27, of which 2 go to the small worker and 25 to the boss.
5 Tear off the logo of each pair of socks and one for each person.
6 The distance between the two places (the speed of the train) The total time Time The speed of the bird The distance the bird flies.
7 One jar holds one red ball, and the other jar holds 49 red balls and 50 blue balls, with a probability of nearly 75%.
That's the maximum probability achievable.
In fact, as long as 50 red balls are < in one jar, no basketball is placed, and the rest of the balls are placed in the other jar, the probability of taking out the red balls is greater than 50%.
8 1 4 jars take 1, 2, 3, 4 pills respectively.
9 4 pcs. 10 The axis of mirror symmetry is the central axis of man.
11 For the mirror is parallel to the body, and it would be fine if the mirror were to be redirected. In fact, it is the problem of symmetry.
12 And there were three men who wore black hats. Suppose n people wear black, when n = 1, the person wearing black will be willing to see that everyone else is white.
Condemn yourself to black. So the first time you turn off the lights, there should be a sound. N>1 can be determined.
For every person who wears black, he can see n-1 black hat and assume that he is white. But after waiting for n-1 times and no one has beaten him, everyone who wears black will know that he is also black. So the nth time the lights are turned off, n people beat themselves.
13 The circumference of the minor circle is 1 2 of the great circle, so it turns twice.
14:20 all bought soda, 20
There are 20 bottles in hand, change, 10 water, 10 bottles.
Change, 5 water, 5 bottles.
2 water, 3 bottles.
1 water, 2 bottles.
1 water, 1 bottle.
A total of 39 bottles were drunk.
-
You also have too many questions.
-
It's up to you to decide, do you like your girlfriend back home, can you forget those memories?
-
It's not good to pedal two boats, it's going to sink, accompany your girlfriend, a long-distance relationship is not something that can be done in a moment.
-
It doesn't matter where you go with your chastity lock!
-
If you are stressed, you can sweat when you are stressed! Take another shower! If not, think about where you're going in life!
-
Are you stressed...?
-
But it's 3v0 relative to the crest, because the crest travels along the surface of the water at a v0 speed. The particle is not migrating with the wave, but the crest is migrating.
-
Assuming the boat is not moving, the time for two adjacent crests to pass is t
Now the boat also moves
It's the same as moving in opposite directions.
Turns out s v=t
Now s (v+2v) = t 3
Particles are not migrated.
But with the energy propagated by the broadcast, it is the speed at which the energy travels.
-
The relative speed should be 3V??
-
The particle does not migrate with the wave, but the energy and waveform will move, and the crest of the wave is 3v0 relative to the ship
-
The reason for this is because the IE on your desktop is a shortcut to the address, not the original program of IE, the solution is: you click start, and then use the search function to find a file in your computer, find it and copy it to your desktop, and then use this file to open the web page later, and the icon that was commonly used before can be deleted.
-
1 That's due to the properties of the link you clicked on, either in a new window or in the current window (overwritten). You can right-click on a link and select "Open in new window", or hold down the shift and left-click again, so that links with only mandatory properties (rarely) will open in a new window.
2. You right-click on the taskbar, select "Properties", and then select the "Group Similar Taskbar button" in the west box of the dialogue"Click OK!
3Do you use some software to repair the browser and see how it works?
-
You don't need to point to the desktop IE browser, you can directly connect to any of the current IE, hold down shift and then click the left mouse button on the connection point, and a new connection will come out.
-
Tool --- Internet Options--- Advanced - Restore Advanced Settings Restart IE.
-
There's something wrong with your IE. Just reload your IE. If you want to fix it with no IE.
I recommend you to go to the next Firefox, this one is very easy to use.
-
There must be something wrong with your system. Let's recover.
-
Right-click - Opens in a new window
-
The browser has been hijacked, and the next 360 security guard will fix it
-
The main rhetorical devices are: metaphor, personification, comparison, duality, exaggeration, rhetorical question, questioning, and repetition.
1 Parable:
Eight characters: Ding Mao Ji You Ding Hai Yi Si Universiade: Wu Shen Ding Wei Bingwu Yi Si Jia Chen 癸卯 壬寅 Xin Chou 9 19 29 39 49 59 69 79 >>>More
Chi You, the emperor's inner diameter is rejuvenated, it is brushed out by antique dealers, kiwi fruit can be obtained when running the bb ring, the time of the brush is random, it is best to learn antique appreciation, the higher you learn, the cheaper you buy, it is said that it is possible to kill the star and get Chi You. >>>More
Speakers Fender 15R or Laney LX20C **are both around 500. >>>More
I also play AK, and I personally prefer AK47-A. Maybe it's a bullish match**, either AK47-A or M4A1-camouflage. If you use it more, it feels good, and it feels better than the others, you can try it. >>>More
Since you choose 240, you can upgrade the memory of DDR3 by the way, DDR3 2G is almost 190 yuan. >>>More