good
Friday, July 31, 2009
best music players
iTunes is a digital media player application from Apple Computer in January 10, 2001's Macworld Expo in San Francisco to launch for the players and the management of digital music and video files. Is a program the same interface, the management of Apple Computer's popular iPod digital media player content. In addition, iTunes can connect to the iTunes Store (if an Internet connection set up) in order to download purchased digital music, music video, TV shows, iPod games, Podcast, as well as a variety of standard-length films.
It was by Jeff Robbin and Bill Kincaid development, as an MP3 player called the SoundJam MP, and by Casady & Greene in 1999. In 2000 the purchase of Apple Computer, to give a new user interface and ability to burn CD, has a record of its functions, and remove the panel support, and made to do iTunes. At first, only Mac OS 9 applications, with the version 2 release after nine months of Mac OS X support to be added, with version 3 of the issue of Mac OS 9 support was stopped. In October 2003, with iTunes 4.1 with the issue, Apple joined on Windows 2000 and Windows XP support. However, since Microsoft's latest operating system Windows Vista issue, the Apple claims that there are several known compatibility issues with the iTunes software. Apple Computer will soon be issued a new version to fix the problem.
iTunes from Apple's Web site to obtain free downloads, but also with all of the Macintosh computer with a number of iPod and attached to the Mac OS X. It also provides, as Apple's iLife suite of multimedia applications as part of the program.
2. rhapsody player
you can buy music easily,or you can freely listen them online
3. realplayer
well known
vista doom3, quake 4
1.3.1 patch that table:
- Improved Vista compatibility
- Amendments to the physical characteristics of a potential collapse
- Additional amendments to immediately download the pak files but did not restart the system
- DNS search amended to reduce the waiting time
- Mac OSX to generic code and GNU / Linux x86 code update for gcc 4.0 standard composite
- Mac and Linux thread implementation more in line with the way Win32
- Amendments to Alsa (Advanced Linux sound architecture project) back-end audio
- Amendments to tty code under Linux!
daemon tools of vista
Right-click the shortcut icon, or the running process, then select
Attributes (R) -> Compatibility -> privilege level
Please select Run as Administrator of the program
After it.
However, new problems have emerged:
The application is corruputed
I guess is due to fight the causes of the crack.
So, now to re-install, and then try not to fight crack.
Seems to direct the installation, simply can not run, because there are problems prompted the dll.
Later, it will not do, or install this version:
daemon410-x86.pcpop
Finally ready for use.
By the way, Vista, the whole, a lot of things to do before the XP is not as good as it
For example, the default file selection window to open procedure, if you do not click on browse, the other, under XP before the procedure can be seen in Vista is not displayed below, unless you click to browse, simply choose one to appear.
virtualbox usb for linux
VirtualBox manual query to find another to replace the Law: The virtual USB device into a virtual hard drive, as if, VirtualBox can, through the virtual hard disk to start the!
VirtualBox manual: VirtualBox main interface / Help / Contents, or directly by the VirtualBox open F1.
About this article more relevant details please see the VirtualBox manual: Sun VirtualBox ® / Advanced topics/9.10. Using a raw host hard disk from a guest, which is described in detail a variety of different "host / virtual" system solution portfolio environment.
A first for some combination of my own environment:
Host system: fedora 10.
Virtual System: Ubuntu USB.
VirtualBox: v2.2.2
USB device: / dev / sdb
marco.chan: the account number belonging to vboxusers group of / dev / sdb useful r + w permissions.
Virtual Hard Disk path: ~ / .VirtualBox / HardDisks /
Second, again for a few things to note:
1, virtualbox your account to be able to read and write USB device, or can not add the virtualbox virtual hard disk.
2, to identify your USB device is which? Use df or fdisk can see that.
First, view the USB devices
Citations citations
[marco.chan @ fedora ~] $ sudo fdisk-l
Omitted from the above ...
Disk / dev / sdb: 1000 MB, 1000341504 bytes
255 heads, 63 sectors / track, 121 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x0004e319
Omitted the following ...
Second, view the USB device properties, as well as add to the current account rw permissions.
Citations citations
[marco.chan @ fedora ~] $ ls-l / dev / sdb # See / dev / sdb property
brw-rw ---- 1 root disk 8, 16 2009-05-13 14:34 / dev / sdb
Citations citations
[marco.chan @ fedora ~] $ sudo chmod o + rw / dev / sdb # to add this account marco.chan attributes rw
Third, for USB devices create a virtual hard disk image.
Citations citations
[marco.chan @ fedora ~] $ VBoxManage internalcommands createrawvmdk-filename ~ / .VirtualBox / HardDisks / linuxhobbyUsb.vmdk-rawdisk / dev / sdb-register
VirtualBox Command Line Management Interface Version 2.2.2
(C) 2005-2009 Sun Microsystems, Inc.
All rights reserved.
RAW host disk access VMDK file / home / marco.chan / .VirtualBox / HardDisks / linuxhobbyUsb.vmdk created successfully.
See the above message that the virtual hard disk image file has been built! This is the image file just to connect, simple to understand, is a ln-s file, and will not "~ / .VirtualBox / HardDisks /" under the actual data, so a manual "which will not contain any actual data, as this will all be stored on the physical dis. "
~ / .VirtualBox / HardDisks / linuxhobbyUsb.vmdk: the preservation of the virtual hard disk image path, based on the actual situation of their own change, but the parent directory *. vmdk must be able to read and write.
/ dev / sdb: This is your USB devices, according to the actual circumstances of the case.
To determine whether, as the above tips, as has been established.
Citations citations
[marco.chan @ fedora ~] $ ls-l .VirtualBox / HardDisks /
total 5170244
-rw ------- 1 marco.chan marco.chan 1171292672 2009-04-14 21:15 CentOS5.vdi
-rwxrwxrwx 1 marco.chan marco.chan 994091520 2009-03-23 12:42 disk_windows.vdi
-rw ------- 1 marco.chan marco.chan 3123741184 2009-05-13 14:29 Fedora10.vdi
-rw ------- 1 marco.chan marco.chan 532 2009-05-13 14:56 linuxhobbyUsb.vmdk # is the East, only the size of 532 bytes.
Fourth, the increase in a system in VirtualBox.
In the establishment of a virtual hard drive when, select the existing virtual hard disk, that is just created linuxhobbyUsb.vmdk, the following chart:
Fifth, the test results ...
Ubuntu can see the normal boot from USB.
Note:
Plug USB devices every time after, / dev / sdx attributes will be restored, so it is necessary each time sudo chmod o + rw / dev / sdx (x in accordance with the actual environment), the other one-time solution may be as follows: the current user is added to the disk group, but will increase the risk of specific practices, that in accordance with the actual needs of their own may be.
My approach: the establishment of a alisa, so much more convenient!
Thursday, July 30, 2009
vmware tools on ubuntu
Much nonsense has been said, to enter the subject of the following (provided that the normal have been able to boot Ubuntu):
Installation need to pay attention to:
1. Streamlined version of the VM for the virtual machine, do not waste time to read the following introduction, and to ↑ go.
2. Enter an order to be careful, can not have the slightest error, otherwise the installation will fail. For example, the command name and the space between the command parameters.
The first method (for general):
1. The installation of the compiler environment:
With the mouse at the top left corner of the "application" → "annex" → "terminal"
Input:
uname-r (carriage return)
Enter you will see the kernel version of Ubuntu (following the order will be used), then enter:
sudo apt-get install build-essential linux-headers-kernel version of
Followed by a relatively simple operation, in addition to, or, etc., etc. .....
Back when the terminal state can be entered can be carried out on the next step.
2. Mouse menu bar click VMware "virtual machine" -> "Install VMware Tools is the English version of the corresponding ..."(" VM "->" Install VMware Tools ..."), you will see a CD-ROM was load (can not see it does not matter, it is estimated that the eyes well, ha ha), the desktop will appear on a virtual drive, open it.
3. Select the suffix name ". Tar.gz" files, copy to your desktop, right-decompress point.
4. In the terminal, type:
cd ~ / Desktop / vmware-tools-distrib (corresponding to the English version shall enter: cd ~ / Desktop / vmware-tools-distrib)
5. To continue in the terminal, type:
sudo. / vmware-install.pl
Then there is the mechanical operation, and there are problems on the prompt return, do not have to think for you to save time,嘿嘿. Until the final resolution will let you choose the screen (seems to be selected in accordance with the number keys), according to the size of your computer screen and your preferences you choose.
6. The final step: Ubuntu restart.
The second method (applied to find ". Tar.gz" files or can not be mounted "VMware Tools" situation):
1. The installation of the compiler environment:
With the mouse at the top left corner of the "application" → "annex" → "terminal"
Input:
uname-r (carriage return)
Enter you will see the kernel version of Ubuntu (following the order will be used), then enter:
sudo apt-get install build-essential linux-headers-kernel version of
Followed by a relatively simple operation, in addition to, or, etc., etc. .....
Back when the terminal state can be entered can be carried out on the next step.
2. The closure of the Ubuntu virtual machine system. 4. Start the Ubuntu virtual machine system, log in, you will be able to have a virtual desktop drive, open it.
5. Select the suffix name ". Tar.gz" files, copy to your desktop, right-decompress point.
6. In the terminal, type:
cd ~ / Desktop / vmware-tools-distrib (corresponding to the English version shall enter: cd ~ / Desktop / vmware-tools-distrib)
7. To continue the importation of:
sudo. / vmware-install.pl
Then there is the mechanical operation, and there are problems on the prompt return, do not have to think for you to save time, Will allow you to choose the screen resolution (such as the election is based on the number keys), and according to the size of your computer screen and your preferences you choose.
8. The final step: Ubuntu restart.
auto delete temp when start
Therefore, for a group trying to deal with their own document, and then the machine starts to run loaded directly to the temporary folder of documents removed.
I will own the system temporary folder on the disk drive other than D. Set as follows:
1,
Right-click My Computer -> Properties -> Advanced -> Environment Variables in the User Variables, select TEMP and editing, variable name will be changed to a directory on D disk. And to identify. It is desirable also to TMP was changed to the variable the same directory of D drive. Here I was on the D: \ Temp \ Temp on.
2,
Using Notepad to edit a text file, which reads as follows:
rmdir "D: \ Temp \ Temp" / s / q
md "D: \ Temp \ Temp"
Save, and then it changed its name to DelTemp.bat, (of course, not the name, the place is not the location of a location), but must remember to name it the suffix. Bat. The contents of the path can be set up temporary files and change the storage location.
3,
Click "Start -> Run", type "gpedit.msc" (without the quotation marks) Return to open "Group Policy Editor" in the left branch of the tree and select "Computer Configuration -> Windows Settings -- > Scripts (Startup / Shutdown) ", double-click the" Start ", in the" Start Attribute "window in the point" add ", the location of the script by browsing to find you have just saved the batch file DelTemp.bat and to determine, from the Group Policy. If you want to delete it in the write-off on the "user profile" to engage the local
After the next restart, the contents of the temporary folder will be cleared of a clean.
Of course, this batch can also be a quick link on the desktop, at any time to clean up can double-click the temporary folder to the clean-up.
how to delete more setup
ubuntu error help
Reason: Document contains no X
Solution: you can install the xlibs-dev
2, error: Qt (> = Qt 3.0) (headers and libraries) not found. Please check your installation!
Reasons: to provide qt find the lib & & headers package, and installed
Solution: apt-get install libqt3-headers libqt3-mt-dev
3, error: in the prefix, you've chosen, are no KDE headers installed. This will fail.
So, check this please and use another prefix!
Reasons: install a KDE application in a Gnome environment.
To solve: which basically means its going to want to install a lot of KDE specific packages to work. This' configure: error '
is due to it expecting you to be running KDE and again refers to some 'headers'.
sudo apt-get update
sudo apt-get install kdelibs4-dev kdelibs4c2a
4, error: C compiler cannot create executables
Reasons:
Solution: sudo apt-get gcc libc6-dev
5, the error: checking for C compiler default output ... configure: error: C compiler cannot create executables
Reasons:
Solution: sudo apt-get install libc6-dev
6, error: configure: error: C + + preprocessor "/ lib / cpp" fails sanity check
Reasons: gcc not installed components of the whole
Solution: apt-get install build-essential
7, error:. / Admin / cvs.sh: 585: autoconf: not found
Reasons:
Solution: apt-get install autoconf
8, error: *** GTK> = 2.4.0 not installed! ***
Reasons: GTK not installed
Solution: apt-get build-dep gedit
9, error: heching for gtk-config ... no
checking for GTK - version = 1.2.0 ... no
*** The gtk-config script installed by GTK could not be found
*** If GTK was installed in PREFIX, make sure PREFIX / bin is in
*** Your path, or set the GTK_CONFIG enviroment variable to the
*** Full path to gtk-config.
configure: error: Cannot find GTK: Is gtk-config in path?
Reasons:
Solution: sudo apt-get install libgtk1.2-dev
10, the problem: eclipse do not support the encoding of Chinese
Solution: edit / var / lib / locales / supported.d / local, plus his zh_CN.GBK GBK, the implementation of sudo locale-gen
11, the question of: eva do not pop-up input method
Solution: sudo apt-get install scim-qtimm
12, the problem: No package 'gtk + -2.0' found
No package 'gtksourceview-1.0' found
No package 'libgnomeui-2.0' found
No package 'libglade-2.0' found
No package 'libgnomeprintui-2.2' found
Solution: sudo apt-get install libgtk2.0-dev libgtksourceview-dev libgnomeui-dev libglade2-dev libgnomeprint2.2-dev
13, the problem: No package 'libpanelapplet-2.0' found
Solution: sudo apt-get install libpanelappletmm-2.6-dev
Error: configure: error: C + + preprocessor "/ lib / cpp" fails sanity check
Reasons: gcc not installed components of the whole
Solution: apt-get install build-essential
Problem: eclipse do not support the encoding of Chinese
Solution: edit / var / lib / locales / supported.d / local, plus his zh_CN.GBK GBK, the implementation of sudo locale-gen
Error: gnome.h: No such file or directory
Problem: No package 'gtk + -2.0' found
No package 'gtksourceview-1.0' found
No package 'libgnomeui-2.0' found
No package 'libglade-2.0' found
No package 'libgnomeprintui-2.2' found
Solution: sudo apt-get install libgtk2.0-dev libgtksourceview-dev libgnomeui-dev libglade2-dev libgnomeprint2.2-dev
Problem: No package 'libpanelapplet-2.0' found
Solution: sudo apt-get install libpanelappletmm-2.6-dev
There are excerpts:
Compiler
. / configure (use-help recommendations need to use query parameters)
make
sudo make install
If the. / Configure this step error
Error One:
configure: error:
You must have the GTK + 2.0 development headers installed to compile Pidgin.
If you only want to build Finch then specify-disable-gtkui when running configure.
Solution:
sudo apt-get install libgtk2.0-dev
Error II:
configure: error:
You must have libxml2> = 2.6.0 development headers installed to build.
Solution:
sudo apt-get install libxml2-dev
Error III:
configure: error:
The msgfmt command is required to build libpurple. If it is installed on your system, ensure that it is in your path. If it is not, install GNU gettext to continue.
Solution:
sudo apt-get install gettext
If you use MSN or GTalk error
Error:
SSL Library / Libraries ... ... ...: None (MSN and Google Talk will not work
without SSL!)
Solution:
sudo apt-get install libnss-dev libnspr-dev
If the. / Configure also a problem, then to find the problem, you can install the missing packages.
In the configuration process, config.log file is very useful. There we can find out the root causes of errors, in order to find responses.
Wednesday, July 29, 2009
autocad on vista
IE repair
-------------------------------------------------- ---
(A). Default homepage has been modified
1. Damage characteristics: default home page is automatically changed to a web site.
2. Expressions: the browser's default home page is automatically set as the WWW .********. COM Web site.
3. Removal methods: the use of manually modifying the registry law, the Start menu -> run -> regedit-> OK, open the Registry Editor tool, according to the order to open: HKEY_LOCAL_USER \ Software \ Microsoft \ Internet Explorer \ Main branch, Default_Page_URL found key name (used to set the default home page), right-click in the right window can be modified. The entry into force by the F5 key to refresh.
Damage: General
(B). Default page be changed
1. Damage characteristics: the default page is automatically changed to a web site.
2. Expressions: the browser's default home page is automatically set as the WWW .********. COM Web site.
3. Removal methods: the use of manually modifying the registry law, the Start menu -> run -> regedit-> OK, open the Registry Editor tool to open the order as follows: HKEY_LOCAL_USER \ Software \ Microsoft \ Internet Explorer \ Main branch, to find StartPage key name (used to set the default home page), right-click in the right window can be modified. The entry into force by the F5 key to refresh.
Damage: General
(C). The default Microsoft home page was modified
1. Damage characteristics: the default Microsoft home page is automatically changed to a web site.
2. Expressions: to be tampering with the default Microsoft home page
3. Removal method:
(1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool to open the order as follows: HKEY_LOCAL_MACHINE \ Software \ Microsoft \ InternetExplorer \ Main branch to find keys Default_Page_URL name (used to set the default Microsoft home page), right-click in the right window will be amended as key http://www.microsoft.com/windows/ie ... button to refresh the entry into force of 5.
(2) Automatic file into the registry law: Please type or paste the following into Notepad to copy in order to reg extension the existence of arbitrary file name of any C disk directory, and then the implementation of this document, in accordance with prompt, all the way to confirm, you can successfully import the registry shows.
REGEDIT4
[HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Internet Explorer \ Main]
"Default_page_url" = "about: blank";
Damage: General
(D). Home screen settings are locked and can not change the settings option is invalid
1. Undermine features: Home setting is disabled
2. Expressions: Home address bar by changing the gray shield
3. Removal method: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool to open the order as follows: HKEY_CURRENT_USER \ Software \ Microsoft \ InternetExplorer \ support, new "ControlPanel" primary key, and then the next primary key in this new key called "HomePage" the DWORD value, value is "00000000", the entry into force by the F5 key to refresh.
(2) Automatic file into the registry law: Please type or paste the following into Notepad to copy in order to reg extension the existence of arbitrary file name of any C disk directory, and then the implementation of this document, in accordance with prompt, all the way to confirm, you can successfully import the registry shows.
REGEDIT4
[HKEY_CURRENT_USER \ Software \ Policies \ Microsoft \ Internet Explorer \ Control Panel]
"HomePage" = dword: 00000000
Damage: mild
(E). Default IE search engine has been modified
1. Damage characteristics: The Microsoft IE default search engine change.
2. Expressions: the search engine has been tampered with.
3. Removal method: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool, first, open the order as follows: HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Internet Explorer \ Search branch, to find "SearchAssistant" key name, in the right window click "edit", you can input for their key: http://ie.search.msn.com/ (SUB_RFC1766) / srchasst / srchasst. htm, and then find "CustomizeSearch" key name, will be amended as its key: http://ie.search.msn.com/ (SUB_RFC1766) / srchasst / srchasst.htm, the entry into force by the F5 key to refresh.
(2) Automatic file into the registry law: Please type or paste the following into Notepad to copy in order to reg extension the existence of arbitrary file name of any C disk directory, and then the implementation of this document, in accordance with prompt, all the way to confirm, you can successfully import the registry shows.
REGEDIT4
[HKEY_LOCAL_MACHINE \ Software \ Microsoft \ InternetExplorer \ Search]
"SearchAssistant" = "http://ie.search.msn.com/ (SUB_RFC1766) / srchasst / srchasst.htm"
"CustomizeSearch" = "http://ie.search.msn.com/ (SUB_RFC1766) / srchasst / srchasst.htm"
Damage: General
(F). IE title bar illegal information is added
1. Damage characteristics: by modifying the registry so that the title bar of IE has been forced to add a website that promotes the advertising information.
2. Expressions: the top blue title bar in IE, what more "network-time, even if the net-time! Http://www.zhengdian.com";; tail.
3. Removal method: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool, first, open the order as follows: HKEY_CURRENT_USER \ Software \ Microsoft \ Internet Explorer \ Main branch, to find "Window Title" key name, enter key for Microsoft Internet Explorer, press F5 to refresh.
Second, open the order as follows: HKEY_CURRENT_MACHINE \ Software \ Microsoft \ InternetExplorer \ Main branch, to find "Window Title" key name, enter key for Microsoft Internet Explorer, press F5 to refresh the entry into force.
(2) Automatic file into the registry law: Please type or paste the following into Notepad to copy in order to reg extension the existence of arbitrary file name of any C disk directory, and then the implementation of this document, in accordance with prompt, all the way to confirm, you can successfully import the registry shows.
REGEDIT4
[HKEY_CURRENT_USER \ Software \ Microsoft \ Internet Explorer \ ain]
"Window Title" = "Microsoft Internet Explorer"
[HKEY_LOCAL_MACHINE \ Software \ Microsoft \ nternet Explorer \ ain]
"Window Title" = "Microsoft Internet Explorer"
Damage: General
(G). OE title bar is added the destruction of illegal information characteristics:
Damage characteristics: by modifying the registry in Microsoft's integrated e-mail program Microsoft Outlook to add the top title bar of a website that promotes the advertising information.
Forms: in the top of Outlook Express to add the blue title bar of illegal information
Removal methods: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool to open the order as follows: HKEY_LOCAL_USER \ Software \ Microsoft \ utlook Express branch, as well as to find WindowTitle Store Root key name, its keys are located is empty. The entry into force by the F5 key to refresh.
(2) Automatic file into the registry law: Please type or paste the following into Notepad to copy in order to reg extension the existence of arbitrary file name of any C disk directory, and then the implementation of this document, in accordance with prompt, all the way to confirm, you can successfully import the registry shows.
REGEDIT4
[HKEY_CURRENT_USER \ Software \ Microsoft \ Outlook Express]
"WindowTitle" = ""
"Store Root" = ""
Damage: General
(VIII). The right mouse button menu is added illegal website links:
1. Damage characteristics: by modifying the registry, in the right mouse button pop-up menu is added in the links illegal site.
2. Expressions: add "site home" links to information and so on.
3. Removal method: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool to open the order as follows: HKEY_CURRENT_USER \ Software \ Policies \ Microsoft \ Internet Explorer \ enuExt branch of the left window is a non-link all the main keys are deleted, the entry into force by the F5 key to refresh.
4. Against the degree of: General
(Ix). The right mouse button pop-up menu function is disabled disorders:
1. Damage characteristics: by modifying the registry, right-click pop-up menu feature in the IE browser was a total ban.
2. Expressions: Right-click in IE there is no response.
3. Removal method: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool to open the order as follows: HKEY_CURRENT_USER \ Software \ Policies \ Microsoft \ Internet
Explorer \ estrictions branch, to find "NoBrowserContextMenu" key name, its key
Value is set to "00000000", the entry into force by the F5 key to refresh.
(2) Automatic file into the registry law: Please type or paste the following into Notepad to copy in order to reg extension the existence of arbitrary file name of any C disk directory, and then the implementation of this document, in accordance with prompt, all the way to confirm, you can successfully import the registry shows.
REGEDIT4
[HKEY_CURRENT_USER \ Software \ Policies \ Microsoft \ Internet Explorer \ estrictions]
"NoBrowserContextMenu" = dword: 00000000
Damage: mild
(10). IE Favorites have been forced to add the address of the illegal Web site link
Damage characteristics: by modifying the registry, IE Favorites in force automatically add a link to information on illegal sites
Forms: hiding in the next Favorites
Clear Methods: Please use the direct removal manually, using the right mouse button to move to the information on the illegal site, right-click pop-up menu, you can choose to delete.
Damage: General
(XI). In the IE toolbar button to add the illegal
Damage characteristics: Toolbar button added to the illegal
Manifestations: A button icon
Clearance method: Direct click the right mouse button pop-up menu, select "Delete" option.
Damage: General
(XII). Lock the address bar drop-down menu and add a text message
Damage characteristics: by modifying the registry, the address bar will be locked into a gray drop-down menu.
Manifestations: not only the disappearance of the drop-down menu, but also in its coverage of illicit text messages.
Removal methods: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool to open the order as follows: HKEY_CURRENT_USER \ Software \ Policies \ Microsoft \ Internet
Explorer \ Toolbar branch to find the right window "LinksFolderName" key name, its key
Value is set to "link", the extra characters are removed from the entry into force by the F5 key to refresh.
Damage: mild
(13). IE menu "View" under the "source document" item is disabled;
Damage characteristics: by modifying the registry, the IE menu "View" under the "source document" locked into a gray item.
Form of expression: the "source document" item is not available
Removal methods: (1) method to modify the registry manually: Start Menu -> Run -> regedit-> OK, open the Registry Editor tool, first, open the order as follows: HKEY_CURRENT_USER \ Software \ Policies \ Microsoft \ Internet Explorer \ estrictions branch, to find "NoViewSource" key name, as its key
"00000000", the entry into force by the F5 key to refresh.
Open the order as follows: HKEY_LOCAL_MACHINE \ Software \ Policies \ Microsoft \ nternet Explorer \ estrictions branch, to find "NoViewSource" key name, its key value is set to "00000000", the entry into force by the F5 key to refresh.
(2) Automatic file into the registry law: Please type or paste the following into Notepad to copy in order to reg extension the existence of arbitrary file name of any C disk directory, and then the implementation of this document, in accordance with prompt, all the way to confirm, you can successfully import the registry shows.
REGEDIT4
[HKEY_CURRENT_USER \ Software \ Policies \ Microsoft \ Internet Explorer \ estrictions]
"NoViewSource" = dword: 00000000
[HKEY_LOCAL_MACHINE \ Software \ Policies \ Microsoft \ Internet Explorer \ estrictions]
"NoViewSource" = dword: 00000000
how to create and format hard disk in linux
A commonly used file system
In Linux, we often have access to the file system ext3, ext2, reiserfs, fat32, msdos (fat16), as well as NTFS. fat32, msdos (fat16) and NTFS is the Windows or DOS operating system commonly used file system. Linux operating system is commonly used file system ext2, ext3, reiserfs, we are currently reiserfs or ext3, ext2 has been ext3 replaced; CDROM using the ISO 9660 file system; now are the majority of mobile storage fat32 or fat16 file system through discussion LinuxSir.Org situation, the majority of brothers or a machine to install the Windows and Linux, so Linux system to read Windows file system, is also widespread. Read in the Linux file system to other operating systems, but also a knowledge of the more important points; As for the characteristics of a variety of file system, or a deeper theoretical problem, you can go to the corresponding file system to see the official station;
Second, add a new hard drive, or add a new hard disk partition process;
1, on the hard disk partition structure of the planning, this is the theory that it is highly necessary;
Please refer to: "reasonable planning your hard disk partition"
2, first of all have to learn to view the hard drive or mobile hard disk (U disk), or the use of district;
We have to learn to fdisk; du; df tools please refer to: "Linux view disk partition, file system, the use of command and related tools on"
3, for the new hard disk partition or fdisk operation is a necessary tool for learning content;
Please refer to: "an example to explain the use fdisk" 4, format the hard disk partition file system is intended to establish; mounted file system, disk scanning;
For example, formatting the hard disk partition, floppy disk formatted for the mobile hard disk (U disk) storage devices, etc. formatting; method of mounting the file system mount and / etc / fstab to load the boot partition; document system scan and repair fsck; please refer to: "Linux create a file system and mount the file system processes explain"
Third, read the Windows partition, digital storage devices fat32 or fat16 file system read and so on;
Please refer to:
"Fedora core 4.0 on NTFS and FAT32 partitions to load detailed"
"Fedora Core 4.0 HAL to configure plug-and-play removable storage (USB and 1394) the practice of"
Fourth, the file system and storage devices are determined by the kernel;
Linux is not the appropriate file system support, as well as storage devices, are determined by the kernel, not just the file system and storage device is determined by the kernel, all the hardware support is determined by the kernel. For example, we have the mobile storage devices can not be system identification, we should have learned the kernel; please refer to: "compile-core operational processes ─ ─ Guide for the Novice"
V, storage devices and management tools for the supplementary
Are added in
Postscript: the operation of storage device management and file system management is an important part of system administration, I face the problem of the novice is still to explain the almost the same. These documents can only be used as a portal, that is the door leading chef, unfortunately I can not become a teacher. Oh. . . Linux in a small order may be to write a book, so I wrote the document, can only lead the way for you; the road a little bit longer ... ... we need another arm of the common path ... .. .
setup vmware network
In this way the simplest and most direct would be a virtual network adapter from the bridge above the physical network adapter, and a network card linux bind two different addresses are quite similar, in fact, is the NIC set to promiscuous mode, so as to achieve a number of IP's ability to listen .
In this mode, the virtual machine within the LAN (for example, under linux the eth0) directly to the physical network card is located, it is conceivable for the virtual machine and host machine is on an equal relationship in the network are equal, No one in the question of who is behind.
The use of this method is very simple premise that you can be more than one address. The network would like to conduct various experiments for a friend not because of the virtual machine you can not control the network, it has a direct out.
nat by:
This way there is a host within a virtual network adapter vmnet8 (by default), if you do nat have the experience of the server here on vmnet8 network equivalent to connect to the network card, and the virtual machine itself is equivalent to running machines, including the Internet, a virtual machine within the LAN (eth0) is independent of the vmnet8.
You will find in this way, vmware own dhcp by default to load into vmnet8 interface so that you can use a virtual machine on the dhcp service. More importantly, vmware own a nat services provided from outside the network vmnet8 to address translation, so this is a real nat server running, but is used for the virtual machine.
Obviously, if you have only one outside the network address, in this way is appropriate.
hostonly:
This should be the most flexible way, is interested in it can be a variety of network experiments. And nat the only difference is that in this way, there is no address translation services, recognition mode, the virtual machine can only access the host, this is the meaning of the name of hostonly.
By default, there will be a load to the dhcp service on vmnet1. Vmnet1 this to connect to the virtual machine can still be set to dhcp, easy system configuration.
Is it this way there is no way to connect to outside networks, of course, is not, in fact, more flexible this way, you can use in their own way, so as to achieve the most desirable configuration, such as:
a. Dhcp service to use their own: First of all to quit the vmware own dhcp service dhcp service so that more consistent.
b. To use their own nat, firewall easy to join. windows host can do a lot of nat way, the simple, such as the internet sharing windows xp, windows server, such as the complex's nat service.
c. to use their own firewall. Because you can completely control vmnet1, you can join (or test) vmnet1 and outside the firewall in the network between the network card.
As can be seen from the above, hostonly of this model and the general nat server network with the whole situation in a similar line, so you can easily carry out the related experiments, such as setting fire strong.
I have specific network settings on the other two articles
(linux host + windows guest
http://bbs.chinaunix.net/forum/viewtopic.php?t=367907&highlight=yunqing
And
windows host + linux guest
http://bbs.chinaunix.net/forum/viewtopic.php?t=374483&highlight=yunqing
) Is also based on this configuration.
Environment: Host OS: windows sp2;
Client operating systems: Ubuntu 8.10
Steps:
1. First of all, the closure of a virtual machine system, VritualBox click the "Settings" button in the pop-up form and select "Data Space" tab.
2. The new data space, select the corresponding Host system directory, as well as data from a name space (such as: ShareFolder, the following are known as "ShareFolder" as an example)
3. To start a virtual machine system, in order to create a virtual data space corresponding to the directory system, such as "/ home / liyebei / share"
4. Open the terminal tool, built into the following command "sudo mount-t vboxsf Host_Share_Folder_Name Client_Share_Folder_name", which Host_Share_Folder_Name data space for the name of VritualBox, book case "ShareFolder", "Client_Share_Folder_name" is a virtual machine system, the corresponding share folder directory, in this example "/ home / liyebei / share", so the actual command to type "sudo mount-t vboxsf ShareFolder / home / liyebei / share"
OK, done on time, after data space can be in a virtual machine system and the host system places the file transfer between them
share the best browser
Firefox includes many outstanding features, like tabbed browsing, instant bookmarks, download manager, custom search engines and so on. Firefox development objective is to "enjoy the Internet browser" and "for most people the best Internet experience"
Users can set the theme of expansion and from the definition of the function and appearance of Firefox, the Mozilla add-on component maintenance in the addons.mozilla.org website has nearly 2000 kinds of additional components available for download (to April 2008 so far).
For website developers, Firefox also provides a good development platform. Website developers through the built-in tools to carry out development work, such as the error console, DOM viewer, the objects outside such as through the expansion of the development of Web Developer to extend functionality.
Tabbed browsing
Firefox supports tabbed browsing is to open a window in a number of pages, this feature inherited from the Mozilla Application Suite, has become a well-known feature of Firefox. Firefox also allows users to use in the Home "|" as separator in automatically open pages in multiple settings page, allowing users not only can set a Home.
Firefox 2 and has further strengthened the tabbed browsing features, including easier to use, to more clearly label the page, "View the status of revocation," allows experienced crashes when re-open the page in front, "to withdraw the recent closure of the paging "can restore accidentally closed the page.
Additional components
firefox users can expand by installing Firefox to add or modify functions. Expand the types of all-inclusive: as mouse gestures, ad blocking window, enhanced tabbed browsing and so on. Sometimes the development of Firefox to expand the functions of integration, such as tabbed browsing is a Mozilla extension on MultiZilla in the transplant.
Provide a high degree of liberalization, the expansion of functions, but the user may search for and the difficulties encountered with the installation of the expansion will require the expansion of functionality into Firefox.
Most of the expansion is not supported by Mozilla to establish or expand a user's computer also has the authority to access the data and, therefore, be cases in the expansion of a malicious. Mozilla in this regard to provide verification of the expansion to ensure that these volunteers provide the expansion of the development does not contain any malicious software. In addition by a third-party developers to expand the production, Mozilla does not guarantee that the products can operate on Mozilla, but also any software may contain errors or security vulnerabilities.
Includes expansion of themes, plug-in procedures (Plugin) and so on, these additional components can be maintained from the official Mozilla website addons.mozilla.org, or from other third-party developers to obtain. Firefox can also be some expansion in the use of SeaMonkey web browser.
Additional components in the Mozilla web site can find a complete list of extensions. As of February 11, 2008, the site of a total of 1,953 extension of Firefox.
2.opera
High-speed
Make full use of caching mechanisms Opera, fast loading pages. Opera in the survey results are very good. It uses an exclusive publishing engine Presto.
September 4, 2007, Opera introduced the Kestrel typesetting engine using 9.5 beta.
Multi-functional and compact
Many Opera features, in addition to the website, also includes POP e-mail, IRC chat, RSS browser, voice control of browsing, reading text (can not read Chinese), but also add a variety of controls, such as calculators, currency converters, weather forecasts, a small like the game. The latest version also includes BT download function. Non-voice data and the Java installation program generally does not exceed the size of 4M.
High flexibility
Opera has a considerable number of user-friendly features, user-friendly. It supports multi-page browsing, support for skin, mouse gestures, page zoom and custom page formats. Mouse Gestures Opera's first feature is, as well as fast-forward, automatic landing pages, automatically fill in information, session management, notes, quickly set up functions. It also built a variety of search engines, as well as a reasonable set of shortcut keys.
A system of high
Customization of the interface, Opera has an extremely convenient and user need not worry about the interface to cause chaos. Users can customize the button-rich, as well as the Tools menu and search the list. Also the first Opera mouse gestures and keyboard shortcuts. These are also very easy to backup, the user only to the corresponding backup. Ini file, when re-install only need to select the appropriate menus and toolbars, and shortcut keys to mouse gestures, users can also use other people to prepare the menu, toolbar and so on. Opera has also built a number of style sheets, the user can change the font page structure.
High security
Opera update very frequently, each time after the defects found in the browser will be upgraded as soon as possible. The latest Opera 9, including a perfect support SSL 2 / 3 and TLS security, including an agreement to support 256-bit encryption, you can resist the malicious code attacks, phishing attacks and other network attacks, provide the details of Cookie control, can be a key to remove saved on your computer browser information on all individuals can also be automatically upgraded security. Secunia.com from Opera we can understand that security has been higher than Internet Explorer, FireFox and other browsers.
Multi-lingual
Opera used to load the language interface in the form of packets, in theory, can have any language version of the Opera.
Typesetting engine
Elektra
4 ~ 6 version.
Presto
Version 7.0 ~ 9.23.
Kestrel
Version 9.5 before use.
Peregrinus
Version 10.0 for later use.
3. safari
fast, safe
top 6 antivirus software 2009
The Shield Deluxe 2009 actually impressed us quite a bit. We were able to install and run the program in short order with little to no hassle. We appreciated the fact that we could get the software up and running in very little time, and we have to say we were also very pleased with the company’s customer service. |
- Antivirus and Antispyware Software
- Real-Time Virus Scanning
- System Restoration
- Instant Message Protection
The Shield Deluxe offers both virus and spyware protection in one, requires low system resources and is among the most competitively priced products on the market today. If you are searching for a high quality product that is well supported, then The Shield Deluxe 2009 should be your top pick for your anti-virus protection needs.
2. Webroot Antivirus with AntiSpyware 6.0
Webroot Antivirus with AntiSpyware 6.0 is a well-developed anti-virus application. It offers users comprehensive anti-virus protection and a wide range of features that are usually only found in the higher-priced Internet security suites. This includes the on-line file backup as well as compatibility with the latest computer operating systems.
- Free On-line Backups
- Anywhere File Access
- Gaming and Movie Mode
3. BitDefender Antivirus 2009
4.CA Anti-Virus Plus 2009
CA Anti-Virus Plus 2009 gives computer users the ability to protect their computers from not only viruses but also from spyware and other related threats. Overall the this program installed well, though it does seem to cause a little bit of lag. We did, however, feel that it is a good trade off for having some form of virus and spyware protection. This software seems more than capable of handling most threats to a user's computer.
- Virus and Spyware Protection
- Automatic Updating
- Custom Scanning
5.McAfee VirusScan Plus 2009
McAfee VirusScan Plus 2009 is a solid contender in the anti-virus market. Its ability to find and remove threats was definitely above par. It turned out to be one of the better products that we came across.
- Web Page Safety Ratings
- Fast Scanning
- Firewall Protection
6. Norton Antivirus 2009
Norton AntiVirus 2009 has improved by leaps and bounds in regards to the options and functionality of their software. We really did appreciate the smaller program size and the increase in the number of features presented. We also were impressed with the ability of this program to catch and eliminate a large variety of computer threats. On the down side we tend to think that the user interface while familiar and easy to use could use a new look to go along with the improved software.
- Updates Via Pulse Technology
- Automatic Scans
- Smart Scanning
must we choose windows defender
The specific functions of Windows Defender include:
Redesigned and simplified user interface - Comprehensive customer feedback and redesigned the user interface of Windows Defender to complete common tasks more easily. Warning system can be adjusted according to the seriousness of the threat alert level, thereby reducing the overall number of alarms, but still be able to ensure that users will not miss the most urgent alerts.
Improved detection and removal - Based on the new engine, Windows Defender can detect and remove more from spyware and other potentially unwanted software the threat posed. Real-time protection has also been enhanced to better monitor key points in the operating system is changed.
The protection of all users - all users, regardless of whether they have administrative privileges, you can run Windows Defender. This ensures that all users are subject to the protection of Windows Defender.
Support 64-bit platforms and accessibility - Windows Defender supports the auxiliary function and 64-bit platforms. Make sure to use 64-bit platform WindowsDefenderX64.msi.
Delta definition updates - Windows Defender now downloads smaller delta definition updates downloaded and installed to reduce the time required for definition updates. Update their customers need to update the definition of the download time is even shorter.
Limited free support - As part of our commitment to customers as part of security, Microsoft provides two free support to resolve the Windows XP and Windows Server 2003 with Windows Defender related issues. Examples of effective support program, including installation, configuration, definition update, detection and removal errors. For more information, please see the Windows Defender support policy.
WGA enforcement measures - non-genuine Windows to run a big risk. Only genuine Windows customers can receive product downloads, Windows updates and special offers. Windows Defender will validate your installation before the Windows is genuine. Moreover, running non-genuine systems for computer, Windows Defender is only to eliminate a serious threat. Security level will be detected as low, medium and high threat, but unless Windows is genuine, it would not eliminate these threats. For more information, please visit the Windows Genuine Advantage.
but we should know that every antivirus software includes anti spyware. so there is no need to run windows defender. according to another report, windows defender can only stop50%---60%
spyware. so if you run vista, you need to run windows defender, for it will help you nothing but slow down you pc.
why AVG is better
Extreme security, perfect protection. For a new generation of Internet-borne security threats and effective solutions.
Ensure that your data security, protect your privacy, against spyware, adware, trojans, dialers, keyloggers and worms threat. In easy-to-use interface, we provide you with advanced scanning and detection methods, as well as current cutting-edge technology. Anti-virus program can only provide for the critical threats such as the outbreak of Trojan horse, worms, dialers, hijacking procedures, spyware, and keyloggers limited protection. And this is the AVG Anti-Spyware protection of the starting point, it can complement existing security applications to create a complete security system - because only a complete security system can work effectively.
Background information: AVG (Grisoft) from the Czech Republic, since its establishment in 1992, has had more than ten years experience in the development of antivirus software, its security product widely used in Europe and America, and Oceania region. It is supported by ICA and have been certified laboratory in 2008 Virusbulletin's VB100% award (that is, full Virusbulletin killing virus database released by the international community only a few anti-virus vendor award). January 21, 2008, the original company "Grisoft, sro'scorporate" officially changed its name to "AVGTechnologiesCZ, sro", which symbolizes its AVG product performance and corporate culture, another round of perfection and sublimation.
Product Category: From the user types into the home and business, and divided from the perspective of product, AVG can be around the following three
AVG Anti-Virus AVG Anti-Virus software version
AVG Anti-Spyware AVG Anti-Spyware version of this version of the official support has been discontinued, and now has been upgraded to AVG Anti-Virus 8.0
AVG Internet Security AVG Internet Security suite (including antivirus software and firewall)
AVGAnti-Virus: AVGAnti-VirusSystem functional rather complete, and available for immediate access to any document to detect and prevent computer virus infections; can be attached to the e-mail and scanning documents to prevent computer viruses through e-mail and dissemination of additional documents; Virus database records a number of which are characteristics of computer virus attacks and the date and other related information; boot to protect the computer boot-up in the open model to detect viruses, prevent virus infection in open models. In anti-drug connection, can scan floppy disk, hard disk, CD-ROM drive, but also can scan the disk on the network. In the scan may also be only the floppy disk, hard disk, CD-ROM machine to scan a directory. Can scan a document-based viruses, macro viruses, compressed files (support for ZIP, ARJ, RAR and other real-time extract the compressed file scanning). When the scan found infected files when the infected file to quarantine AVGVirusVauIt, to be scanned together after the completion of detoxification. Support online upgrade.
AVG Anti-Virus There are three versions (professional, server, free of charge)
Personal use of the free version of a non-profit, full-featured, but only a part of function can not be set, such as the drug only once a day schedule and so on.
Now offers the latest version 8.0 for free for all to use.
AVG Anti-Virus is well-known in Europe, in China there are a considerable number of adherents. 2008, AVG released version 8.0 antivirus expertise to subvert the Anti-Virus, a new alternative way of network security, focusing on propaganda and Internet Security products, the move is to catch up with the network in 2008 a wave of blended threats.
Home: http://www.avg.com
Chinese Home: http://www.avgsafe.com
Download a free version of http://www.avgsafe.com/avgforfree.rar
AVG 8.0 Introduction
AVG new features
New user interface - greatly simplifying the navigation, intuitive, high-rate
New High Performance Scanning Engine - anti-virus and anti-spyware detection combined
New link-scanning technology - real-time monitoring of web links hidden behind the threat
New web shield - scanning the Internet for each document to download
New anti-Rootkit - detect and remove rootkit provide
The new firewall - to re-design, intuitive user interface and faster engine filters
The new system management tools - for the diagnosis and computer management
The new product line to simplify - to Internet Security series of high-end products as the core
AVG new design - new products competing for public attention
AVG new improved
To improve the presence of shield - more documents can be opened at the same time serve the requirements of
To improve the anti-spam - to provide a faster engine performance
Improve the e-mail scanning - flexible control messages in different formats (including HTML)
Manager to improve the modernization - updating easier than before
New user interface
Simplify navigation
Basic user interface, designed specifically for home users
For experienced users to set up high-level installation
Tested by users with high availability
High-performance scanning engine
Combination of anti-virus and anti-spyware detection
Complete rewrite of the scanning engine
Support for the new archive file types and formats
The new simulator, allowing a more effective heuristic analysis
Lower memory consumption
Support multi-threaded multi-core CPU
Seamlessly running on many operating systems
Can be used for 32-bit and 64-bit Windows
Note: Linux, FreeBSD version will also be available in the near
New link-scanning technology
LinkScanner (link scanning) technology patent applications to provide a safe web browser, download the path of real-time prevention, poisoning other potential web threats.
Competitive products such as McAfee's SiteAdvisor (site guidance), as dependent on the maintenance of a few days or weeks-long static database of suspicious sites are unable to provide real-time protection.
Active Surf-Shield (Shield surfing) - "safe surfing" - to provide real-time attacks on web sites and intercept the final analysis.
Search-Shield (search Shield) - "safe search" - with the major search engines (Google, Yahoo, MSN) work at the same time in each link of search engine safety ratings appear next to the icon. Dangerous sites will be blocked.
AVG8.5 compatible system
MS Windows 7
MS Windows 2000
MS Windows XP
MS Windows XP Pro x64Edition
MS Windows Vista
MS Windows Vista x64 Edition
MS Windows 2000 Server
MS Windows 2003 Server
MS Windows 2003 Server x64Edition
MS Windows 7
Linux i386
FreeBSD
AVG8.0 compatible applications
MS Exchange Server 5.x
MS Exchange Server 2000/2003
MS Exchange Server 2007 * available soon
Lotus Domino (MS Windows)
Lotus Domino (Linux i386)
PostFix
QMail
SendMail
Exim
ICQ (IM Protection)
MSN (IM Protection)
Internet Explorer (LinkScanner)
Mozilla Firefox (LinkScanner)
Support the language - all products
German
English
Brazilian Portuguese
Portuguese
Czech
Slovak
Polish
Danish
Spanish
French
Hungarian
Serbian
Italian
Japanese
Dutch
Now the latest AVG Free Edition 8.5
Antivirus anti-virus for more than AVG8.0 has made significant improvement
AVG 8.5 version is released in March 2009, and this update the main-level security products for the home to make further contributions. 8.5 version of AVG together and implement a structured way of the performance of a number of improvements to enhance the stability of the product. The most prominent official to be acquired for the after AVG Internet theft protection internationally renowned experts in Sana, believe that the AVG 8.5 version of the overall technology will lead to more users of the network protection surprise care. Today, increasing the scope of household-level option, a new product called AVG Identity Protection, is a specialized protection against malicious software and identity theft protection products.
install vmware server for ubuntu
i choose vmware server which is pretty good, here is how to install it
1. download vmware server online
2.Get a serial number
3.Install required packages on ubuntu
run
sudo apt-get install build-essential linux-headers-`uname -r`
4.download some package from ubuntu, then unpack it
run
cd ~
tar zxvf VMware-server-2.0.0-122956.i386.tar.gz
cd vmware-server-distrib
sudo patch ./bin/vmware-config.pl ~/vmware-config.pl.patch.txt
sudo ./vmware-install.pl
now you can easily run install, just keep default, everything will be great
how to setup more speed dial in opera
but some time we need more, here is how
1. start, search speeddial.ini
2.close opera, open the file via txt
3.add this d
[Size]
Rows=4
Columns=4
rows and columns will be what you want to set.4. run opera browser, everything is okay now
Compare virtualbox and vmware workstation
Virtualbox
1.download virtualbox the newest edition from virtualbox.com
2.install virtualbox on your pc
3.run virtualbox
first you see this
and then you should click on new
then you see
click next
now you can choose what kind of operating system you want to install,
for example, windows xp
click next
virtualbox will help you decide the memory of the virtual system
but you can change it any time throughout the setup
click next
to successfully install the virtual system, you must create a virtual hard disk
use the default will be good enough.
after that, you need to capture a dvd or cd image or use the physical dvd
remember also setup other, such as share folder...
then, run virualsystem
vitualbox will setup only the virtual hardware, but not the software (the OS)
you can setup the OS as you do it on a real computer
but this is different from vmware,let's first see how vmware work
all you need is no much different, but remember,
vmware can decide the OS setup which means you can easily install different OS in different installing ways. once you inset a cd or dvd or iso file, vmware will immediately check out what kind of OS you will install. virtualbox can't.
and some differences throughout using, such as vmware support usb easily but not virtualbox
vmware setup remote easily but virtualbox not. virtualbox will take you little harddisk but vmware take a lot.
which one to choose depend on what you will doing for? if personally trial using, virtualbox is good, but if you need professional , vmware is much better.