If men are decent in front of others (especially women) and say, “I don’t read this stuff,” or strike a pretentious pose, “Reading this stuff It’s boring, my computer is not”. That must be because they store these files in a rather secretive way. You wouldn’t think they would just create a folder called “porn” or “ex-girlfriend” under the D drive, would you? But no matter how he hides it, men have a few tricks up their sleeves, and it’s easy to figure out what they’re doing to uncover his secrets.
Hiding from the world
This type of man has little to say about hiding files from a technical point of view. The most important thing is that you have to be direct and put it directly on the desktop, and you hate to hide it. They believe that “the most dangerous places are often the safest”, so they make a new folder on their desktops and put it directly in there, which people don’t care about.
Examples of hidden locations:
C:/DocumentsandSettings/Desktop New folder
Bluffing
This method is actually quite good at bluffing people. The company’s main goal is to provide a solution to the problem of the problem. The company’s main goal is to provide a good solution to the problem.
Examples of hidden locations:
C:/System Virus Dangerous Trojan Horse Not Fixable
Hiding the knife in the smile
Some men are playful by nature and will put “important files The “path is very deep, but it is very interesting, but sometimes this is rather more aroused the curiosity of others Oh. The good thing is that this kind of nature is optimistic (another direct description is brazen, heh heh), and it’s not a big deal to be found out.
Examples of hidden locations:
E:/English 4-6/Foreign Movies/Jungle Adventure|You don’t really want to see it, do you? Don’t click on nothing/folder is empty/beware of degradation/don’t enter again/|you still enter/enter again first go wash your hands/then take off your pants/then prepare hand towels/downloding。。。。。。。
They’re not just a bunch of people who want to get into a folder, they’re just a bunch of people who want to get into a folder, they’re just a bunch of people who want to get into a folder, they’re just a bunch of people who want to get into a folder.
This method is basically used by men who have a lot of ideas and know that hiding is not the best way to go, rather than having a name that people are interested in seeing and where the mouse is never interested in touching. That is the safest, almost is the so-called transfer bag it! This method needs to be beware, if the name is too boring, it is possible that the woman will instantly “shift delete”, years of treasures down the drain, it is estimated that many men may not be able to withstand such a “heavy blow”.
Examples of hidden locations:
D:/Chinese films|/play/Zhang Jizhong/Smiling Pride/act 13
Finding a scapegoat
The man who uses this method as shown in his ordinary life The best way is to put the blame on the clean one. The best way to do this is to take the blame and make it clean. His “infamous” buddy is the perfect scapegoat.
Examples of hidden locations:
E:/Zhang San’s files/movie/A (so that if you are found out, you can also be the first to This way, if you are found out, you can “frame” it as someone else’s.)
Share the joy
“It is better to enjoy alone than to share with others, and it is better to enjoy alone than to share with others”. The ancients have long known the joy of sharing, and it is only right that good things should be brought out and shared with everyone. If you are the only one who is happy, what is the difference between that and not being happy? So he will not go to the trouble to hide the “important documents” in the corner, the big fanfare in an obvious location is the true nature of men! However, if it is under surveillance, then you need to use technology to solve the problem.
Examples of hidden locations:
1.E:/Learn Together (recommended without surveillance)
2. Install a virtual machine vmware on your machine, install a linux inside vmware, and put important hidden files into this system …… (recommended for use with monitoring)< /p>
Foolishness
The perseverance required for this method is absolutely amazing. He will use the digging method to create numerous new folders and click on them until you run out of patience. Hey, it’s naturally hard to be found, but experienced men will advise you to put many other files in each folder, otherwise the target will be too obvious.
Examples of hidden locations:
E:/1/2/3/4/5/6/7/8/9/10/11/12 /13/14/15/16/17/18/19……/999999999999/slice
Changing the crown< /The first thing you need to do is to change the extensions of your files to dll, not wma, rm, etc. This looks more like the system files Oh! This method is actually the safest, but be careful, in case the unfortunate computer operating system poisoning crash, brothers can never hold up. This also explains why all men are more or less knowledgeable about computer maintenance.
Hidden Location:
C:/WINDOW/|system/***. dll
Teaching for fun
The pace of modern life is getting faster and faster, and life is becoming inseparable from school and career. The “wonderful” images of course should also be put under a serious folder! For example, what study, animation tutorials, tunnel warfare exercises, even my struggle, shooting gallery and so on. He’s really got a lot of heart!
Hidden Location:
E:/Study Material/Physics/Piston Motion
Making something out of nothing
A man with high privacy requirements and solid technical skills, a computer that plays fast and hides things Of course is unusual, always have their own set of (seems like a TT advertising words, guilty!) Oh! They often open a separate hard drive, which is empty, and then copy the “wonderful” pictures and videos or whatever into it, and then completely deleted, when you want to see, use the disk rescue tool to save back, watch and then delete! It’s a great way to get the most out of your computer.
Examples of hidden locations:
E:/Learn together (no elders watching)
Install a virtual machine vmware on the machine, install a linux inside vmware, and put ** into this system …… (with elders monitoring)
Uncovered
There is a category of men who always feel that downloading in their computers is unsafe and wasteful of space and prefer to just The web site is “anonymous”. The web site “anonymous” can be good, collection of other academic terminology, so that women look at all feel profound. How about creating a TXT document with the file name “。。。。。。 The reference to the “” file.
Examples of hidden locations:
C:\WINDOWS\system32\Microsoft \Protect\see\User\gh\Catmeet\Com\net
\fire\im\mp\usmt\wbem\ttww\xircom\inter\ Macromed\windows\youright\learn\ international law review material
The road is high, the devil is high
Many men subscribe and visit porn sites through Bloglines or GoogleReader, rss readers, or just change the common file extensions to have the seeds available for download.
Examples of hidden locations:
C:/DocumentsandSettings/Desktop|Image jpg
Editor’s Summary:
A man’s computer can be The most important thing is that you can find the best way to get the most out of your computer. You may want to try to open his computer in some common name, not to attract attention to the folder to see, the contents of the guaranteed wonderful. The company’s main goal is to provide the best possible service to its customers.