Network information-rich, poor software unbridled unchecked, our children, how can it resist the temptation of the network? The best way is to let the child away from the computer, so that the young heart be protected. As the saying goes: "cherish life, to eliminate the computer." I summed up the Bazhao surprise move, sinister, vicious vicious way, let the children leave the computer.
Method 1: Buy Apple
destruction: ***
U.S. Apple to excellent shape, strong core popular image, video enthusiasts, like Apple, however, foreign to China, not so different. Most of China's software did not support the Macintosh operating system, of course, a lot of pages on Apple machines do not deal specifically with children using a Mac, just as women wear high heels 20 cm-gap measures may only take off the copies.
Method 2: Computer no mouse, only keyboard
lethal :***< br> computer since entered popular, it takes on a mouse, many people claiming to be computer experts, leave the mouse also only a computer novice, practicing a keyboard that cicadas. For parents to understand more natural than others, so memorize the keyboard hot health, losing the mouse, play it cool in front of the children can enjoy it without worry about their children to use. I have seen with a red dot on the IBM books, parents who fight cattle empire. Since then, I have instructions from his example of my life.
Method 3: UNIX or LINUX computer system
lethal :****< br> computer software to facilitate a child this small window is the culprit access, modification UNIX or LINUX systems, use the command operation software, even if the child secretly learned, do not worry enough to test into a computer system.
Method 4: teaching children to VC or assembly programming
lethal :****< br> everything is a little hard in the beginning of this old saying is true, children have access to computers from the first day, teach a child or a compilation of VC programming, parents do not have too high levels, compiled from more memory leaks, infinite loop or something, to achieve the purpose of the time even shorter.
Method 5: self-destructive malware
:****< br> rogue software, although abhorrent, but if you can actively use, or can achieve good results. As follows: false kindness to the child a separate account, a landing WINDOWS, immediately running rogue software, rogue how to use how the children think that they are not properly cause the computer to a standstill, will be when the psychology of guilt, never again to touch the computer.
Method 6: heart beat curiosity
destructive magic :****< br> kids play on the computer Internet is mostly due to curiosity, knowingly collect more, making some horrible shade of deep images, audio and video , video, continuous loop, the heart works magic on friends.
Method 7: Sister Furong to help
lethal :****< br> Sister Furong photos for your computer desktop, Sister Lotus video do screensavers, IE home page set to Sister Furong BLOG, to computer All documents exchanged text is Sister Furong, must be set to read-only can not be changed. Eventually let the children think that the network computer is only a woman is Sister Furong, nausea, to avoid so far.
Method 8: fire alarm, doors and windows are closed
lethal :*****< br> to be a small security software, non-I landing, automatically run: C: \ format, to achieve machine destruction of people do not die.
没有评论:
发表评论