


If the message "Preparing Windows, please do not shut down" appears on the computer, it means that the system is being updated. This is a regular after-sales service provided by Microsoft to ensure system security and needs to be performed frequently. It is not recommended to cancel or close it.
Solution:
1. Wait patiently: After the system is updated or the system automatically restores the changes, it will start normally. The time required for this process depends on the Depending on the computer, you can only wait patiently for it to complete. You cannot cancel or exit at this time. If you force shutdown to exit, system files or even hardware may be damaged.
2. Restart the computer: If the system update or restore changes fail or the screen is stuck for a long time, you can restart the computer by short pressing the host's restart button, or long pressing the host's power button until the power indicator The light goes out to force a shutdown, then restart.
3. Turn off the automatic system update and let the security software manage it:
1. Wait for the system update to be completed before entering the system, or short press the power switch or restart button on the current screen. If it still cannot To shut down, press and hold the power switch to force a shutdown, then boot into the system or press F8 to enter the system safe mode;
2. Open the control panel, enter the "Security Center", and then click "Automatic Updates";
3. After entering the automatic update window, click to select "Turn off automatic updates", and finally click the "OK" button.
Turning off automatic system updates will cause system security risks. You can use external programs to manage system updates as an alternative. For example, software such as 360 Security Guard, Baidu Guard, and Computer Manager can automatically filter, download, and install system updates. Avoiding the installation of unnecessary system patches can also save time in updating the system.
4. Reinstall the system: If you cannot enter the system after restarting, it means that the system files are damaged, and you can only reinstall the system. There are many ways to reinstall the system. It is recommended to use a CD to reinstall the system. The steps are as follows:
(1) Prepare the system CD: If you don’t have one, you can go to a computer store to buy it. Just buy the latest version of the system you need to install. CD. If you have a CD-ROM drive, you can also go online to download system files in ISO format and burn them into a system CD.
(2) Set up the CD to boot: After turning on the computer, when the motherboard self-test screen or brand LOGO screen appears, press the BIOS hotkey quickly and continuously (different brands and models of computer BIOS hotkeys are different, notebooks are generally F2 key (usually the DEL key on desktop computers) to enter the BIOS setup interface. Press the left and right arrow keys to move and press Enter to enter the BOOT (or startups) tab, select the startup option by pressing the up and down arrow keys, and press the or - key to move the startup option to set the optical drive (CD-ROM or DVD-ROM) as the first boot (Old motherboards need to enter the Advanced BIOS Features tab, press Enter at "1st Boot Device", and then select CD/DVD-ROM), then press F10 to save, exit and restart. Some new motherboards support pressing F12 or F11 after booting to enter the boot options menu, and you can directly select the optical drive without entering the CMOS interface. When restarting the computer, promptly insert the system CD into the CD-ROM drive. After reinstalling the system, be sure to set the hard disk as the first or second startup item.
(3) Clone the installation system: After the CD is started successfully, the function menu will be displayed. At this time, select "Install system to the first partition of the hard disk" in the menu, press Enter to confirm and follow the prompts, or enter the PE system Finally, run the "one-click installation system" on the desktop, and the computer will automatically run the GHOST software to automatically load the GHO file, clone it, and install it in Area C. The entire process requires no manual intervention until the system desktop is finally entered.
Note: After the system installation is completed, first install security software such as 360 Security Guard plus 360 Antivirus or Kingsoft Antivirus and other security software to conduct a comprehensive search and kill Trojans and viruses, then apply system patches and install commonly used software, download and install it and use the one-click restore tool to back up the system in case of emergency.
The above is the detailed content of Preparing Windows, please do not shut down. What is it?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver Mac version
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.