Configure Windows Indexing Service for Performance
The Windows Indexing Service uses a fair amount of disk space and if the shared directories on the network are large, it can consume a considerable portion of the computer's memory and processor cycles. There are several options for configuring the Indexing Service to improve performance. More ...
Disable Annoying 'Get Windows 10' Message
You may not want to upgrade to Windows 10 because its search function pushes Windows app store products and tries to trick you into signing up for Microsoft's OneDrive. More ...
Search for Text in Text Files
Getting Windows Folder Search function to reliably find text within a file is a real trick. There are several places within windows where you can configure search, but it never seems to do a reliable job. The solution is to use the simple batch file. More ...
Hands-On Microsoft Windows Server 2008 Administration
This book is the perfect resource for learning Windows Server 2008 from the ground-up! Designed to build a foundation in basic server administration, the book requires no previous server experience. It covers all of the critical Windows Server 2008 features, including the features unique to this new server operating system. More ...
Three Important Techniques for Securing a Wireless Network
If you have a wireless network at home or in the office, it is critical to have it secured. Wireless networks are prone to attacks from outsiders - perhaps even more so than with wired networks. This article shows how you can implement three techniques to secure a given wireless network. More ...
Windows 7 Tweaks
This book is packed with more than 400 pages of insider tips, it delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 to get every ounce of performance from your operating system. More ...
How to Reset Windows 7 Password
I would like to think you're reading this article because you've forgotten your Windows 7 password, but we both know it's really because you want access to a computer you're not authorized to use. If the authorized user didn't bother to create a password reset disk, or if they hid it where you can't find it, you'll need to use a windows 7 password cracker tool. More ...
Application, Program, Process, Service, Thread; What Does it All Mean?
Although applications, services, and processes are all pretty much the same thing, generally if its a program that displays a user interface, you should call it an application. A program that doesn't displays a user interface, you should call a service. More ...
Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...
How to Audit Security Permissions and Access Rights in Active Directory
Active Directory is the foundation of security and IT management in Windows Server based IT infrastructures. It stores and protects the user accounts, the security groups, and auditing of all access management tasks. It is the focal point of administrative delegation in Windows based environments. More ...
Configuring Windows as a NTP (Network Time Protocol) Server
The Windows operating systems from Windows 2000 onwards has an in-built time synchronization service - Windows Time. The Windows Time service facilitates a Windows network to provide synchronization of all machines within a domain. This article describes how to configure the Windows 2000 and Windows 2003 time service as a NTP server. More ...
PowerShell Script to Show Last 5 Errors in Event Log
The Windows System eventlog is one of the most powerful components of the operating system because it keeps a log of everything that happens. Here I provide a powershell script to display the last 5 error entries in the log. More ...
Configure Vista's Data Execution Prevention
If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you that the programs execution has been blocked. By default DEP is set to protect only Windows operating system files. However, you can configure DEP to protect all programs on your computer. More ...
How to Configure the msdos.sys file
Msdos.sys was one of the three files (along with io.sys and command.com) that DOS 6 and earlier versions was composed of. Beginning with Windows 95, msdos.sys was combined into io.sys and the new msdos.sys became a text editable configuration file. More ...
