How to Change Process Priorities in Windows Task Manager
In modern systems, many processes can run simultaneously. When an application is running, it's consuming system resources such as processor cycles. Sometimes, you may want to adjust a processes priority. More ...
Windows 7 Tweaks
This book is packed with more than 400 pages of insider tips, it delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 to get every ounce of performance from your operating system. More ...
Three Important Techniques for Securing a Wireless Network
If you have a wireless network at home or in the office, it is critical to have it secured. Wireless networks are prone to attacks from outsiders - perhaps even more so than with wired networks. This article shows how you can implement three techniques to secure a given wireless network. More ...
Use Windows 10 File History Option to Backup Your Personal Files
In Window 10 ,File History regularly backs up versions of your files in the Documents, Music, Pictures, Videos, and Desktop folders and the OneDrive files available offline on your PC. If the originals are lost, damaged, or deleted, you can use File History to restore them. More ...
Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment
This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from being exploited. More ...
Disable Windows 10 Automatic Updates
Windows 10 is not an operating system in the sense that previous versions of Windows were. It's primarily a marketing device. Automatic Updates are primarily used to bind the operating system tighter to Microsoft's Store. Here's how to disable Windows 10 Automatic Updates. More ...
CompTIA A+ Complete Study Guide
All-in-one guide prepares you for CompTIA's new A+ Certification. Prepare for the required exam, CompTIA A+ Essentials (220-601), as well as your choice of one of three additional exams focusing on specific job roles: More ...
Computer Technician's Guide to Electronics Disposal and Recycling
The United States alone creates about 3 million tons of electronics waste each year. Much of this electronics waste is sent to developing nations where primitive processing methods cause serious health and pollution problems. CompTIA considers the knowledge of how to properly dispose of old computer equipment, to be an important part of being a certified computer technician. More ...
Recovering an Older Version of a File
The File History utility is used to recover older versions of a file. This feature is part of all backup programs, though it's often called Restore. The idea is to pluck an older version of a file from the backup archive. More ...
Environment variables in PowerShell
Environment variables are global settings for your Linux, Mac, or Windows computer, stored for the system shell to use when executing commands. Many are set by default during installation or user creation. More ...
Hard Disk Management
In addition to the basic disk, Windows XP Professional also supports the dynamic disk, which overcomes the limitations of the basic disk. Dynamic disks are actually physical disks that are created and managed with the Disk Management utility in Windows XP. More ...
Use Free Autoruns Utility to Disable Unnecessary Startup Programs
Stopping unnecessary programs from starting makes Windows boot faster and frees up system resources. Microsoft sysinternals free Autoruns utility shows you what programs are configured to start at system bootup or login. More ...
How to Map a Network Folder in Windows 7
If you regularly access files stored on a network share, you can make that folder easier to navigate to by maping it to a letter so that it appears in Windows Explorer on your computer. More ...
What Are Windows Server Containers?
Containers have had a large impact in IT organizations. You may be wondering why someone would want to use containers in Windows Server 2019. They're just virtual machines (VMs), right? Well, not exactly. Containers don't expose the hardware or the operating system. More ...
