Menu
Windows System Administration

How to Setup DHCP (Dynamic Host Configuration Protocol) on a Windows Server
DHCP (Dynamic Host Configuration Protocol) gives hosts on a network all of the IP information they need to communicate. IP Address, Subnet Mast, Gateway Address, DNS servers and WINS server addresses. For ease of administration DHCP is a great feature to help setup a computer network quickly. More ...

What Is Virtualization and What Are the Benefits?
The term virtualization most commonly refers to server virtualization - running multiple operating systems on a single physical computer. While most computers only have one installed operating system, server virtualization software allows a computer to run several operating systems. More ...

Put HyperTerminal on Windows 7
HyperTerminal was included with all versions of Windows up to Windows XP. If your operating system is newer than Windows XP you can copy Hyperterminal from a Windows XP system. More ...

Disable Kernal Paging to Speed Up Windows
Paging is when the operating system allocates part of the hard disk to be used as virtual RAM. Windows is slowed by paging. You can speed up Windows by configuring it to keep its kernal in RAM. More ...

Is Your Critical PC Data Adequately Protected From Disaster?
For small businesses or home users protecting and managing disaster scenarios merge the three industrial IT fields of Disaster Recovery, High Availability and Backup. Using best practice from industry and modern desktop PC's with sophisticated hardware and software it's amazing just how much we can do. More ...

How to Become a Microsoft MVP (Most Valuable Professional)
A Microsoft MVP (Most Valuable Professional) is an individual who has received an award for outstanding contributions within communities that use Microsoft technologies. Recipients of the Microsoft MVP award are distinguished members of the technical community. More ...

Windows 10 Diagnostic Data Send to Microsoft
By default Windows 10 sends a generous amount of diagnostic information to Microsoft. If you are concerned privacy, you can configure the amount of information sent using the Feedback & Diagnostics page under Privacy Settings. More ...

Configure Windows 10 to Search Windows Only
Unfortunately, by default Windows 10 taskbar Search is configured to Search the Web and Windows, which first connects to Microsoft's bing search engine and searches Microsoft's Windows Store. More ...

PC Technician's Guide to Providing Telephone Support
Troubleshooting PC problems over a telephone is a difficult task. Always keep complete support incident documentation. If you can't solve the problem, follow your company's escalation policy. If a problem is taking a long time to solve, try to work out a temporary work-around with the customer so that they can stay in business. By following the steps in this article you'll be able to provide successful telephone technical support. More ...

Font Basics
There are two basic kinds of fonts, bitmapped fonts and scalable fonts. Bitmapped fonts are constructed as a pattern of dots. Bitmapped fonts can be enlarged, but this produces jagged looking type. More ...

DOS Tasklist and Taskkill Commands
The Windows operating system is actually just a bunch of co-operating programs called tasks or processes. Using the DOS tasklist and taskkill commands, we can explore and control processes running on the system. More ...

Internet Connection Sharing in Windows XP
This article explains in detail how to set up a small network at home so you can share your Internet connection between two computers running Windows XP. More ...

Installing a Local Printer on Windows Vista
Installing a local printer, especially a USB printer, is a non-issue on Windows Vista. You connect it, turn it on, and Vista automatically installs it. But if you have a less common printer, an older printer, or if you've previously removed the printer and want to add it again, you may need to use the Printer Wizard. More ...

The Security and Maintenance of Messages in Outlook Express
Outlook Express includes several tools that protect the unauthorized users from accessing the electronic data, thereby increasing the privacy and integrity of the e-mail messages. More ...


Learn more at amazon.com

Custom Search