Restrict Web Browsing With Internet Explorer
Regulating web browsing can prevent children (and workers) from accessing dangerous content on the internet, or having to make judgment calls over suitable relationships in chat-rooms. You can block access to unwanted web content. Here's how to do so with a basic Parental Control tool included free with Windows. More ...
Find Your WiFi Password on Windows 10
One of the most common reasons to find your Wi-Fi password is to use it on another PC or device to connect to your Wi-Fi network. Here's how. More ...
Disable Long Filenames to Improve Window's Performance
To be backword compatible with 16-bit FAT partitions, both the VFAT and the NTFS file systems create two names for each file, the long filename and a short filename compatible with the FAT file system. More ...
Hard Disk Management
In addition to the basic disk, Windows XP Professional also supports the dynamic disk, which overcomes the limitations of the basic disk. Dynamic disks are actually physical disks that are created and managed with the Disk Management utility in Windows XP. More ...
Server Virtualization - What It's All About
Are you tired of hearing about "virtualization" in meetings, reading about it in magazines, and not knowing what it's all about? The term "virtualization" is refers to an operating system running on a host computer without any dedicated hardware as a "Virtual Machine" (VM). More ...
How to Restore Files From File History in Windows 10
To keep your files safe, File History automatically makes a copy of every file in your Documents, Music, Photos, and Videos folders. It copies all the files on your desktop, as well. And File History automatically makes those copies every hour. More ...
Configure Vista's Data Execution Prevention
If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you that the programs execution has been blocked. By default DEP is set to protect only Windows operating system files. However, you can configure DEP to protect all programs on your computer. More ...
Three Important Techniques for Securing a Wireless Network
If you have a wireless network at home or in the office, it is critical to have it secured. Wireless networks are prone to attacks from outsiders - perhaps even more so than with wired networks. This article shows how you can implement three techniques to secure a given wireless network. More ...
Free Tool to Uninstall Windows 10 Store Apps
Windows 10 is not primarily an operating system, but instead it's a marketing device. Fortunately, there is a fee tool that will help you uninstall Microsoft Store apps on Windows 10. More ...
Command Line to Get Computer's Numner of CPU Cores
WMIC (Windows Management Interface Command) is a command line tool that returns information about your syste. To learn your computer's numner of CPU cores, type wmic cpu get deviceid,numberofcores,numberoflogicalprocessors at a command prompt. More ...
How to Harden a Server
By hardening a server, you're making it much more difficult for hacker to launch a successful attack against the system. Thiis artilce describes mthods to harden a server. More ...
View a Brief List of Windows 10's Recent Problems
Windows 10 Problem Report and the reliability history chart give you some information about your computer's problems without the overwhelming detail provided by other tools such as Event Viewer. More ...
Font Basics
There are two basic kinds of fonts, bitmapped fonts and scalable fonts. Bitmapped fonts are constructed as a pattern of dots. Bitmapped fonts can be enlarged, but this produces jagged looking type. More ...
Windows 7 Tweaks
This book is packed with more than 400 pages of insider tips, it delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 to get every ounce of performance from your operating system. More ...
