Microsoft Licensing Explained
If any of you have tried to figure out Microsoft's licensing laws you know how frustrating and confusing it is. I have written a brief explanation below covering Windows XP, Vista and Server 2003. More ...
How to Backup Mails and Address Book of Outlook Express
Outlook Express - the easiest and widely used email client on Windows OS provides easy options through which you can create backup of your emails and contact addresses. The emails get stored in the Application Data folder in the form of .dbx files - Inbox.dbx, Drafts.dbx, Outbox.dbx, Personal.dbx and so on. More ...
How to Block Unwanted Websites with Your Netgear Router
Kids use the computer to play video games or search Google for their science projects. Being a parent you might be worried about what your children can watch online behind your back. More ...
Server Virtualization - What It's All About
Are you tired of hearing about "virtualization" in meetings, reading about it in magazines, and not knowing what it's all about? The term "virtualization" is refers to an operating system running on a host computer without any dedicated hardware as a "Virtual Machine" (VM). More ...
Computer Data Backups - Test Now or Cry Later
When it comes to your computer data backups, complacency can be very dangerous. It's important that you get some basic understanding of the major issues with computer data backups. Here's a compilation of crucial tips on computer data backups that I?ve put together. More ...
Disable Kernal Paging to Speed Up Windows
Paging is when the operating system allocates part of the hard disk to be used as virtual RAM. Windows is slowed by paging. You can speed up Windows by configuring it to keep its kernal in RAM. More ...
Command Line to Get Computers Model, Vendor, and Serial Number
WMIC (Windows Management Interface Command) is a command line tool that returns information about your syste. To learn your computers model, vendor, and serial number, type wmic csproduct get name,vendor,identifyingNumber at a command prompt. More ...
Three Important Techniques for Securing a Wireless Network
If you have a wireless network at home or in the office, it is critical to have it secured. Wireless networks are prone to attacks from outsiders - perhaps even more so than with wired networks. This article shows how you can implement three techniques to secure a given wireless network. More ...
Computer Technician's Guide to Safety
There are many hazards that the computer technician must be aware of. These include Physical Hazards, Mechanical Hazards, Chemical Hazards, Electric Shock Hazard, and CRT Monitor High-Voltage Hazard. More ...
FreeDOS
FreeDOS is a PC compatible Y2K compliant DOS that you can download from www.freedos.org. Microsoft should have made the expiration period much longer than 30 days. Maybe they want you to activate Windows XP before it crashes. More ...
How to Erase a Hard Disk Drive Permanently
Erasing data or files from a hard disk permanently is not easy. Even after emptying the Recycle Bin, the files can be easily recovered. Many people also think that formatting the hard drive will erase the files, however a computer specialist would be able to recover the data. More ...
Use the HOSTS File to Block Web Sites
When you type a domain name into your Web browser, Internet Protocol contacts a computer that is a domain name server to look up the IP address of the Web site. In the early days, the Internet didn't need domain name servers. More ...
CompTIA A+ Complete Study Guide
All-in-one guide prepares you for CompTIA's new A+ Certification. Prepare for the required exam, CompTIA A+ Essentials (220-601), as well as your choice of one of three additional exams focusing on specific job roles: More ...
Planning a Backup and Restoration of Files for Disaster Recovery
Planning a backup and restoration of files is the most important step to protect data from accidental loss in the event of data deletion or a hard disk failure. The backup copy can be used to restore lost or damaged data. More ...
