Menu
Windows System Administration

How to Setup a VPN Between Two Computers
A VPN establishes a secure path between a computer with public Internet access and a computer connected to a private network. This article show you how to set up a VPN. More ...

What is Windows Aero and Mouse Gestures?
Aero is Microsoft's new gimmicky graphical user interface for Windows Visa and Windows 7. Its main feature is the translucent glassy window borders, allowing background objects to be visible through them. Another feature of Aero is mouse gestures. The mouse gestures are Snap, Shake, and Peek. More ...

How to Disable Windows 10 OneDrive
Microsoft claims OneDrive is built in to Windows 10, and can't be uninstalled. But they do provide instructions to stop the sync process, so it doesn't send your files to OneDrive. More ...

Server Virtualization - What It's All About
Are you tired of hearing about "virtualization" in meetings, reading about it in magazines, and not knowing what it's all about? The term "virtualization" is refers to an operating system running on a host computer without any dedicated hardware as a "Virtual Machine" (VM). More ...

FreeDOS
FreeDOS is a PC compatible Y2K compliant DOS that you can download from www.freedos.org. Microsoft should have made the expiration period much longer than 30 days. Maybe they want you to activate Windows XP before it crashes. More ...

CompTIA Security+ Made Easy
As computers gain complexity, so do the malicious attacks used to beat the security systems built to guard those systems. Government employees working in IT are expected to complete the Security+ exam. Many non-government companies are also requiring their employees to receive certification. More ...

PC Technician's Software Copyright Responsibilities
As a PC Technician, working on other people's computers, you'll be in a position to encounter illegally copied software. For example, maybe you need to re-install a customer's operating system or application software and you find that the customer is using an illegal copy. What do you do? Do you go ahead and install the illegal software? More ...

How to Configure the msdos.sys file
Msdos.sys was one of the three files (along with io.sys and command.com) that DOS 6 and earlier versions was composed of. Beginning with Windows 95, msdos.sys was combined into io.sys and the new msdos.sys became a text editable configuration file. More ...

DOS Switches and Wild Cards
DOS (Disk Operating System) is an interface that a system administrator can use to perform tasks and configure the system by typing text commands. There are many commands available with the DOS command line interface, most of them feature switches, and wild cards which make them very powerful. More ...

How to Restore Files From File History in Windows 10
To keep your files safe, File History automatically makes a copy of every file in your Documents, Music, Photos, and Videos folders. It copies all the files on your desktop, as well. And File History automatically makes those copies every hour. More ...

Turn Off Windows XP Service Pack 2 Firewall
If your PC is running Windows XP Service Pack 2, the first thing you need to do is turn off the firewall. Why? Because a serious firewall blocks unwanted inbound and OUTBOUND connections. SP2's firewall does not block unwanted outbound connections. More ...

Search for Text in Text Files
Getting Windows Folder Search function to reliably find text within a file is a real trick. There are several places within windows where you can configure search, but it never seems to do a reliable job. The solution is to use the simple batch file. More ...

Configure Vista's Data Execution Prevention
If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you that the programs execution has been blocked. By default DEP is set to protect only Windows operating system files. However, you can configure DEP to protect all programs on your computer. More ...

PowerShell Script to Show Last 5 Errors in Event Log
The Windows System eventlog is one of the most powerful components of the operating system because it keeps a log of everything that happens. Here I provide a powershell script to display the last 5 error entries in the log. More ...


Learn more at amazon.com

Custom Search