How to Share a Folder in Windows 7
One of the main advantages of a network is the ability to share files. This article shows you how to configure Windows 7 to share files and folders on a network. More ...
The Security and Maintenance of Messages in Outlook Express
Outlook Express includes several tools that protect the unauthorized users from accessing the electronic data, thereby increasing the privacy and integrity of the e-mail messages. More ...
Make a Shortcut to Create a Restore Point on Windows 10
In Windows 10 Automatic Updates are primarily used to bind the operating system tighter to Microsoft's Store. That's one good reason why you might want to return your system back to a previous state. But to do that, you need to have set a previous restore point. More ...
A Day in the Life of a System Administrator
People interested in becoming a computer system administrator or those who are studying for the Microsoft Certified System Engineer (MCSE) exam might not know what a system administrator actually does. More ...
Msconfig - Microsoft's Secret Weapon to Increase Your Computer's Speed
Often when you install software it will, by default, load into your system's memory when you turn your computer on. All these programs loading into memory will eventually mean a snail will beat your computer in a race! Msconfig gives you a central location to manage a variety of your computer's options. More ...
Search for Text in Text Files
Getting Windows Folder Search function to reliably find text within a file is a real trick. There are several places within windows where you can configure search, but it never seems to do a reliable job. The solution is to use the simple batch file. More ...
Put HyperTerminal on Windows 7
HyperTerminal was included with all versions of Windows up to Windows XP. If your operating system is newer than Windows XP you can copy Hyperterminal from a Windows XP system. More ...
How to Configure Hyper-V on Windows Server 2019
Hyper-V is a Windows 2019 native hypervisor that it can be used to create virtual machines. There are many different things that you can configure with the Hyper-V console. More ...
The Fastest Way to Move PC to PC
Upon installation, many applications write keys and other information to the Windows registry. For this reason, when you want to transfer your programs and files to a new computer, you can't just copy them over. More ...
Use Windows 10 File History Option to Backup Your Personal Files
In Window 10 ,File History regularly backs up versions of your files in the Documents, Music, Pictures, Videos, and Desktop folders and the OneDrive files available offline on your PC. If the originals are lost, damaged, or deleted, you can use File History to restore them. More ...
Use the HOSTS File to Block Web Sites
When you type a domain name into your Web browser, Internet Protocol contacts a computer that is a domain name server to look up the IP address of the Web site. In the early days, the Internet didn't need domain name servers. More ...
Script to Identify Your Systems HAL
The HAL is a crucial module that sits between the Windows operating system and the hardware. Having an incorrect HAL can cause your system to work sluggishly or cause unexplained system lockups. The script provide in this article will identify which HAL was installed on your system. More ...
Network Security Through the Principle of Least Privilege
The Principle of Least Privilege refers to giving users permissions to access only the data and system resources which are required to do their work. Give users full administrative rights to their computers, or data and resources not directly required to do their work significantly increases the risk of the companies critical or confidential information being compromised. More ...
How to Erase a Hard Disk Drive Permanently
Erasing data or files from a hard disk permanently is not easy. Even after emptying the Recycle Bin, the files can be easily recovered. Many people also think that formatting the hard drive will erase the files, however a computer specialist would be able to recover the data. More ...
