Restrict Web Browsing With Internet Explorer
Regulating web browsing can prevent children (and workers) from accessing dangerous content on the internet, or having to make judgment calls over suitable relationships in chat-rooms. You can block access to unwanted web content. Here's how to do so with a basic Parental Control tool included free with Windows. More ...
Internet Connection Sharing in Windows XP
This article explains in detail how to set up a small network at home so you can share your Internet connection between two computers running Windows XP. More ...
Synchronize Your PC's Clock with an Internet Time Server
Your PC should, by default, be configured to synchronize to time.windows.com every seven days. One of the reasons you might be thinking of synchronizing your PC's clock is because it doesn't keep accurate time. More ...
Choosing a Tape Drive
Tape drives remain the leading technology used by organizations for backup and archiving. How do you select a tape drive that satisfies your needs without blowing the budget? The following are just some of the main factors to consider. More ...
Use the HOSTS File to Block Web Sites
When you type a domain name into your Web browser, Internet Protocol contacts a computer that is a domain name server to look up the IP address of the Web site. In the early days, the Internet didn't need domain name servers. More ...
Make a Shortcut to Create a Restore Point on Windows 10
In Windows 10 Automatic Updates are primarily used to bind the operating system tighter to Microsoft's Store. That's one good reason why you might want to return your system back to a previous state. But to do that, you need to have set a previous restore point. More ...
Disable Kernal Paging to Speed Up Windows
Paging is when the operating system allocates part of the hard disk to be used as virtual RAM. Windows is slowed by paging. You can speed up Windows by configuring it to keep its kernal in RAM. More ...
PC Technician's Guide to Providing Telephone Support
Troubleshooting PC problems over a telephone is a difficult task. Always keep complete support incident documentation. If you can't solve the problem, follow your company's escalation policy. If a problem is taking a long time to solve, try to work out a temporary work-around with the customer so that they can stay in business. By following the steps in this article you'll be able to provide successful telephone technical support. More ...
How to Disable Windows 10 OneDrive
Microsoft claims OneDrive is built in to Windows 10, and can't be uninstalled. But they do provide instructions to stop the sync process, so it doesn't send your files to OneDrive. More ...
Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...
Use Free Autoruns Utility to Disable Unnecessary Startup Programs
Stopping unnecessary programs from starting makes Windows boot faster and frees up system resources. Microsoft sysinternals free Autoruns utility shows you what programs are configured to start at system bootup or login. More ...
Windows Event Logs for Maintaining or Troubleshooting Your PC
Your PC keeps logs of everything that happens. You can use the information in these logs to help maintain and troubleshoot and your PC. More ...
A Handful of Useful Run Commands: calc, notepad, wordpad, voice recorder, control
The Run dialog box which can be opened by pressing the [Windows] + [R] keys. Run dialog box is a rapid way to open programs. Here are some quick and useful Run commands. More ...
Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment
This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from being exploited. More ...
