How to Harden a Server
By hardening a server, you're making it much more difficult for hacker to launch a successful attack against the system. Thiis artilce describes mthods to harden a server. More ...
How to Setup a VPN Between Two Computers
A VPN establishes a secure path between a computer with public Internet access and a computer connected to a private network. This article show you how to set up a VPN. More ...
What is Hyper-V in Windows Server 2019?
Virtualization was a game changer. Instead of buying individual servers to run single applications, an organization could purchase more powerful servers to run a hypervisor that would run multiple virtual servers, referred to as virtual machines (VMs). More ...
How to Create a Bootable USB Drive
A bootable USB flash drive allows you to diagnose hardware issues and can be used to install Windows on your PC. However you first need to create a bootable USB flash drive. More ...
How to Change Process Priorities in Windows Task Manager
In modern systems, many processes can run simultaneously. When an application is running, it's consuming system resources such as processor cycles. Sometimes, you may want to adjust a processes priority. More ...
How to Transfer a Large Amount of Data Between Two Windows 10 Computers
The best way to transfer a large amount of data from one Windows 10 computer to another is to use network a connection between the two computers, and then use Robocopy. More ...
SMART Disk Drives Warn You Before They Fail
Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T.) is a feature built-in to modern hard drives that monitors certain parameters of their operation in an attempt to provide a warning when failure is imminent. More ...
Turn Off Windows XP Service Pack 2 Firewall
If your PC is running Windows XP Service Pack 2, the first thing you need to do is turn off the firewall. Why? Because a serious firewall blocks unwanted inbound and OUTBOUND connections. SP2's firewall does not block unwanted outbound connections. More ...
WSH to Master Your Computer
With Windows 2000 and higher, Microsoft included a program called Windows Scripting Host (WSH) that allows scripts to be run on a computer outside of a webpage. In effect, DOS batch files have returned, except scripts are multi-tasking and have a lot more power. More ...
CompTIA Security+ Made Easy
As computers gain complexity, so do the malicious attacks used to beat the security systems built to guard those systems. Government employees working in IT are expected to complete the Security+ exam. Many non-government companies are also requiring their employees to receive certification. More ...
What is Windows Aero and Mouse Gestures?
Aero is Microsoft's new gimmicky graphical user interface for Windows Visa and Windows 7. Its main feature is the translucent glassy window borders, allowing background objects to be visible through them. Another feature of Aero is mouse gestures. The mouse gestures are Snap, Shake, and Peek. More ...
Set the User's Profile Information
A user profile is a collection of settings for a user account. It is stored in the user's folder. It contains the account's settings and preferences along with the user's home directory in a subfolder called Documents. More ...
How to Manually Register DLL in Microsoft Windows
A DLL (Dynamic link library) is a file that contains code that can be used by more than one program. A DLL is executed by the calling program. They are not directly executable. In order for the calling program to locate the DLL, it must be registered in windows registry database. More ...
Understanding Windows 7 Security Center
Windows Security Center is a security tool that allows you to monitor the status of computer security settings and services. It also constantly monitors security settings, and informs via a pop-up notification if there is something wrong. In Windows 7 Microsoft renamed it as Action Center. More ...
