Menu
Windows System Administration

Turn Off Windows XP Service Pack 2 Firewall
If your PC is running Windows XP Service Pack 2, the first thing you need to do is turn off the firewall. Why? Because a serious firewall blocks unwanted inbound and OUTBOUND connections. SP2's firewall does not block unwanted outbound connections. More ...

PC Technician's Guide to Providing Telephone Support
Troubleshooting PC problems over a telephone is a difficult task. Always keep complete support incident documentation. If you can't solve the problem, follow your company's escalation policy. If a problem is taking a long time to solve, try to work out a temporary work-around with the customer so that they can stay in business. By following the steps in this article you'll be able to provide successful telephone technical support. More ...

Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...

Common Issues With Windows Firewall
Common issues with the Windows Firewall have annoyed users. Here's a list of the most faced Windows firewall issues along with their possible solutions. More ...

Create and Change Password, Picture and User Name in Windows 7
In Windows 7, the logon screen usually contains a picture that you choose when setting up the computer and a default user name. Here's how to change your password, picture and user name. More ...

Make a Shortcut to Create a Restore Point on Windows 10
In Windows 10 Automatic Updates are primarily used to bind the operating system tighter to Microsoft's Store. That's one good reason why you might want to return your system back to a previous state. But to do that, you need to have set a previous restore point. More ...

Retrieving Information from Computers Belonging to an Active Directory OU
This PowerShell script queries a particular Organizational Unit (OU) in your Active Directory for a list of computers. It will then use WMI to query various properties of those computers and output it into table format. More ...

How to Share a Folder in Windows 7
One of the main advantages of a network is the ability to share files. This article shows you how to configure Windows 7 to share files and folders on a network. More ...

PC Technician Certifications and Professional Organizations
PC Technician is projected to be among the fastest growing occupations over the 2008 - 2012 period. Entry Level PC Technicians earn $15 per hour on average, experienced PC Technician's earn $30 per hour on average. Many people work as PC Technicians without any formal training or certification. More ...

Environment variables in PowerShell
Environment variables are global settings for your Linux, Mac, or Windows computer, stored for the system shell to use when executing commands. Many are set by default during installation or user creation. More ...

How to Configure Hyper-V on Windows Server 2019
Hyper-V is a Windows 2019 native hypervisor that it can be used to create virtual machines. There are many different things that you can configure with the Hyper-V console. More ...

Uncomplicated AD Object Management on a Remote Server Domain
Windows Server comes tools known as MMC (Microsoft Management Consoles) for managing the active directory. With the Active Directory Users and Computers (ADUC) snap-in administrators can create, manage and delete user and computer accounts configured with the directory structure. More ...

Disable Cutesy Effects to Speed Up Windows 10
If you have someone on your butt to be more productive, or you rely on your productivity to earn a living, then to increase your computer's performance (and thereby your performance) you need to get rid of all the cutesy animations, fades, shadows, and slides that Windows performs. More ...

Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment
This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from being exploited. More ...


Learn more at amazon.com

Custom Search