Script to Display the Processes Running on a Computer
Processes are the programs or tasks running on a computer. The most common way to view the processes is with Task Manager. To get a quick list you could use a script. Below is a script that displays the processes running on a computer. More ...
Disable Cutesy Effects to Speed Up Windows 10
If you have someone on your butt to be more productive, or you rely on your productivity to earn a living, then to increase your computer's performance (and thereby your performance) you need to get rid of all the cutesy animations, fades, shadows, and slides that Windows performs. More ...
Retrieving Information from Computers Belonging to an Active Directory OU
This PowerShell script queries a particular Organizational Unit (OU) in your Active Directory for a list of computers. It will then use WMI to query various properties of those computers and output it into table format. More ...
To Protect Your PC Disable the Windows Scripting Host
Anyone can use Windows Notepad to create a script to read, modify, create, or delete files on your PC, including the registry and other configuration files. A script can be executed by clicking on the name of the script within an email message. More ...
Free Tool to Uninstall Windows 10 Store Apps
Windows 10 is not primarily an operating system, but instead it's a marketing device. Fortunately, there is a fee tool that will help you uninstall Microsoft Store apps on Windows 10. More ...
What is the difference between MSI and EXE Installations?
There is no standard for EXE installations, various vendors of setup authoring tools like InstallShield and Wise Studio have created their own rules and guidelines. MSI packages are created in compliance with the standard defined by the Microsoft Windows Installer technology. More ...
Restrict Web Browsing With Internet Explorer
Regulating web browsing can prevent children (and workers) from accessing dangerous content on the internet, or having to make judgment calls over suitable relationships in chat-rooms. You can block access to unwanted web content. Here's how to do so with a basic Parental Control tool included free with Windows. More ...
Common Issues With Windows Firewall
Common issues with the Windows Firewall have annoyed users. Here's a list of the most faced Windows firewall issues along with their possible solutions. More ...
Is Your Critical PC Data Adequately Protected From Disaster?
For small businesses or home users protecting and managing disaster scenarios merge the three industrial IT fields of Disaster Recovery, High Availability and Backup. Using best practice from industry and modern desktop PC's with sophisticated hardware and software it's amazing just how much we can do. More ...
Computer Data Backups - Test Now or Cry Later
When it comes to your computer data backups, complacency can be very dangerous. It's important that you get some basic understanding of the major issues with computer data backups. Here's a compilation of crucial tips on computer data backups that I?ve put together. More ...
Turn Off Windows XP Service Pack 2 Firewall
If your PC is running Windows XP Service Pack 2, the first thing you need to do is turn off the firewall. Why? Because a serious firewall blocks unwanted inbound and OUTBOUND connections. SP2's firewall does not block unwanted outbound connections. More ...
Font Basics
There are two basic kinds of fonts, bitmapped fonts and scalable fonts. Bitmapped fonts are constructed as a pattern of dots. Bitmapped fonts can be enlarged, but this produces jagged looking type. More ...
Script to Print a Directory File List
There are many low cost and free applications that will print a directory file list. Some people use the DOS prompt or a DOS batch file. In this article, I'm going to give you another method, a small VBScript to run with the Windows Scripting Host. More ...
Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment
This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from being exploited. More ...
