Disable Annoying 'Get Windows 10' Message
You may not want to upgrade to Windows 10 because its search function pushes Windows app store products and tries to trick you into signing up for Microsoft's OneDrive. More ...
Search for Text in Text Files
Getting Windows Folder Search function to reliably find text within a file is a real trick. There are several places within windows where you can configure search, but it never seems to do a reliable job. The solution is to use the simple batch file. More ...
View a Brief List of Windows 10's Recent Problems
Windows 10 Problem Report and the reliability history chart give you some information about your computer's problems without the overwhelming detail provided by other tools such as Event Viewer. More ...
Windows Event Logs for Maintaining or Troubleshooting Your PC
Your PC keeps logs of everything that happens. You can use the information in these logs to help maintain and troubleshoot and your PC. More ...
Set Up Parental Controls
Windows has a feature called Parental Controls that you can use to help manage how your children use the computer. You can restrict the hours that they can use the computer, which specific programs they can run, and which specific websites they can access. More ...
Disable Automatic Wireless Configuration in Windows 7
Windows provides two services that configure your PC to connect to a wireless network. WLAN AutoConfig and WWAN AutoConfig. Both services are started automatically when you start your PC. If you don't use a wireless network or mobile broadband, for security reasons you may want to disable these services. More ...
Make a Shortcut to Create a Restore Point on Windows 10
In Windows 10 Automatic Updates are primarily used to bind the operating system tighter to Microsoft's Store. That's one good reason why you might want to return your system back to a previous state. But to do that, you need to have set a previous restore point. More ...
How to Manually Register DLL in Microsoft Windows
A DLL (Dynamic link library) is a file that contains code that can be used by more than one program. A DLL is executed by the calling program. They are not directly executable. In order for the calling program to locate the DLL, it must be registered in windows registry database. More ...
Disable Indexing to Speed Up Your Computer
The Windows Indexing Service has to continuously monitor the files on your computer for changes and update it's database when changes or new files are found. This uses processor time and can take up more than a megabyte of ram. If you're just you're sitting in front of your computer and the hard drive starts working very hard, that's probably the Indexing Service. More ...
Defend Your Business with a Firewall
A firewall is a piece of hardware or software that places a barrier between your network and the internet. It prevents outsiders from accessing your network and systems and delving into your confidential information or performing malicious acts. More ...
Make Windows 10 File Explorer Open to This PC instead of Quick Access
When you open Windows 10 File Explorer, it defaults to Quick Access. If, like me, you prefer to have File Explorer open to This PC or an actual Computer folder, then you can configure it to do so in the Folder Options dialog box. More ...
How to Reset Windows 7 Password
I would like to think you're reading this article because you've forgotten your Windows 7 password, but we both know it's really because you want access to a computer you're not authorized to use. If the authorized user didn't bother to create a password reset disk, or if they hid it where you can't find it, you'll need to use a windows 7 password cracker tool. More ...
The Security and Maintenance of Messages in Outlook Express
Outlook Express includes several tools that protect the unauthorized users from accessing the electronic data, thereby increasing the privacy and integrity of the e-mail messages. More ...
Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment
This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from being exploited. More ...
