Menu
Windows System Administration

How to Setup a VPN Between Two Computers
A VPN establishes a secure path between a computer with public Internet access and a computer connected to a private network. This article show you how to set up a VPN. More ...

Disable Annoying 'Get Windows 10' Message
You may not want to upgrade to Windows 10 because its search function pushes Windows app store products and tries to trick you into signing up for Microsoft's OneDrive. More ...

For Quick Information About System - DOS Systeminfo Command
A system administrator would like to have information about the system when attempting to resolve a system problem. The DOS systeminfo command provides a huge amount of information about your system. More ...

How to Install Hyper-V on Windows Server 2019
Windows Server 2019 offers Hyper-V. It will allow you to support virtual machines, virtual networking, and virtual storage. More ...

Configuring Windows as a NTP (Network Time Protocol) Server
The Windows operating systems from Windows 2000 onwards has an in-built time synchronization service - Windows Time. The Windows Time service facilitates a Windows network to provide synchronization of all machines within a domain. This article describes how to configure the Windows 2000 and Windows 2003 time service as a NTP server. More ...

Top Ten RAID Tips
RAID, a Redundant Array of Inexpensive Disks, is the storage technology which becomes more and more widespread these days. Those who are planning to build a new RAID system would probably find the tips below useful. More ...

Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...

The Different Types of Virtualization
Virtualization represents an abstraction from physical resources. All uses of virtualization are centered around this concept. There are three major types of virtualization: server virtualization, client (or desktop) virtualization, and storage virtualization. More ...

The Security and Maintenance of Messages in Outlook Express
Outlook Express includes several tools that protect the unauthorized users from accessing the electronic data, thereby increasing the privacy and integrity of the e-mail messages. More ...

Computer Technician's Guide to Electronics Disposal and Recycling
The United States alone creates about 3 million tons of electronics waste each year. Much of this electronics waste is sent to developing nations where primitive processing methods cause serious health and pollution problems. CompTIA considers the knowledge of how to properly dispose of old computer equipment, to be an important part of being a certified computer technician. More ...

PC Technician Certifications and Professional Organizations
PC Technician is projected to be among the fastest growing occupations over the 2008 - 2012 period. Entry Level PC Technicians earn $15 per hour on average, experienced PC Technician's earn $30 per hour on average. Many people work as PC Technicians without any formal training or certification. More ...

Network Security Through the Principle of Least Privilege
The Principle of Least Privilege refers to giving users permissions to access only the data and system resources which are required to do their work. Give users full administrative rights to their computers, or data and resources not directly required to do their work significantly increases the risk of the companies critical or confidential information being compromised. More ...

How to Disable Windows Firewall in Windows 7
Windows firewall helps keep your PC protected from unauthorized access, however, in order to install certain programs you may need to disable Windows firewall. More ...

How to Manually Register DLL in Microsoft Windows
A DLL (Dynamic link library) is a file that contains code that can be used by more than one program. A DLL is executed by the calling program. They are not directly executable. In order for the calling program to locate the DLL, it must be registered in windows registry database. More ...


Learn more at amazon.com

Custom Search