Menu
Windows System Administration

How to Configure Hyper-V on Windows Server 2019
Hyper-V is a Windows 2019 native hypervisor that it can be used to create virtual machines. There are many different things that you can configure with the Hyper-V console. More ...

Make Windows 10 File Explorer Open to This PC instead of Quick Access
When you open Windows 10 File Explorer, it defaults to Quick Access. If, like me, you prefer to have File Explorer open to This PC or an actual Computer folder, then you can configure it to do so in the Folder Options dialog box. More ...

WSH to Master Your Computer
With Windows 2000 and higher, Microsoft included a program called Windows Scripting Host (WSH) that allows scripts to be run on a computer outside of a webpage. In effect, DOS batch files have returned, except scripts are multi-tasking and have a lot more power. More ...

Recovering an Older Version of a File
The File History utility is used to recover older versions of a file. This feature is part of all backup programs, though it's often called Restore. The idea is to pluck an older version of a file from the backup archive. More ...

CompTIA Security+ Made Easy
As computers gain complexity, so do the malicious attacks used to beat the security systems built to guard those systems. Government employees working in IT are expected to complete the Security+ exam. Many non-government companies are also requiring their employees to receive certification. More ...

Disable Cutesy Effects to Speed Up Windows 10
If you have someone on your butt to be more productive, or you rely on your productivity to earn a living, then to increase your computer's performance (and thereby your performance) you need to get rid of all the cutesy animations, fades, shadows, and slides that Windows performs. More ...

Restrict Web Browsing With Internet Explorer
Regulating web browsing can prevent children (and workers) from accessing dangerous content on the internet, or having to make judgment calls over suitable relationships in chat-rooms. You can block access to unwanted web content. Here's how to do so with a basic Parental Control tool included free with Windows. More ...

How to Harden a Server
By hardening a server, you're making it much more difficult for hacker to launch a successful attack against the system. Thiis artilce describes mthods to harden a server. More ...

Windows 2000 Security Overview
Computer network security is a large topic. You can't configure strong security if you don't have a top-down overview of the security features available and how to configure them. More ...

FreeDOS
FreeDOS is a PC compatible Y2K compliant DOS that you can download from www.freedos.org. Microsoft should have made the expiration period much longer than 30 days. Maybe they want you to activate Windows XP before it crashes. More ...

Disable Kernal Paging to Speed Up Windows
Paging is when the operating system allocates part of the hard disk to be used as virtual RAM. Windows is slowed by paging. You can speed up Windows by configuring it to keep its kernal in RAM. More ...

PC Technician's Guide to Providing Telephone Support
Troubleshooting PC problems over a telephone is a difficult task. Always keep complete support incident documentation. If you can't solve the problem, follow your company's escalation policy. If a problem is taking a long time to solve, try to work out a temporary work-around with the customer so that they can stay in business. By following the steps in this article you'll be able to provide successful telephone technical support. More ...

Top Ten RAID Tips
RAID, a Redundant Array of Inexpensive Disks, is the storage technology which becomes more and more widespread these days. Those who are planning to build a new RAID system would probably find the tips below useful. More ...

Planning a Backup and Restoration of Files for Disaster Recovery
Planning a backup and restoration of files is the most important step to protect data from accidental loss in the event of data deletion or a hard disk failure. The backup copy can be used to restore lost or damaged data. More ...


Learn more at amazon.com

Custom Search