Is Your Critical PC Data Adequately Protected From Disaster?
For small businesses or home users protecting and managing disaster scenarios merge the three industrial IT fields of Disaster Recovery, High Availability and Backup. Using best practice from industry and modern desktop PC's with sophisticated hardware and software it's amazing just how much we can do. More ...
Make Windows 10 File Explorer Open to This PC instead of Quick Access
When you open Windows 10 File Explorer, it defaults to Quick Access. If, like me, you prefer to have File Explorer open to This PC or an actual Computer folder, then you can configure it to do so in the Folder Options dialog box. More ...
How to Become a Microsoft MVP (Most Valuable Professional)
A Microsoft MVP (Most Valuable Professional) is an individual who has received an award for outstanding contributions within communities that use Microsoft technologies. Recipients of the Microsoft MVP award are distinguished members of the technical community. More ...
Disable Windows 10 Automatic Updates
Windows 10 is not an operating system in the sense that previous versions of Windows were. It's primarily a marketing device. Automatic Updates are primarily used to bind the operating system tighter to Microsoft's Store. Here's how to disable Windows 10 Automatic Updates. More ...
The Windows 7 Backup and Restore Utility
This is about how to use Windows 7 Backup and Restore Utility. In this Tutorial You'll learn how to recover files from a backup. More ...
WSH to Master Your Computer
With Windows 2000 and higher, Microsoft included a program called Windows Scripting Host (WSH) that allows scripts to be run on a computer outside of a webpage. In effect, DOS batch files have returned, except scripts are multi-tasking and have a lot more power. More ...
Three Important Techniques for Securing a Wireless Network
If you have a wireless network at home or in the office, it is critical to have it secured. Wireless networks are prone to attacks from outsiders - perhaps even more so than with wired networks. This article shows how you can implement three techniques to secure a given wireless network. More ...
Command Line to Get Computer's Numner of CPU Cores
WMIC (Windows Management Interface Command) is a command line tool that returns information about your syste. To learn your computer's numner of CPU cores, type wmic cpu get deviceid,numberofcores,numberoflogicalprocessors at a command prompt. More ...
Uninstall OneNote from Windows 10
Windows 10 comes with many pre-installed apps to sucker you into Microsoft's revenue stream generating OneDrive cloud storage. One of those is OneNote. Here's how to uninstall OneNote. More ...
Planning a Backup and Restoration of Files for Disaster Recovery
Planning a backup and restoration of files is the most important step to protect data from accidental loss in the event of data deletion or a hard disk failure. The backup copy can be used to restore lost or damaged data. More ...
A Day in the Life of a System Administrator
People interested in becoming a computer system administrator or those who are studying for the Microsoft Certified System Engineer (MCSE) exam might not know what a system administrator actually does. More ...
Disable Annoying 'Get Windows 10' Message
You may not want to upgrade to Windows 10 because its search function pushes Windows app store products and tries to trick you into signing up for Microsoft's OneDrive. More ...
How to Create a Bootable USB Drive
A bootable USB flash drive allows you to diagnose hardware issues and can be used to install Windows on your PC. However you first need to create a bootable USB flash drive. More ...
Video Tutorial 3 - The Windows 7 Backup and Restore Utility
This is a series of tutorials about how to use Windows 7 Backup and Restore Utility. In Tutorial 1 you learned how to perform a backup. In Tutorial 2 you learned how to recover files from a backup. In this Tutorial You'll learn how to restore your PC from a system image. More ...
