Firewall Rules
Firewall rules allow or block a program through the firewall on your Windows PC. Windows presets a bunch of firewall rules, you create firewall rules, and programs can create rules when they're installed. To view the list of firewall rules, follow these steps. More ...
Environment variables in PowerShell
Environment variables are global settings for your Linux, Mac, or Windows computer, stored for the system shell to use when executing commands. Many are set by default during installation or user creation. More ...
Use Free Autoruns Utility to Disable Unnecessary Startup Programs
Stopping unnecessary programs from starting makes Windows boot faster and frees up system resources. Microsoft sysinternals free Autoruns utility shows you what programs are configured to start at system bootup or login. More ...
Script to Identify Your Systems HAL
The HAL is a crucial module that sits between the Windows operating system and the hardware. Having an incorrect HAL can cause your system to work sluggishly or cause unexplained system lockups. The script provide in this article will identify which HAL was installed on your system. More ...
What is Windows Aero and Mouse Gestures?
Aero is Microsoft's new gimmicky graphical user interface for Windows Visa and Windows 7. Its main feature is the translucent glassy window borders, allowing background objects to be visible through them. Another feature of Aero is mouse gestures. The mouse gestures are Snap, Shake, and Peek. More ...
A Brief Introduction to 3D Printing
Previously, the only ways to create 3D objects was casting and molding. 3D printing involves creating an object by laying down layer over layer of material, building the object from the bottom up. 3d printing is great for rapid prototyping. 3d printing is also a great way for a home artist to express their creativity. More ...
Cortana, Assistant or Spy?
Cortana records everything you do, every keystroke you enter, every syllable you speak. They claim it uses this information to make suggest links to news and web items that she thinks may be interesting to you. If you believe that, I've got a bridge I'd like to sell you. More ...
Command Line to Get Computers Model, Vendor, and Serial Number
WMIC (Windows Management Interface Command) is a command line tool that returns information about your syste. To learn your computers model, vendor, and serial number, type wmic csproduct get name,vendor,identifyingNumber at a command prompt. More ...
Network Security Through the Principle of Least Privilege
The Principle of Least Privilege refers to giving users permissions to access only the data and system resources which are required to do their work. Give users full administrative rights to their computers, or data and resources not directly required to do their work significantly increases the risk of the companies critical or confidential information being compromised. More ...
How to Harden a Server
By hardening a server, you're making it much more difficult for hacker to launch a successful attack against the system. Thiis artilce describes mthods to harden a server. More ...
Use Windows 10 File History Option to Backup Your Personal Files
In Window 10 ,File History regularly backs up versions of your files in the Documents, Music, Pictures, Videos, and Desktop folders and the OneDrive files available offline on your PC. If the originals are lost, damaged, or deleted, you can use File History to restore them. More ...
DOS Switches and Wild Cards
DOS (Disk Operating System) is an interface that a system administrator can use to perform tasks and configure the system by typing text commands. There are many commands available with the DOS command line interface, most of them feature switches, and wild cards which make them very powerful. More ...
Configure Windows 10 to Search Windows Only
Unfortunately, by default Windows 10 taskbar Search is configured to Search the Web and Windows, which first connects to Microsoft's bing search engine and searches Microsoft's Windows Store. More ...
Is Your Critical PC Data Adequately Protected From Disaster?
For small businesses or home users protecting and managing disaster scenarios merge the three industrial IT fields of Disaster Recovery, High Availability and Backup. Using best practice from industry and modern desktop PC's with sophisticated hardware and software it's amazing just how much we can do. More ...
