• Main Menu
  • Microsoft Windows

    • Understanding Volume Shadow Copies

      Understanding Volume Shadow Copies

      Volume Shadow Copies Overview Volume shadow copies, a new Windows Server 2003 feature, are used to create copies of files at a specific point in time, or set time interval. Shadow copies can only be created on NTFS volumes to create automatic backups of files or data per volume. When enabled, the Shadow copies feature

    • How to Fix the ORA-12560 TNS Protocol Adapter Error

      How to Fix the ORA-12560 TNS Protocol Adapter Error

      Oracle is a free, open business management software available for both personal and commercial use. Oracle allows users to process credit card payments, handle customer support, and manage customer orders from one location and includes many additional features from third party companies, such as Paypal and Amazon, that allow users to sell products in a

    • Remote Server Management

      Remote Server Management

      An Overview on Remote Server Management In enterprises that need a secure environment; servers and desktops are usually managed remotely. Administration is hardly performed by logging on to the local console. Remote management or administration is not a new notion, and is used largely to manage servers and desktops. Windows Server 2003 includes a few

    • Managing the IIS Metabase

      Managing the IIS Metabase

      An Overview of the IIS Metabase With the introduction of IIS 4, came the introduction of the metabase. IIS configuration information was no longer stored in the Registry, but in the new metabase structure. Some IIS configuration settings however still remained stored in the Registry, under the following keys: HKLMSOFTWAREMicrosoftInetMgrParameters HKLMSYSTEMCurrentControlSetServicesInetInfoParameters HKLMSYSTEMCurrentControlSetServicesASPParameters HKLMSYSTEMCurrentControlSetServicesHttpParametersLogBufferSize HKLMSYSTEMCurrentControlSetServicesW3SVCParameters HKLMSYSTEMCurrentControlSetServicesMSFTPSVCParameters

    • Microsoft PowerPoint Password Recovery

      Microsoft PowerPoint Password Recovery

      Microsoft PowerPoint documents can utilize two passwords: Password to open Password to modify Password to open The Password to open requires a user to enter a password to view the document. When the user sets a Password to open, the entire Microsoft PowerPoint document is encrypted with the RC4 stream cipher. Password to modify The

    • Microsoft Excel Password Recovery

      Microsoft Excel Password Recovery

      Microsoft Excel documents can utilize three passwords: Password to open Password to modify Protect sheet or Protect workbook Password to Open The Password to open requires a user to enter a password to view the document. When the user sets a Password to open, the entire Microsoft Excel document is encrypted with the RC4 stream

    • What is Funcres.xla?

      What is Funcres.xla?

      Funcres.xla is a Microsoft Excel add-in that adds additional features to the software. Funcres.xla (Analysis Toolpak) includes 19 various features and a number of statistical functions that allow the user to correlate data and perform calculations that are not otherwise found in Microsoft Excel. However, Funcres.xla is included in most Microsoft Excel copies and the

    • Publishing Resources in Active Directory

      Publishing Resources in Active Directory

      What Resources can be published in Active Directory When you make Active Directory objects available to users, you are publishing the Active Directory resource. The resources that can be published in Active Directory include the Active Directory resources listed below: User objects Computer objects Printer objects Folders and files Network services The two primary published

    • How to Scan Disk

      How to Scan Disk

      Scan Disk is one of the most common maintenance tools bundled with an operating system such as Windows. This is an application that checks the computer’s hard drive for errors and bad sectors. Once Scan Disk finds an error in the hard drive, it will attempt to fix it. There are a number of reasons

    • Understanding the Department of Defense Network Model

      Understanding the Department of Defense Network Model

      Department of Defense Network (DoD) Network Model Introduction Back in 1960, systems were primarily made up of mainframe computers, and were typically owned by fairly large companies and government institutions. Because mainframe computers run different proprietary software, and due to mainframes not being able to communicate between each other, special code (interface) had to be

    microsoft-windows
    439 queries in 0.703 seconds.