• Main Menu
  • Microsoft Windows

    • Understanding Proxy Server

      Understanding Proxy Server

      Proxy Server Overview Proxy Server enables you to connect the private network or LAN to a public network such as the Internet, by acting as a gateway for internal client computers to the Internet. Proxy Server is a secure gateway which you can use to provide Internet connectivity for IP and IPX based networks. A

    • Troubleshooting Windows Explorer Crashes

      Troubleshooting Windows Explorer Crashes

      Windows Explorer is the Microsoft file management program that has been bundled with all releases of the Windows Operating System (OS) since Windows 95. Explorer provides the user interface or GUI for the end-user to access the computer's files system. The Windows OS can run without Windows Explorer being loaded, however, most Windows users have

    • SSL and IIS

      SSL and IIS

      An Overview on Secure Sockets Layer (SSL) With IIS, you can further secure websites by using the Secure Sockets Layer (SSL) encryption technology. SSL was developed by Netscape Communications, and enables secure communication over the Internet. SSL operates at the transport layer of Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, and uses public key cryptography

    • How to Make a Newspaper on Microsoft Word

      How to Make a Newspaper on Microsoft Word

      Creating a newspaper can be a personal project for a circle of friends and family or a serious project that is meant for publication, distribution, or sale. Whatever the purpose, creating a professional looking newspaper is something for which most newspaper creators strive. Prospective newspaper creators do not need publishing software to pull it off

    • How to Turn Off System Restore

      How to Turn Off System Restore

      System Restore is a feature included in the Windows Operating System that lets the end-user create points that are “known good” which can be restored to in the event of a catastrophic event occurring on the computer. These events can result from a failure or crash of the operating system due to infection by computer

    • How to Recover a Boot Record in Windows?

      How to Recover a Boot Record in Windows?

      MBR – Master Boot Record – or simply Boot Record is the sector located at the beginning of your hard drive. This sector contains crucial information about your hard drive partitions and logical file system. The boot record also stores the first bits of software that the system executes once the BIOS hands control of

    • Using IIS Command-Line Utilities to Manage IIS

      Using IIS Command-Line Utilities to Manage IIS

      The Types of Commands used to Manage IIS from the Command Line The types of commands that manage IIS from the command line are: IISReset, Windows Management Instrumentation (WMI) scripts, Active Directory Services Interface (ADSI), and the standard Windows commands and Support Tools utilities. IISReset Command-line Utility IISReset is a command-line utility that has been

    • Active Directory Security

      Active Directory Security

      Active Directory security is determined by the following components: * Security groups: A security group is a made up of a set of users, and is created to assign permissions to access resources, and to assign user rights to group members. Permissions control access to resources, while user rights define what actions users can perform.

    • msicuu2.exe

      msicuu2.exe

      Msicuu2.exe is the Windows Installer Cleanup Utility process, a program found in many older Windows versions that forcibly uninstalls programs that refuse to be removed through the Windows Control Panel’s Add/Remove feature. While the Windows Installer Cleanup Utility was discontinued in 2010 due to problems associated with Office 2007, many people still use it. Msicuu2.exe

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    microsoft-windows
    } 407 queries in 0.584 seconds.