• Main Menu
  • Microsoft Windows

    • Blue Screen Stop 0x00000024

      Blue Screen Stop 0x00000024

      Blue Screen Stop 0x00000024 refers to a BSOD (Blue Screen of Death) error message that is displayed whenever there is a conflict with the NTFS.sys file, which is the file responsible for reading and writing to NTFS hard drives. A number of problems can cause this error, with the most common reason being that the

    • Device Driver has corrupted the executive memory pool

      Device Driver has corrupted the executive memory pool

      If you receive an error message which reads: Windows error "Device Driver has corrupted the executive memory pool., it basically means that there is a corruption with a driver somewhere on your system. This issue can occur when an attempt to touch invalid memory at a process IRQL that is too high occurs. This is

    • How to Check Hard Drive Capacity in Windows

      How to Check Hard Drive Capacity in Windows

      Your hard drive is where your computer stores the operating system and most folders and files that it uses. Hard drives have grown in capacity over the years, and as storage capacity has increased so has the amount of data one can store on his or her computer. Knowing not only the capacity of your

    • Managing Exchange Server Mailboxes

      Managing Exchange Server Mailboxes

      Management Tools for Administering Exchange Server The Active Directory Users and Computers Management Console The Active Directory Users and Computers snap-in is extended to support the management of mailbox configurations and settings. The Active Directory Users and Computers management console is the central tool used for creating and managing user account and computer account objects

    • How to Change the Windows Toolbar

      How to Change the Windows Toolbar

      The toolbar is a component of the Graphical User Interface (GUI) that houses various input and output components such as buttons, menus, icons and so on. End-users can customize toolbars as per their personal requirements. Toolbars can be found in operating systems, software applications, and web browsers. The latest development in toolbar interfacing is the

    • IPSec Policies

      IPSec Policies

      IPSec Policies Overview IPSec encrypts data information contained in IP datagrams through encapsulation to provide data integrity, data confidentiality, data origin authentication, and replay protection. The two main IPSec components that are installed when you install IPSec are the IPSec Policy Agent and the IPSec driver. The IPSec Policy Agent is a service running on

    • How to Make a Timeline on Microsoft Word

      How to Make a Timeline on Microsoft Word

      A timeline is a tool used in a visual presentation in order to present data or unique events in a sequential fashion over a defined time frame. In the past, unique programs such as the Adobe or Corel tool suites were the only programs available to individuals capable of creating a professional product. Microsoft Word

    • How to Install a Screensaver in Windows

      How to Install a Screensaver in Windows

      What is a Screensaver? A screensaver is an animated image that is displayed on a PC screen when inactive – once the user’s inactivity has been detected for a certain period of time. Screensavers were originally created to prevent burn-in (i.e. the burning of an image into the phosphor inside the cathode ray tube after hours of

    • Active Directory Operations Masters

      Active Directory Operations Masters

      When a change is made to a domain, the change is replicated across all of the domain controllers in the domain. Some changes, such as those made to the schema, are replicated across all of the domains in the forest. This replication is called multimaster replication. But few changes are practically not possible to perform

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    microsoft-windows
    429 queries in 0.622 seconds.