• Main Menu
  • Microsoft Windows

    • How to Backup Active Directory

      How to Backup Active Directory

      Backing up Active Directory is essential to maintaining an Active Directory database. Users can back up Active Directory with the Graphical User Interface (GUI) and command-line tools that the Windows Server 2003 family provides. Users should frequently backup the system state data on domain controllers so that they can restore the most current data. By

    • DHCP Relay Agents

      DHCP Relay Agents

      The Dynamic Host Configuration Protocol (DHCP) is a service that runs at the application layer of the TCP/IP protocol stack to dynamically assign IP addresses to DHCP clients, and to allocate TCP/IP configuration information to DHCP clients. This includes subnet mask information, default gateway IP addresses, DNS IP addresses, and WINS IP addresses. The DHCP

    • How to Make Desktop Icons

      How to Make Desktop Icons

      Desktop Icons are some of the necessary files that are required to spice up and personalize folders, shortcuts and programs on your computer.  There are many options available to produce icons from multiple sources including photos, graphics and can even be made from scratch with drawing tools.  There are several free desktop icon makers available

    • What is Funcres.xla?

      What is Funcres.xla?

      Funcres.xla is a Microsoft Excel add-in that adds additional features to the software. Funcres.xla (Analysis Toolpak) includes 19 various features and a number of statistical functions that allow the user to correlate data and perform calculations that are not otherwise found in Microsoft Excel. However, Funcres.xla is included in most Microsoft Excel copies and the

    • Group Policy Terminology and Concepts

      Group Policy Terminology and Concepts

      What is Group Policy Group Policy is an Active Directory feature that provides the means for you to effectively and efficiently manage large numbers of computers. You can manage both user and computer configuration settings centrally, from one position of administration. You can define group policies as being a collection of user and computer configuration

    • Device Driver has corrupted the executive memory pool

      Device Driver has corrupted the executive memory pool

      If you receive an error message which reads: Windows error "Device Driver has corrupted the executive memory pool., it basically means that there is a corruption with a driver somewhere on your system. This issue can occur when an attempt to touch invalid memory at a process IRQL that is too high occurs. This is

    • How to Open a TTF File

      How to Open a TTF File

      TTF files are files that used a font developed by Apple in the 1980s to compete with Adobe's Type 1 Fonts. Since then, TTF has become one of the most common fonts for both Mac OS and Windows. However, other fonts have also been used–OpenType and ClearType. Regardless, many computers are able to open TTF

    • Considerations in Planning a Network Infrastructure

      Considerations in Planning a Network Infrastructure

      Defining Network Infrastructure A network can be defined as the grouping of hardware devices and software components which are necessary to connect devices within the organization, and to connect the organization to other organizations and the Internet. Typical hardware components utilized in a networking environment are network interface cards, computers, routers, hubs, switches, printers, and

    • Microsoft PowerPoint Password Recovery

      Microsoft PowerPoint Password Recovery

      Microsoft PowerPoint documents can utilize two passwords: Password to open Password to modify Password to open The Password to open requires a user to enter a password to view the document. When the user sets a Password to open, the entire Microsoft PowerPoint document is encrypted with the RC4 stream cipher. Password to modify The

    • How to Remove IPv6 in Windows

      How to Remove IPv6 in Windows

      IPv6 stands for Internet Protocol version 6. IPv6 is the latest version of the network-layer protocol for packet-switched networks. The version that is generally used is IPv4. One of the reasons for the upgrade to IPv6 is that it allows greater space and flexibility in assigning IP addresses. For instance, IPv4 is based on a

    microsoft-windows
    436 queries in 0.658 seconds.