• Main Menu
  • Microsoft Windows

    • IPSec Policies

      IPSec Policies

      IPSec Policies Overview IPSec encrypts data information contained in IP datagrams through encapsulation to provide data integrity, data confidentiality, data origin authentication, and replay protection. The two main IPSec components that are installed when you install IPSec are the IPSec Policy Agent and the IPSec driver. The IPSec Policy Agent is a service running on

    • NTFS File Compression

      NTFS File Compression

      One feature available when you format a volume with the NTFS file system is file compression. NTFS compression can only be applied to a partition or volume that is formatted with the NTFS file system. Through NTFS, you can create additional storage space for files by compressing either single files, or all files in a

    • How to Make Desktop Icons

      How to Make Desktop Icons

      Desktop Icons are some of the necessary files that are required to spice up and personalize folders, shortcuts and programs on your computer.  There are many options available to produce icons from multiple sources including photos, graphics and can even be made from scratch with drawing tools.  There are several free desktop icon makers available

    • How to Recover a Lost Windows Password

      How to Recover a Lost Windows Password

      There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen.

    • mfehidk.sys

      mfehidk.sys

      Mfehidk.sys is a system process that runs in the computer background and maintains the Host Intrusion Detection System for McAfee Anti-virus. It is essentially a real-time shield and detects malicious software as it runs on the computer before it has a chance to cause significant damage. Mfehidk.sys is also known, however, for slowing computers down

    • How to Remove the Concurrent Connections Limit in Windows XP

      How to Remove the Concurrent Connections Limit in Windows XP

      Windows XP introduced the limiting of the number of possible TCP connection attempts to ten per second. This is likely to affect server and P2P programs that constantly need to open as many outbound connections as they can at the same time. The Limitations Many users believe that they should have the option to disable

    • Active Directory Replication

      Active Directory Replication

      The initial Windows NT versions were designed as single master network environments. The primary domain controller (PDC) was responsible for managing the domain database’s master copy. The PDC was therefore responsible for replicating any changes to the backup domain controllers (BDCs). In these environments, any changes had to be performed on the PDC, which then

    • How to Open a TTF File

      How to Open a TTF File

      TTF files are files that used a font developed by Apple in the 1980s to compete with Adobe's Type 1 Fonts. Since then, TTF has become one of the most common fonts for both Mac OS and Windows. However, other fonts have also been used–OpenType and ClearType. Regardless, many computers are able to open TTF

    • Using the Systems Management Server Installer

      Using the Systems Management Server Installer

      Systems Management Server (SMS) Installer Overview SMS Installer can be used to create self-extracting software installation files. These executable files contain the identical files and settings which were created when a specific application was installed. The SMS Installer reproduces all the components required to install the software. This includes an installation script as well, which

    • User Authentication in IIS

      User Authentication in IIS

      Authenticating users in IIS is one of the initial steps in securing IIS. When a user attempts to access a website or an FTP site on an IIS machine, authentication is the process that verifies whether the user can indeed access the site. Authentication and permissions are closely coupled. After a user is authenticated, NTFS

    177 queries in 0.703 seconds.