• Main Menu
  • Microsoft Windows

    • Active Directory Organizational Units

      Active Directory Organizational Units

      An object is a set of attributes that represents a network resource, say a user, a computer, a group policy, etc and object attributes are characteristics of that object stored in the directory. For example, some of the attributes of a user object might include the user's first name, last name, department, and e-mail address

    • How to Fix Error 0x80070570 in Windows 7

      How to Fix Error 0x80070570 in Windows 7

      When trying to upgrade a computer running an older version of Windows to Windows 7, end-users can encounter the 0×80070570 error. When the error is thrown, Windows will only notify the user that the installer is not able to install the files required to upgrade the computer preventing further progress from being made with the

    • How to Solve “Windows Installer Service Could not be Accessed”

      How to Solve “Windows Installer Service Could not be Accessed”

      Windows Installer is a very important component of all Windows operating systems. It installs, uninstalls, and supports applications and software. If the Windows Installer is corrupted or the service stops for an unknown reason, an error message comes up. The error message typically appears as: “The Windows Installer Service could not be accessed. This can

    • DHCP Leasing

      DHCP Leasing

      An Overview of DHCP In TCP/IP based networks, a unique IP address must be assigned to each computer. An IP address is a unique numeric identifier that identifies computers on the network. The Dynamic Host Configuration Protocol (DHCP) is a service that can be implemented to automatically assign unique IP addresses to DHCP clients. DHCP

    • Implementing Proxy Server

      Implementing Proxy Server

      Designing a Proxy Server Implementation Before you can design a Proxy Server implementation and install Proxy Server, you need to be knowledgeable on a number of concepts: IP routing concepts Firewalls concepts Packet filtering concepts Files and protocols utilized in Web applications To design a Proxy Server implementation, there are a number of factors that

    • TCP/IP

      TCP/IP

      Understanding the Function of Protocols Protocols are rules, standards and procedures that enable information to be communicated in the network environment. The rules and standards that control the way in which computers communicate are referred to as protocols. A few relevant factors to consider when discussing protocols and the network environment are: There are numerous

    • Configuring Outbound Internet Access with ISA Server

      Configuring Outbound Internet Access with ISA Server

      Understanding ISA Object Permissions You can assign permissions for a number of ISA Server objects, such as those listed here: ISA server H.323 gatekeeper ISA Server arrays Enterprise polices Sessions Alerts The ISA Management MMC snap-in is used to assign permissions for ISA Server objects. The ISA Management console is the primary tool used to

    • Blue Screen Stop 0x00000024

      Blue Screen Stop 0x00000024

      Blue Screen Stop 0x00000024 refers to a BSOD (Blue Screen of Death) error message that is displayed whenever there is a conflict with the NTFS.sys file, which is the file responsible for reading and writing to NTFS hard drives. A number of problems can cause this error, with the most common reason being that the

    • Compile Error in Hidden Module

      Compile Error in Hidden Module

      When starting up Microsoft Word or Excel (or other Office products), the “Compile Error in Hidden Module” issue may arise. Starting up the program will prompt the error message to appear and display one of the following or a similar message:   Compile error in hidden module: AutoExec Compile error in hidden module: AutoExecNew Compile

    • mfefire.exe

      mfefire.exe

      Mfefire.exe is McAfee Anti-virus Firewall Service’s process. The McAfee Firewall prevents malicious programs from installing themselves or third party components on the computer. Mfefire.exe is not a system process, but is required to run the McAfee Firewall. Mfefire.exe generally runs on the Windows Operating System and can be found in the primary hard drive’s Program

    microsoft-windows
    466 queries in 0.618 seconds.