• Main Menu
  • Microsoft Windows

    • Understanding IIS 5.0 and IIS 6.0

      Understanding IIS 5.0 and IIS 6.0

      An Introduction to Internet Information Services (IIS) Microsoft’s integrated Web server, Internet Information Services (IIS) enables you to create and manage Web sites within your organization. It allows you to share and distribute information over the Internet or intranet. With Windows 2000 came Internet Information Services (IIS) 5.0 which was basically the fastest Web server

    • How to Maintain Active Directory

      How to Maintain Active Directory

      Maintaining an Active Directory is a very important administrative task that one must schedule regularly to ensure that, in case of disaster, you can recover your lost or corrupted data and can repair the active directory database. Extensible Storage Engine (ESE) is the active directory database, which manage all the active directory objects in active

    • Registry Hacks for Windows 8

      Registry Hacks for Windows 8

      Registry is a system component of Windows. It stores all the preferences for the Windows operating system. These preferences are saved in a key-value format. The key-value pairs are structured in a hierarchical tree-like format within a Windows registry. They can be navigated and modified. Modifications to these pairs are generally done via programs or

    • Windows Protection Error

      Windows Protection Error

      A Windows Protection Error such as "Initializing device <device name> Windows Protection Error" can be received when either first starting Microsoft Windows or when shutting down your computer. The computer might then ask you restart the system. Windows Protection Errors are usually received by users of Windows 95, 98, and ME and these errors can

    • dllhost.exe


      Dllhost.exe is an essential Windows process that allows executable files to access DLL files that are stored on a computer. A DLL (Dynamic Link Library) file contains source code or parameters for running or communicating with a specific application or device. Because every executable file or program on a computer uses DLL files, Dllhost.exe is

    • ntuser.dat


      An Ntuser.dat file is a Windows Operating System registry file that contains preferences and settings for each user account on a computer. Each user account has its own unique Ntuser.dat file, which Windows references to display the Start Menu, desktop icons and background, Documents folder, browsing history, and other personalized configurations. Ntuser.dat files can be

    • How Do I Make Index Cards in Microsoft Word?

      How Do I Make Index Cards in Microsoft Word?

      One of the better functions of Microsoft Word is the ability to change the layout of the page so that you can create different sized documents. Making index cards in Microsoft Word is very easy and, if your printer is good, they will print and read very good. It is important, though, to get blank

    • Device Driver has corrupted the executive memory pool

      Device Driver has corrupted the executive memory pool

      If you receive an error message which reads: Windows error "Device Driver has corrupted the executive memory pool., it basically means that there is a corruption with a driver somewhere on your system. This issue can occur when an attempt to touch invalid memory at a process IRQL that is too high occurs. This is

    • Tree and Forest in Active Directory

      Tree and Forest in Active Directory

      The Domain is the core unit of logical structure in Active Directory. All objects that share a common directory database and trust relationship with other domain and security policies are known as Domains. Each domain stores information only about the objects that belong to that domain. All security polices and settings, such as administrative rights,

    • Understanding Security Templates

      Understanding Security Templates

      With Windows NT 4.0, came the launch of the System Policy Editor feature which enabled administrators to manage the security settings of the system through a single user interface. The System Policy Editor feature allowed administrators to easily manage configurations of multiple computers because configuration settings could be copied between systems. With the introduction of

    } 261 queries in 0.479 seconds.