• Main Menu
  • Microsoft Windows

    • How to Fix a “Cannot Find Server or DNS” Error

      How to Fix a “Cannot Find Server or DNS” Error

      A server is a computer that ‘serves’ the network that it is connected to. It performs functions that are useful to the network. For example, there are file servers that store data and print servers that handle the network printing jobs. Businesses and other institutions often use servers to store important, possibly confidential, information and

    • How to Uninstall Vista

      How to Uninstall Vista

      Although Vista is the most recent and technologically advanced operating system available from Microsoft, many users still consider Windows XP or other operating systems more stable. One of the reasons that many end users who have Windows Vista loaded onto their computer want to uninstall it is that many computers just are not powerful enough

    • Error 1603

      Error 1603

      When installing software that is packaged with the Windows Installer, users may get an error 1603. The actual error message that displays is “error 1603: A fatal error occurred during installation.” There are a few things that cause this to occur. Windows Installer and Encrypted Folders Users cannot install software packaged in the Windows Installer

    • How to Find a Windows Product Key

      How to Find a Windows Product Key

      If you want to install or reinstall any version of the Windows operating system (XP, Vista, 7, 8) on your computer, you will need your Windows Product Key. This key is a security tool designed to stop counterfeiting and software piracy. If the user purchased his/her computer from an OEM (Original Equipment Manufacturer) such as

    • Managing the DHCP Server

      Managing the DHCP Server

      Management Tasks for the DHCP Server The common management tasks that you need to perform for your DHCP servers are listed below: Delegate DHCPadministration to individuals. View and analyze DHCPstatistical information. Change the status of the DHCP service. Configure superscopeadministration entities. Back up the DHCPserver database. Restore the DHCPserver database. Repair a corruptedDHCP server database.

    • How to Delete an Exchange Server Mail Box

      How to Delete an Exchange Server Mail Box

      Deleting a Microsoft Exchange Server mail box is a relatively simple five step process. However, it is important to note that the mailbox will remain connected for thirty days after deletion. This is called the “mailbox retention period,” during which users can reconnect their mailbox if needed. Deleting a mailbox will not permanently remove it

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    • Designing Network Infrastructure Security

      Designing Network Infrastructure Security

      Network Infrastructure Security Overview Network infrastructure refers to the grouping of physical hardware and logical components which are needed to provide a number of features for the network, such as connectivity, routing and switching capabilities, network security, and access control. The physical infrastructure of the network refers to the physical design of the network together

    • How to Use the Outlook Autodialer

      How to Use the Outlook Autodialer

      If you find that multitasking is a way of life, autodialers can help keep everything under control. In the Microsoft Outlook environment, autodialers become another set of mouse clicks you make as you work through multiple projects simultaneously. In many respects, the question is not how to use an autodialer, but how it can be

    • Understanding and Designing a Public Key Infrastructure

      Understanding and Designing a Public Key Infrastructure

      An Introduction to the Public Key Infrastructure (PKI) It has grown more important to ensure the confidentiality and integrity for data communication where an organization's network contains intranets, extranets, and Internet Web sites. Because of the connectivity of networks today, an organization's network is exposed to unauthorized users who could possibly attempt to access and

    118 queries in 0.422 seconds.