• Main Menu
  • Microsoft Windows

    • What is a Hackintosh?

      What is a Hackintosh?

      Hackintosh is a hacked PC that runs on MAC OS X OS (“Lion”, “Snow Leopard” , “Leopard”).  At first, a lot of people thought that this was impossible to run MAC OS on a non-MAC hardware because of the different software, drivers, and utilities being used between the two. It all started when Apple decided

    • Designing Network Infrastructure Security

      Designing Network Infrastructure Security

      Network Infrastructure Security Overview Network infrastructure refers to the grouping of physical hardware and logical components which are needed to provide a number of features for the network, such as connectivity, routing and switching capabilities, network security, and access control. The physical infrastructure of the network refers to the physical design of the network together

    • How to Remove Alphabet Letters in Windows 10 Start Menu?

      How to Remove Alphabet Letters in Windows 10 Start Menu?

      One of the most annoying things in the Windows 10 Start Menu are the “alphabet letters” which are apparently intended to speed up your app search and choices. People across the Internet are constantly asking how to remove these and the answer is YOU CAN’T, at least not without a third-party apps. Alphabet letters in

    • How to Move, Rearrange, Add or Delete Tiles in Windows 8

      How to Move, Rearrange, Add or Delete Tiles in Windows 8

      Windows 8 introduced a revamped Start screen replacing the conventional Start Menu from previous versions of Windows. The new Start is built and designed on Metro UI. It makes use of square-shaped tiles which link to applications or act as widgets to show information. These tiles are flexible. They can be  moved around, rearranged, modified,

    • How to Delete the Operating System from a Computer

      How to Delete the Operating System from a Computer

      The first thing anyone should do when deleting an operating system from a computer, is backup the computer’s contents. This is because deleting the operating system involves deleting the partition of the hard drive that is located on, causing all data to be lost. The user can backup his/her files by going to My Computer, copying

    • Controlling Bandwidth Usage in ISA Server

      Controlling Bandwidth Usage in ISA Server

      Bandwidth Usage in ISA Server Network performance can depreciate because of a number of issues. With ISA Server, you can use bandwidth priorities and bandwidth rules to set propriety levels for traffic. Effective bandwidth is the terminology used to describe the data transfer rate available to clients through dial-up connections or dedicated Internet connections. Bandwidth

    • How to Clean the Registry

      How to Clean the Registry

      The longer a computer is used, the more cluttered the registry can become because most applications these days do not remove all traces of themselves when deleted. This can slow Windows’ performance. So it is essential to know how to clean the Windows registry to speed up the PC’s performance. Cleaning it up effectively is

    • The VPN Gateway

      The VPN Gateway

      Virtual Private Networks (VPNs) enable users to connect to a remote private network through the Internet. Virtual private networks therefore span the Internet because the user connects over the Internet to the remote VPN server. With a VPN, data is first encrypted and encapsulated before it is sent to the remote VPN server. When the

    • Securing Remote Access and VPN Servers

      Securing Remote Access and VPN Servers

      Remote Access and VPN Server Security Issues Remote Access Servers (RAS) provides access to the network for remote users. The different types of remote access connections are Dial-in remote access, VPN remote access, and Wireless remote access. Dial-in remote access uses modems, servers running the Routing and Remote Access (RRAS) service, and the Point-to-Point (PPP)

    • How to Unprotect an Excel Sheet

      How to Unprotect an Excel Sheet

      Unprotecting an Excel sheet is surprisingly easy. If your Excel sheet is password protected and you do not know the password, there is no way that you can unprotect the sheet in that particular workbook – but you can create a new workbook which will contain exactly the same formulas, formatting and values that will

    124 queries in 0.444 seconds.