• Main Menu
    • Troubleshooting Active Directory Availability

      Troubleshooting Active Directory Availability

      As an Administrator, ensuring the availability and reliability of the Windows Server Active Directory directory service is extremely important if you are running Active Directory within your environment. Performance problems and poor availability leads to users being unable to perform their tasks or duties within the organization. For instance, when a DNS server fails, it

    • What is a Database?

      What is a Database?

      One of the technology terms that most people have become accustomed to hearing either at work or while surfing the Internet is the database. The database used to be an extremely technical term, however with the rise of computer systems and information technology throughout our culture, the database has become a household term. A database

    • What is Twitter and How Does It Work?

      What is Twitter and How Does It Work?

      Twitter is a social networking site that relies on micro-blogging for communication. By typing short, 140 character messages users can communicate with their followers and get information spread around. Since its inception, Twitter has grown and turned into a massive site used by main stream media as well as average individuals to communicate about important

    • Broadband over Power Lines

      Broadband over Power Lines

      Broadband over Power Lines, or BPL, refers to the transmission (sending and receiving) of digital data through existing power cables and electricity distribution infrastructures. This can be viewed as a mere variation on using television cables; instead of using television cables, though, power transmission lines are going to be used. The Broadband over Power Lines

    • How to Turn off User Account Control

      How to Turn off User Account Control

      Microsoft designed the Windows User Account Control and deployed it on the Windows Operating System (OS) in order to prevent unauthorized modifications to critical settings or programs on a computer running the Windows OS. Microsoft deployed User Account Control since Windows XP, and has continued to update the application in newer versions of Windows (such

    • How to Add a User to Windows

      How to Add a User to Windows

      The Microsoft Windows operating system (OS) is one of the most popular OSs in the world. Although the company releases a new OS every three to four years (sometimes a bit faster), there are a number of common tasks that extend across software versions; albeit, the specific steps required to accomplish the task may differ

    • How to Clean Porn from a Computer

      How to Clean Porn from a Computer

      Virtually every computer in the world has some form of adult pornography stored somewhere on its hard drive. This can be due to personal use, viruses, or the fact that pornography seems to be included with every downloaded file, opened webpage, and email attachment. Pornography can also be a concern when many people have access

    • How to Unlock MySpace

      How to Unlock MySpace

      There are two common reasons why MySpace members need to unlock MySpace. Either they have forgotten their MySpace password or their access to MySpace has been blocked by a web content filter such as WebSense. Both problems are easily remedied. Resetting Your MySpace Password If you are locked out of MySpace because you lost your

    • How Do Speed Traps Work?

      How Do Speed Traps Work?

      A common law enforcement practice known as "speed traps" or "speed trapping" is based on one universal factor: Almost everyone speeds. Everyone has their reasons but most people speed on occasion just because they can. While this excessive acceleration is usually harmless as drivers have enough time to slow down during emergencies, many fatal car

    • GPG (GNU Privacy Guard)

      GPG (GNU Privacy Guard)

      GPG, or GNU Privacy Guard, is a free replacement and competing product for PGP (Pretty Good Privacy). The project is a data encryption and decryption application which provides end-users with a cryptographic privacy and authentication system for communicating electronic data. GPG can be used to sign, encrypt, and decrypt text, for email, files, directories, and

    174 queries in 0.746 seconds.