• Main Menu
  • Microsoft Windows

    • How to Fix the Unmountable Boot Volume Error Message in Windows XP

      How to Fix the Unmountable Boot Volume Error Message in Windows XP

      A common error that occurs with the Windows XP operating system (OS) that results in a system crash is the unmountable boot volume error message. When this error occurs, it is an indication that the OS is having difficulty starting or booting from the computer’s “C” drive. Due to the Windows XP OS’s maturity, the

    • How to Print the Windows Task Manager

      How to Print the Windows Task Manager

      Task Manager is a small application that usually comes standard with MS Window operating systems such as XP and Vista. The program can give you current information regarding many aspects of your computer including computer performance, processes, network activity, applications currently running, logged in users, and system services. The Task Manager can also help terminate

    • Understanding DNS Queries and Lookups

      Understanding DNS Queries and Lookups

      DNS Queries Overview The naming system used by DNS is a hierarchical namespace, called the DNS namespace. The DNS namespace has a unique root. The root can contain numerous subdomains. Each subdomain also can contain multiple subdomains. Each domain registered in DNS is connected to a DNS name server. The DNS server of a domain

    • Understanding and Implementing Smart Card Authentication

      Understanding and Implementing Smart Card Authentication

      An Overview on Authentication and Smart Cards Administrators have to secure the network from attacks launched by hackers, spies, terrorists, thieves and criminals. Security encompasses numerous technologies, protocols, standards, policies, passwords, and secret keys. All these mechanisms typically focus on the following: Authentication Access Control Data Protection Auditing/Accountability Authentication is the process by which an

    • How to Turn the Screensaver Off in Windows?

      How to Turn the Screensaver Off in Windows?

      Quick jump: Turning Off the Screensaver in Windows XP Turning Off the Screensaver in Windows Vista Turning Off the Screensaver in Windows 7 Turning Off the Screensaver in the Windows 8?   At the beginning of the computer age, screensavers were applications designed to protect monitors from the phosphor burn-in on CRT and plasma displays, and that’s how they got this

    • How to Import Data in Excel

      How to Import Data in Excel

      Importing data to MS Excel is the process of transferring data from other database sources and converting it into .xls format. This process eliminates the need to manually enter every item into a new Excel worksheet. Importing data therefore saves the user a lot of time and reduces human error. The source data is called

    • Physical Structure of Active Directory

      Physical Structure of Active Directory

      In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when and where logon and replication traffic occurs. The physical structure of Active Directory contains all the physical subnets present in your network like domain controllers and replication between domain controllers. The physical structure of Active Directory: Domain Controllers:

    • wmiprvse.exe

      wmiprvse.exe

      WMI (Windows Management Instrumentation) is a part of the Microsoft Windows OS. Developers use Windows Management Instrumentation to create applications for event monitoring, the purpose of which is to alert PC users in case of a problem. Scripts and management applications use WMI to execute operations or get data in different languages. Programmers who work

    • Understanding the Microsoft Model

      Understanding the Microsoft Model

      Microsoft Model Overview Before Windows NT 3.1 was released, users had to obtain the TCP/IP protocol suite from a third party, and then install it. This was necessary for users to connect to the network, which in turn usually resulted in a number of issues. When it came to network communication, the TCP/IP software which

    • Remote Access Security

      Remote Access Security

      Remote Access Security Overview To protect your corporate data from attacks from intruders and from being accessed by unauthorized users, you need to plan for and implement remote access security. You should authenticate remote access clients attempting to establish a remote connection with the remote access server. To secure connections to the corporate network, you

    microsoft-windows
    442 queries in 0.670 seconds.