• Main Menu
  • Microsoft Windows

    • Global Catalog in Active Directory

      Global Catalog in Active Directory

      Domains and Forests can also share resources available in active directory. These resources are searched by Global Catalog across domains and forests and this search is transparent to user. For example, if you make a search for all of the printers in a forest, this search goes to global catalog server for its query and

    • mfehidk.sys

      mfehidk.sys

      Mfehidk.sys is a system process that runs in the computer background and maintains the Host Intrusion Detection System for McAfee Anti-virus. It is essentially a real-time shield and detects malicious software as it runs on the computer before it has a chance to cause significant damage. Mfehidk.sys is also known, however, for slowing computers down

    • How to Solve Page_Fault_In_Nonpaged_Area in Windows

      How to Solve Page_Fault_In_Nonpaged_Area in Windows

      A page fault is an error known as the “0x50 Stop Error,” which occurs when a computer’s RAM requests a page of memory from the page file and does not receive it. Because the RAM needs the page of memory to continue running its current tasks, the CPU is forced to dump all of its

    • Deploying Software through Group Policy

      Deploying Software through Group Policy

      When Active Directory was launched in Windows 2000, one of its key design features was to ease the process of deploying software within an organization. To this end, Microsoft included the ability to deploy and distribute software with Group Policy. IntelliMirror technologies include Group Policy software installation to simplify the management necessary for large quantities

    • How to Rotate the Screen in Windows

      How to Rotate the Screen in Windows

      Rotating a monitor screen has several practical uses. Having a “portrait” screen orientation allows viewers to see entire documents at 100% size and view taller web pages without the need to scroll as much. Additionally, rotated screens take up less space on a desk, especially if they are widescreen monitors. Note: Some monitors are not

    • Considerations in Planning a Network Infrastructure

      Considerations in Planning a Network Infrastructure

      Defining Network Infrastructure A network can be defined as the grouping of hardware devices and software components which are necessary to connect devices within the organization, and to connect the organization to other organizations and the Internet. Typical hardware components utilized in a networking environment are network interface cards, computers, routers, hubs, switches, printers, and

    • How to Setup a Remote Desktop Web Connection

      How to Setup a Remote Desktop Web Connection

      The Remote Desktop Web Connection is a Win32-based ActiveX control (COM object) that can be used to run Remote Desktop sessions from within a browser like Internet Explorer. It is a useful alternative to the regular Remote Desktop because it can be used without installing any software on the client machine. Remote Desktop demands the

    • Installing and Configuring TCP/IP

      Installing and Configuring TCP/IP

      Installing TCP/IP TCP/IP is installed automatically when the Windows Server 2003 setup process runs. It is not usually necessary to install TCP/IP after the Windows Server 2003 setup process completed. The instances when you might need to manually install TCP/IP are listed below: TCP/IP was disabled when the Windows Server 2003 setup process executed. TCP/IP

    • How to Install Fonts

      How to Install Fonts

      Fonts are typefaces that we see on the monitor screen. Arial and Times New Roman are examples of fonts, and they outline the shape of the characters that appear on the screen. A font could be a serif font or a sans serif font and can be used in several different sizes. There are basically

    • Active Directory Groups

      Active Directory Groups

      Groups are containers that contain user and computer objects within them as members. When security permissions are set for a group in the Access Control List on a resource, all members of that group receive those permissions. Domain Groups enable centralized administration in a domain. All domain groups are created on a domain controller. In

    microsoft-windows
    415 queries in 0.645 seconds.