• Main Menu
  • Microsoft Windows

    • How to Solve Page_Fault_In_Nonpaged_Area in Windows

      How to Solve Page_Fault_In_Nonpaged_Area in Windows

      A page fault is an error known as the “0x50 Stop Error,” which occurs when a computer’s RAM requests a page of memory from the page file and does not receive it. Because the RAM needs the page of memory to continue running its current tasks, the CPU is forced to dump all of its

    • wermgr.exe


      Wermgr.exe (Windows Error Reporting Manager) is a process that runs on the Windows Operating System and is responsible for running the Windows Error Reporting software when Windows crashes. Wermgr.exe is usually encountered when Windows Explorer stops working, in which case the user is presented with a message that says that Windows Explorer has encountered a

    • Understanding Certificate Authorities

      Understanding Certificate Authorities

      An Overview on Certificate Authorities In the Public Key Infrastructure (PKI), digital certificates are based on public key cryptography. The PKI consists of a set of components, policies, protocols, and technologies that provide data authentication, integrity, and confidentiality through the use of certificates, and public and private keys. Data is protected by applying a hashing

    • System Idle Process

      System Idle Process

      The System Idle Process on computers running the Microsoft Windows Operating System (OS) typically displays when it is using more than 90% of the computer’s CPU. This confuses many users as they believe that there is an OS error or more drastically that the computer is infected with malware. In reality, the System Idle Process

    • Using the Terminal Services Configuration Tool

      Using the Terminal Services Configuration Tool

      In order for clients to establish Terminal Services sessions on a server, listener connections have to be configured on the particular server. A listener connection can be configured for only RDP (Remote Data Protocol) over TCP/IP. One listener connection can be configured for a network interface card (NIC) in the Terminal Services computer. The Terminal

    • How to Make a Newspaper on Microsoft Word

      How to Make a Newspaper on Microsoft Word

      Creating a newspaper can be a personal project for a circle of friends and family or a serious project that is meant for publication, distribution, or sale. Whatever the purpose, creating a professional looking newspaper is something for which most newspaper creators strive. Prospective newspaper creators do not need publishing software to pull it off

    • The File Allocation Table (FAT) File Systems

      The File Allocation Table (FAT) File Systems

      Understanding the FAT File Systems The FAT file system was initially introduced with the MS-DOS operating system (OS) when hard disks were generally much smaller, and the structure of folders was not as intricate as it is in networks today. The FAT file system continues to be supported by each Microsoft OS since its advent.

    • Active Directory Objects

      Active Directory Objects

      The Active Directory data store, also referred to as directory, contains data on users, groups, computers, and on which resources these users, groups, and computers can access. It holds all Active Directory information. Each domain controller within a domain holds a readable/writable replica of the Active Directory data store that consists of information pertaining to

    • How to Change the Font Color in Windows Explorer

      How to Change the Font Color in Windows Explorer

      While Windows Explorer is generally easy on the eyes, many computer users like to customize certain aesthetic features on their computer's operating system. One way to do this is to the change the font color in Windows Explorer. Here are some tips. Changing the font colors and even the font in Windows Explorer is extremely

    • Authentication Types

      Authentication Types

      What is Authentication Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is, is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types

    433 queries in 0.419 seconds.