• Main Menu
  • Microsoft Windows

    • How to Use the Outlook Autodialer

      How to Use the Outlook Autodialer

      If you find that multitasking is a way of life, autodialers can help keep everything under control. In the Microsoft Outlook environment, autodialers become another set of mouse clicks you make as you work through multiple projects simultaneously. In many respects, the question is not how to use an autodialer, but how it can be

    • Windows Protection Error

      Windows Protection Error

      A Windows Protection Error such as "Initializing device <device name> Windows Protection Error" can be received when either first starting Microsoft Windows or when shutting down your computer. The computer might then ask you restart the system. Windows Protection Errors are usually received by users of Windows 95, 98, and ME and these errors can

    • No Audio Device

      No Audio Device

      The no audio device error is commonly encountered on the Windows operating system. The error is normally thrown when the end user upgrades a computing device to a newer version of Windows or after reinstalling the existing version of Windows. When the error is thrown, computer applications that require an audio device will not be

    • What is a GPT Protective Partition?

      What is a GPT Protective Partition?

      A GPT protective partition is a partition on a hard drive that a GUID Partition Table protects. A partition is a continuous area of storage space on a hard drive that is separated from the rest of the hard drive and acts as its own storage device. A GPT protective partition cannot be deleted or

    • How to Delete an Exchange Server Mail Box

      How to Delete an Exchange Server Mail Box

      Deleting a Microsoft Exchange Server mail box is a relatively simple five step process. However, it is important to note that the mailbox will remain connected for thirty days after deletion. This is called the “mailbox retention period,” during which users can reconnect their mailbox if needed. Deleting a mailbox will not permanently remove it

    • Understanding Internet Security and Acceleration Server (ISA Server)

      Understanding Internet Security and Acceleration Server (ISA Server)

      Internet Security and Acceleration Server (ISA Server) Overview Microsoft Internet Security and Acceleration Server (ISA Server) is combination of a firewall and Web caching server that can be used to protect the enterprise from external access, while sharing a internet connection on the network. The multilayer firewall of ISA Server protects valuable network resources of

    • Remote Access Security

      Remote Access Security

      Remote Access Security Overview To protect your corporate data from attacks from intruders and from being accessed by unauthorized users, you need to plan for and implement remote access security. You should authenticate remote access clients attempting to establish a remote connection with the remote access server. To secure connections to the corporate network, you

    • How to Delegate Administrator Privileges in Active Directory

      How to Delegate Administrator Privileges in Active Directory

      The primary reason to create organizational units is to distribute administrative tasks across the organization by delegating administrative control to other administrators. Delegation is especially important when a decentralized administrative model is developed. Delegation of administration is the process of decentralizing the responsibility for managing organizational units from a central administrator to other administrators. The

    • Configuring DHCP

      Configuring DHCP

      Configuring the DHCP Server Environment The primary steps required for configuring and managing your DHCP server environment are: Install the DHCP service on a server. Authorize the DHCP server in Active Directory. Configure the necessary DHCP scopes for your subnets. Configure superscopes and multicast scopes. Configure the DHCP lease duration. Configure the DHCP options. Configure

    • How Does Microsoft Word Password Recovery Work?

      How Does Microsoft Word Password Recovery Work?

      Microsoft Word documents can utilize three passwords: Password to open Password to modify Protect document password   Password to Open   The Password to open requires a user to enter a password to view the document.   When the user sets a Password to open, the entire Microsoft Word document is encrypted with the RC4

    microsoft-windows
    417 queries in 0.787 seconds.