• Main Menu
  • Microsoft Windows

    • Not a Valid Win32 Application

      Not a Valid Win32 Application

      The Not a valid Win32 application error message may occur in a number of different scenarios. This indicates that an executable file, application, or program is not able to communicate correctly with the Windows API. The error may occur during or after the installation of an application, program, or in certain cases – hardware. The

    • How to Install a Codec in Windows

      How to Install a Codec in Windows

      A codec is a device or program that has the ability to perform encoding and decoding on a digital data stream.Codecs are able to encode and decode files for viewing or editing a stream or signal for transmission, storage or encryption. They are often used in video conferencing and some streaming media applications. This was

    • How to Restore Active Desktop

      How to Restore Active Desktop

      Active Desktop was a feature included in Windows Operating Systems from Windows 95 to Windows Vista. It allowed users to insert HTML data directly into his/her desktop so that applications could be viewed and accessed without visiting a webpage. While Microsoft did not continue this feature in Windows 7, a technology called “desktop widgets” that

    • Deploying Software through Group Policy

      Deploying Software through Group Policy

      When Active Directory was launched in Windows 2000, one of its key design features was to ease the process of deploying software within an organization. To this end, Microsoft included the ability to deploy and distribute software with Group Policy. IntelliMirror technologies include Group Policy software installation to simplify the management necessary for large quantities

    • How to Limit Internet Access in Windows XP User Accounts

      How to Limit Internet Access in Windows XP User Accounts

      User accounts allow Microsoft Windows to differentiate between computer users  in order to determine the rights they should have. Each user account is assigned its own location on the hard disk for file storage. There is a collection of settings pertaining to each account that is stored in the computer’s Registry. Methods for Limiting a

    • Understanding Network Protocols

      Understanding Network Protocols

      A protocol is a collection of specifications or rules for data packets that enable information to be sent over the network. Network protocols are designed for network communication. In order to understand the different protocols available and their efficiencies, lets first look at the Open Systems Interconnection (OSI) reference model. This is the standard model

    • Windows 10: Booting After Changing IDE to AHCI in Bios (Solving the Bluescreen)

      Windows 10: Booting After Changing IDE to AHCI in Bios (Solving the Bluescreen)

      Those who don’t know, AHCI is abbreviation for “Advanced Host Controller Interface”, while IDE stand for “Integrated Drive Electronics”. Both of these are different type of modes, which drives such as hard disk drives or SDD drives use to communicate and speak with the rest of the computer system. AHCI is a much more modern

    • Remote Access Security

      Remote Access Security

      Remote Access Security Overview To protect your corporate data from attacks from intruders and from being accessed by unauthorized users, you need to plan for and implement remote access security. You should authenticate remote access clients attempting to establish a remote connection with the remote access server. To secure connections to the corporate network, you

    • Troubleshooting ISA Server

      Troubleshooting ISA Server

      Tools for Troubleshooting ISA Server There are a variety of tools that you can use to troubleshoot ISA Server. The type of issue would determine which of the tools(s) listed here you need to use: ISA Server Reports tool: You can use the reporting feature included with ISA Server to obtain and view information on

    • Managing Recipient Objects, Address Lists, and Distribution and Administrative Groups

      Managing Recipient Objects, Address Lists, and Distribution and Administrative Groups

      Recipient Objects Overview Active Directory objects such as user accounts, contacts and groups become recipient objects when e-mail address information is added to the object. The public folder is another type of recipient object. A public folder does not however usually have its own an email address. Exchange Server 2003 supports the following types of

    180 queries in 0.848 seconds.