• Main Menu
  • Microsoft Windows

    • How to Remove IPv6 in Windows

      How to Remove IPv6 in Windows

      IPv6 stands for Internet Protocol version 6. IPv6 is the latest version of the network-layer protocol for packet-switched networks. The version that is generally used is IPv4. One of the reasons for the upgrade to IPv6 is that it allows greater space and flexibility in assigning IP addresses. For instance, IPv4 is based on a

    • What Are Dynamic Disks?

      What Are Dynamic Disks?

      What are Dynamic Disks A dynamic disk refers to a hard drive that can be altered at any time to include additional partitions or volumes. This differs from basic disks that only include standard and extended partitions that are setup when the disk is first formatted. Dynamic disks can handle all of the following volumes.

    • Windows Media Player Error 0xc00d1199

      Windows Media Player Error 0xc00d1199

      Windows Media Player develops a variety of errors when invalid changes are made to the program itself or the computer system in use. The Error code “0xc00d1199 – Cannot Play File” is a common error that occurs for a variety of reasons. Note: Clicking on “More Information” provides details about the error code. Installing Codec

    • Configuring Remote Access Servers

      Configuring Remote Access Servers

      Installing and Configuring RRAS as a VPN Server How to install the Routing and Remote Access Services (RRAS) Click Start, and then click Manage Your Server. Select the Add or remove a role option. The Configure Your Server Wizard starts. On the Preliminary Steps page, click Next. A message appears, informing you that the Configure

    • How to Configure NTFS Quotas

      How to Configure NTFS Quotas

      Use disk quotas to manage storage growth in distributed environments. Disk quotas allow you to allocate available disk space to users based on the files and folders that they own. Windows 2003 disk quotas track and control disk space usage on a per-user, per-partition basis. Characteristics of Windows 2003 Server Disk Quotas Disk usage is

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    • Active Directory Security

      Active Directory Security

      Active Directory security is determined by the following components: * Security groups: A security group is a made up of a set of users, and is created to assign permissions to access resources, and to assign user rights to group members. Permissions control access to resources, while user rights define what actions users can perform.

    • How to Uninstall a Program in Windows

      How to Uninstall a Program in Windows

      Uninstalling a program in any version of Windows is a fairly simple process. There are differences between versions, and here you can find a step by step guide for each specific Windows version: How to Uninstall a Program in Windows 8 1) Hover the mouse over the top right corner. In the menu which pops

    • Why Everything is Bigger in Windows 10 and How to Fix It?

      Why Everything is Bigger in Windows 10 and How to Fix It?

      If you’ve recently moved from older Windows version (such as Windows 7) to Windows 10 and you can’t get used to it, one of the reasons might be that Windows 10 default scaling is set to 125%. Default Windows 10 install has scaling set to 125%. This means everything will be 25% bigger then in

    • How Internet Authentication Service (IAS) works

      How Internet Authentication Service (IAS) works

      Internet Authentication Service (IAS) is Microsoft's implementation of a RADIUS (Remote Authentication Dial-in User Service) server and proxy. As a RADIUS server, IAS performs centralized connection authentication, authorization, and accounting for many types of network access, including wireless and VPN (Virtual Private Network) connections. As a RADIUS proxy, IAS forwards authentication and accounting messages to

    182 queries in 0.745 seconds.