• Main Menu
  • Microsoft Windows

    • Configuring and Managing IPSec

      Configuring and Managing IPSec

      IPSec Review IPSec is a framework of open standards for encrypting TCP/IP traffic within networking environments. IPSec works by encrypting the information contained in IP datagrams through encapsulating to provide data integrity, data confidentiality, data origin authentication, and replay protection. IPSec uses cryptography to provide authentication, data integrity, and data confidentiality services. Authentication deals with

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    • Bad_Pool_Header

      Bad_Pool_Header

      One of the most famous fatal errors that occurs on computers running the Windows Operating System (OS) is the Blue Screen of Death (BSOD). A BSOD may be the result of a number of problems including hardware, software, or driver incompatibility with the computer’s OS. The BSOD often prevents users from rebooting their computer or

    • How to Adjust Screen Brightness in Windows

      How to Adjust Screen Brightness in Windows

      Most Windows computer users need to adjust the screen brightness of their laptop or desktop computer monitor at some point. However, brightness settings are different, depending on what you have (desktop or laptop) and which graphic card you have (AMD, nVidia or something else). How to Adjust Screen Brightness on a Desktop Windows computer Regardless

    • Tree and Forest in Active Directory

      Tree and Forest in Active Directory

      The Domain is the core unit of logical structure in Active Directory. All objects that share a common directory database and trust relationship with other domain and security policies are known as Domains. Each domain stores information only about the objects that belong to that domain. All security polices and settings, such as administrative rights,

    • How to Change the Swap File Settings

      How to Change the Swap File Settings

      Prior to revising your Virtual Memory settings, you should check on how much Virtual Memory you would need, based on how much RAM you do have and how memory-intensive your normal applications are. Specifying Virtual Memory Settings The best way to do this is by installing the built-in System Monitor applet from the Add/Remove Program

    308 queries in 0.478 seconds.