• Main Menu
  • Microsoft Windows

    • How to Turn off User Account Control

      How to Turn off User Account Control

      Microsoft designed the Windows User Account Control and deployed it on the Windows Operating System (OS) in order to prevent unauthorized modifications to critical settings or programs on a computer running the Windows OS. Microsoft deployed User Account Control since Windows XP, and has continued to update the application in newer versions of Windows (such

    • How to Change an Outlook Password

      How to Change an Outlook Password

      The Microsoft Outlook email application is one of the longest supported email clients on the market. In production for more than 15 years, Microsoft engineers continue to add capabilities to the software suite to include a number of information management capabilities such as tracking tasks, Outlook Calendar, and public share folders. End-users are able to

    • Managing Active Directory Performance

      Managing Active Directory Performance

      An Overview on Performance Monitoring and Management Performance monitoring is the process of accurately and consistently measuring performance, so that you can identify any potential bottlenecks which may be impairing the way in which Active Directory performs within your environment. A bottleneck can take place on any Windows subsystem or network component, and occurs when

    • wmiprvse.exe

      wmiprvse.exe

      WMI (Windows Management Instrumentation) is a part of the Microsoft Windows OS. Developers use Windows Management Instrumentation to create applications for event monitoring, the purpose of which is to alert PC users in case of a problem. Scripts and management applications use WMI to execute operations or get data in different languages. Programmers who work

    • Implementing Proxy Server

      Implementing Proxy Server

      Designing a Proxy Server Implementation Before you can design a Proxy Server implementation and install Proxy Server, you need to be knowledgeable on a number of concepts: IP routing concepts Firewalls concepts Packet filtering concepts Files and protocols utilized in Web applications To design a Proxy Server implementation, there are a number of factors that

    • Error 88780078

      Error 88780078

      Error 88780078 may occur on Windows computers when attempting to play audio files. This indicates that there is a bad DirectSound driver on the computer. This error is most commonly associated with using WinAmp to play audio files on Windows XP, Vista, or Windows 7. Though this is the case, other audio players can also

    • Using the Terminal Services Manager Tool

      Using the Terminal Services Manager Tool

      The Terminal Services Manager tool (Tsadmin.exe) is the main administration tool used to manage existing Terminal Services sessions, users, and processes that are connected to or running on the Terminal Services server. The Terminal Services Manager tool can manage one or more Terminal Services servers. The administrative tasks that the Terminal Services Manager tool can

    • Configuring Outbound Internet Access with ISA Server

      Configuring Outbound Internet Access with ISA Server

      Understanding ISA Object Permissions You can assign permissions for a number of ISA Server objects, such as those listed here: ISA server H.323 gatekeeper ISA Server arrays Enterprise polices Sessions Alerts The ISA Management MMC snap-in is used to assign permissions for ISA Server objects. The ISA Management console is the primary tool used to

    • Understanding Internet Connections

      Understanding Internet Connections

      Internet Connectivity Introduction  In most organizations and networks today, Internet connectivity is no longer an additional option, but a necessity. Most organizations that have a networking environment need to provide its employees or users with some form of connectivity to the Internet. E-mail and Web sites have evolved into being important mechanisms for a vast

    • Monitoring and Troubleshooting DNS

      Monitoring and Troubleshooting DNS

      Monitoring DNS with the DNS Console The DNS management console includes functionality that enables you to use the console to monitor DNS activity: Event Logging tab: You can access the Event Logging tab located within the Properties dialog box of the DNS server to specify the DNS events that you want to monitor. Through the

    microsoft-windows
    536 queries in 0.721 seconds.