IT tutorials
 
Windows
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 6 of 29, items 151 to 180 of 865.
Setting Up Windows 8 Family Safety (part 7) - Viewing Family Safety Online Reports
A feature available with the Windows 8 Family Safety tool is access to an online Family Safety website. This website includes additional reports about Family Safety settings and allows you to modify Family Safety settings.
Setting Up Windows 8 Family Safety (part 6) - Viewing Family Safety Activity Reports
To see this report, click the View Activity Reports on the User Settings page. Figure 13 shows an example of a report. Notice in the Latest Blocked Pages list that the site called www.bing.com appears.
Setting Up Windows 8 Family Safety (part 5) - Blocking and allowing Apps
With Family Safety, you can control the apps and programs that a user can run on the computer. Clicking App Restrictions on the User Settings page displays the App Restrictions page.
Setting Up Windows 8 Family Safety (part 4) - Controlling Windows Store and game play
ESRB stands for Entertainment Software Rating Board, an independent third party that rates games for age appropriateness and specific content. The ratings are similar to movie ratings, but specific to computer games.
Setting Up Windows 8 Family Safety (part 3) - Setting time limits
To specify times when the child is allowed to use the computer, click Time Limits on the User Settings page (see Figure 2 to see what the User Settings page looks like). The Time Limits page opens, which is shown in Figure 6.
Setting Up Windows 8 Family Safety (part 2) - Setting Web Filtering
To control which websites a child can view, click the Web Filtering link. You can allow or block access to specific websites, or specify that Windows should block web content automatically.
Setting Up Windows 8 Family Safety (part 1) - Getting to the Family Safety page
To activate Family Safety for the account, choose On, Enforce Current Settings under the Family Safety heading. After you turn on these parental controls, you can choose which controls to apply for the selected user.
Windows 8 : Sharing and Securing with User Accounts - Managing Profile Properties and Environment Variables
From the earliest days of DOS, the PC operating system we old computer geeks used before Windows came along, environment variables have been used to store information used by the operating system.
Windows 8 : Sharing and Securing with User Accounts - Using Credential Manager
Credential Manager (see Figure 1) enables you to manage your usernames and their associated passwords (collectively called credentials) for servers, websites, and programs.
Windows 8 : Sharing and Securing with User Accounts - Add the Built-in Administrator Account to the Login Screen , Stop Entering Password on Lockout
The built-in Administrator account is intentionally hidden to discourage users who don’t have sufficient knowledge to understand the risks involved in using such an account.
Windows Server 2012 : Hyper-V - Performance and Virtual Network Management - Resource Metering
Resource metering is a new feature that gives you information on the CPU, memory, storage, and network resources that a VM is consuming. Consider it a Performance Monitor for virtualization.
Windows Server 2012 : Hyper-V - Managing Virtual Machines and Virtual Disks (part 3) - Cloning Virtual Domain Controllers, Merging Snapshots
While cloning virtualized domain controllers is nothing new in Windows Server, Server 2012 does deliver improvements that make cloning DCs easier.
Windows Server 2012 : Hyper-V - Managing Virtual Machines and Virtual Disks (part 2) - Hyper-V Replica
Hyper-V Replica is a new feature in Server 2012 that allows for the asynchronous replication of VMs (a fancy way of stating that you are replicating a VM from one host machine to another), which is great for times when you are having issues with a host.
Windows Server 2012 : Hyper-V - Managing Virtual Machines and Virtual Disks (part 1) - Live-Migrating Virtual Machines
Hyper-V R3 marks a big improvement with live migration—that is, moving VMs from one physical host to another without downtime. That improvement is the ability to migrate VMs without shared storage or having both hosts in a cluster, either of which is required for live migration in Windows Server 2008 R2.
Windows Server 2012 : Hyper-V - Creating and Configuring Virtual Machines (part 2) - Creating Virtual Machines
Memory configuration has a big impact on Hyper-V performance. With dynamic memory, VMs that require more memory are allocated memory resources from VMs that require less, such as those in an idle state.
Windows Server 2012 : Hyper-V - Creating and Configuring Virtual Machines (part 1) - Configuring Virtual Disks
Hyper-V R3 uses a new file format for virtual hard disks: .VHDX. In Server 2008 R2, the file format is .VHD. VHDX supports virtual hard disk storage capacity up to 64 TB (VHD supports up to 2 TB).
Windows Server 2012 : Hyper-V - Installing the Hyper-V Role
CredSSP and Kerberos are both SSPIs (security support provider interfaces) used for authentication in Windows environments. Most Windows, Active Directory–based infrastructures use Kerberos.
Windows 8 : Sharing and Securing with User Accounts - Creating and Using Password Reset Disks, Running Programs as Administrator
A password reset disk is an important part of any password-protected PC. It’s the only method of password recovery that allows you to retain all data in an account in the event of a forgotten password.
Windows 8 : Sharing and Securing with User Accounts - Using User Accounts (part 2) - Turning UAC on and off
If at all possible, you should follow standard best practices and keep UAC active on your own computer. But if it proves to be impractical, you can turn off UAC.
Windows 8 : Sharing and Securing with User Accounts - Using User Accounts (part 1) - Understanding User Account Control
User Account Control (UAC) is the general term for the way administrative and standard user accounts work in Windows 8. As you browse around through various pages in the Control Panel, you’ll notice that many links have a shield icon next to them.
Windows 8 : Sharing and Securing with User Accounts - Deleting User Accounts
An administrator can easily delete user accounts. If nobody has ever used a user account, then deleting the account is no big deal. But if someone has used the account, the decision to delete it is more complicated.
Windows Server 2012 : Business continuity for virtualized workloads (part 2) - Guidance on configuring the Hyper-V Replica Broker cluster resource
Customers who have tested Hyper-V Replica in my Enterprise Engineering Center (EEC) lab at Microsoft have often been confused by the following issue.
Windows Server 2012 : Business continuity for virtualized workloads (part 1) - Implementing Hyper-V Replica
Hyper-V Replica can be enabled, configured, and managed from either the GUI or by using PowerShell. Let’s briefly look at how to enable replication of a VM by using Hyper-V Manager.
Windows 8 : Sharing and Securing with User Accounts - Creating and Managing User Accounts (part 6) - Navigating through user account pages
In Windows 8, user account management involves using two environments, including the Control Panel and PC Settings page. You can use the Control Panel to complete almost all user account tasks, even those that use the new PC Settings page.
Windows 8 : Sharing and Securing with User Accounts - Creating and Managing User Accounts (part 5) - Changing the account picture
Every user account has an associated picture. The picture is like an icon, giving you a quick visual reference without having to read the name. The picture you choose can be any one of several built-in pictures or it can be a picture of your own choosing.
Windows 8 : Sharing and Securing with User Accounts - Creating and Managing User Accounts (part 4) - Changing a user account type , Password-protecting an account
You have the option to set up local accounts without password protection (Microsoft accounts require passwords). If you share your computer with other people, chances are you’ll want to keep some people out of the Administrator account.
Windows 8 : Sharing and Securing with User Accounts - Creating and Managing User Accounts (part 3) - Creating a new e-mail address for a new user account
If you do not have an e-mail address, you can set one up as you create a new Microsoft user account. To do this, click Add A User Account at the Manage Accounts page and then click the Sign Up For A New Email Address link on the Add A User page (see Figure 3 for this link).
Windows 8 : Sharing and Securing with User Accounts - Creating and Managing User Accounts (part 2) - Creating a Microsoft user account
Creating a new Microsoft user account is easy. You should have one standard account for your day-to-day computing, plus one standard account for every other person who will use your computer. Microsoft accounts require passwords, so you must set up a password when you create a new Microsoft account.
Windows 8 : Sharing and Securing with User Accounts - Creating and Managing User Accounts (part 1)
The best way to handle user accounts is for one person to play the role of administrator, even if that person isn’t a professional. In a home environment, it would most likely be a parent who needs to define parental controls. It’s best to log in to a user account that already has administrative privileges to get started.
Windows 8 : Sharing and Securing with User Accounts - Types of User Accounts
Windows 8 offers four basic types of user accounts: the built-in Administrator account, user accounts with administrative privileges, standard accounts, and a Guest account. They vary in how much privilege they grant to the person using the account.
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us