IT tutorials
 
Windows
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 16 of 29, items 451 to 480 of 865.
Windows Vista : Working with Digital Media - Digital Audio in Windows Vista
The Volume Control tool in previous versions of Windows is a good example of poor audio system design. When you opened Volume Control, you were presented with a series of volume sliders labeled Master, Wave, Line In, CD Player, Synthesizer, Aux, and more.
Windows Vista : Working with Digital Media - Setting AutoPlay Defaults
The AutoPlay feature dictates the program that runs automatically when you insert removable media into a slot in the computer. We’ve had AutoPlay for CDs since Windows 95, and Windows XP added AutoPlay support for most types of removable media, including DVDs, flash drives, and memory cards.
Windows 7 : Editing the Registry - Using Regedit (part 3) - Editing Registry Entries for Another Windows Installation, Editing Registry Security
If you need to retrieve Registry entries from an installation of Windows installed on another hard disk or partition, you can load any of that installation’s hive files for editing or exporting.
Windows 7 : Editing the Registry - Using Regedit (part 2) - Editing Keys and Values, Editing Registry Entries for Another User
Regedit has no Save or Undo menu items. Changes to the Registry happen immediately and permanently. Additions, deletions, and changes are for real. This is the reason for all the warnings to back up before you poke into the Registry.
Windows 7 : Editing the Registry - Using Regedit (part 1) - Viewing the Registry
The reason for these complicated variations is that malicious programs and email attachments can easily abuse the Registry Editor, so it’s subject to UAC restrictions.
Windows Server 2008 : Basic Rules When Using the Command Prompt - Understanding Paths, Using Basic Commands, Redirecting Output to Files
You might notice that the command is notepad, but the path to notepad is not needed when it is executed. Notepad is located in the c:\windows folder and Windows Server 2008 is already aware of this path.
Windows Server 2008 : Basic Rules When Using the Command Prompt - Understanding Wildcards, Getting Help
The command prompt includes a lot of built-in help if you know how to use it. For example, if you enter just Help, you’ll get a list of commands that you can enter at the command line. The following table shows some of these commands.
Windows Small Business Server 2011 : Windows Storage Server 2008 R2 Essentials (part 2) - Connecting to Windows Storage Server 2008 R2 Essentials
You must run the Windows Storage Server 2008 R2 Essentials Connector on each client computer that will use WSSE for backup. This connector configures the client computer backup settings and also installs a Launchpad application on the client computer.
Windows Small Business Server 2011 : Windows Storage Server 2008 R2 Essentials (part 1) - Connecting Windows Storage Server Essentials to the SBS Domain
The first requirement for adding a WSSE server to your SBS network, after you get it up and running, is to configure WSSE to be a domain member. Before you can do this, however, you should create a special security group of SBS users who are allowed to connect to the WSSE server.
Windows Small Business Server 2011 : Using the Command Line to Manage Backups
There are two ways to do backups from the command line—using Windows PowerShell or using the Wbadmin command. Personally, we much prefer using Windows PowerShell for everything we can, but there are limitations here.
Windows 8 : Security - Securing Internet Explorer
Browsers are particularly troublesome programs from a security perspective because, if you let them, they allow people on the outside to run programs inside your computer.
Windows 8 : Security - Encrypting File System
Encrypting File System (EFS) allows you to encrypt data that is stored on drives on a file-by-file and folder-by-folder basis. Data in an encrypted file cannot be read without supplying the correct encryption key.
Windows 8 : Security - BitLocker Drive Encryption
Use the BitLocker to Go feature to protect data files stored on removable devices such as external hard drives or USB flash drives. This feature is available only on Windows 8 Enterprise.
Windows Vista : Deployment Platform - Basic Deployment Process, BDD 2007 Deployment Process
BDD 2007 is a holistic approach to desktop deployment, bringing together the people, processes, and technology required to perform highly successful, repeatable, and consistent deployment projects.
Windows Vista : Platform Components (part 2) - Windows Setup, Sysprep, Windows PE, Windows DS, ImageX
Windows Setup (Setup.exe) is the program that installs Windows Vista. It uses image-based setup (IBS) to provide a single, unified process with which all customers can install Windows.
Windows Vista : Platform Components (part 1) - Windows Imaging, Answer Files, Windows SIM
An answer file is an XML-based file that contains settings to use during a Windows Vista installation. An answer file can fully automate all or part of the installation process. In an answer file, you provide settings such as how to partition disks, the location of the Windows Vista image to install, and the product key to apply.
Windows 7 : Using the Default Programs Page (part 2) - Change AutoPlay settings, Set program access and computer defaults
AutoPlay is a Windows 7 feature that lets you choose what program you want to use to play content on CDs, DVDs, and devices. Chances are you've already seen the AutoPlay dialog box at least once, after you inserted a CD or DVD, or connected a camera or disk drive.
Windows 7 : Using the Default Programs Page (part 1) - Set your default programs, Associate a file type or protocol with a specific program
The second option in Default Programs is similar to the first. But rather than starting with a program, you start with a file type or protocol. When you click Associate a File Type or Protocol with a Specific Program you see options similar to those in Figure 4.
Windows 7 : Setting Default Programs for Files
Typed text, pictures, music files, and video clips are all examples of documents and other types of files that you can create or download to your computer. There are thousands of different file types.
Windows 7 : Editing the Registry - Backing Up and Restoring the Registry
Because the Registry is now the one place where all the Windows hardware and software settings are stored, it’s also the one thing that Windows absolutely needs to run. If you have to use the Registry Editor to manually change Registry settings, we strongly suggest that you back up your Registry before you make any changes.
Windows 7 : Editing the Registry - How the Registry Is Organized
The Registry is organized a lot like the files and folders on a hard disk. Just as a hard disk can contain partitions, the Registry contains separate sections called top-level keys. In each section is a list of named entries, called keys, which correspond to the folders on a hard disk.
Windows Server : Designing Enterprise-Level Group Policy Strategy (part 4) - Implementing Fine-Grained Password Policies
To complete this practice, the domain functional level of the contoso.internal domain must be set to Windows Server 2008. If you are unsure how to do this, consult the Windows Server 2008 Help files.
Windows Server : Designing Enterprise-Level Group Policy Strategy (part 3) - Planning Authentication and Authorization
Authentication involves checking that users are who they say they are. It uses username and password or a security certificate installed on a smart card. Authorization determines whether a user has access to resources through permissions or administrative rights through group membership and delegation.
Windows Server : Designing Enterprise-Level Group Policy Strategy (part 2) - Controlling Device Installation
When you are formulating a plan to control the installation of devices (typically, USB devices) in your enterprise, you can use Group Policy to specify whether devices can be installed and, if so, which criteria should be applied.
Windows Server : Designing Enterprise-Level Group Policy Strategy (part 1) - Planning a Group Policy Hierarchy
Group Policy is applied through OUs that are linked to GPOs. A domain is itself an OU, and the default domain policies are defined in the Default Domain Policy GPO. Thus, Group Policy hierarchy and structure is closely linked with Active Directory OU structure.
Using Windows Home Server’s Command-Line Tools : Working with the Command-Line Tools (part 5)
You probably won’t use this command often on the Windows Home Server computer because you’ll almost always be logged on as Administrator. However, WHOAMI is useful when you’re working on a client computer and you’re not sure who is currently logged on.
Using Windows Home Server’s Command-Line Tools : Working with the Command-Line Tools (part 4) - Shutting Down or Restarting a Computer
You can use the SHUTDOWN command to restart or shut down either the Windows Home Server computer or a remote computer on your network.
Using Windows Home Server’s Command-Line Tools : Working with the Command-Line Tools (part 3)
System Management is one of those catch-all terms that encompasses a range of tasks, from simple adjustments such as changing the system date and time to more complex tweaks such as modifying the Registry.
Using Windows Home Server’s Command-Line Tools : Working with the Command-Line Tools (part 2) - Working with File and Folder Management Tools
Windows Explorer is the GUI tool of choice for most file and folder operations. However, Windows Home Server comes with an impressive collection of command-line file and folder tools that let you perform all the standard operations such as renaming, copying, moving, and deleting, as well as more interesting chores such as changing file attributes and comparing the contents of two files.
Using Windows Home Server’s Command-Line Tools : Working with the Command-Line Tools (part 1) - Working with Disk Management Tools
Windows Home Server comes with a large collection of command-line disk management tools that enable you to check disks or partitions for errors, as well as defragment, format, partition, and convert disks.
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us