programming4us
           
 
 
Windows
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 >  |  Displaying page 8 of 15, items 211 to 240 of 446.
Windows 7: Troubleshooting Tools (part 2) - Running the Memory Diagnostics Tool
Few computer problems are as maddening as those related to physical memory defects because they tend to be intermittent and they tend to cause problems in secondary systems, forcing you to waste time on wild goose chases all over your system.
Windows 7: Troubleshooting Tools (part 1) - Running the Windows 7 Troubleshooters
Windows Vista introduced the idea of the troubleshooter, a Help system component that offered a series of solutions that led you deeper into a problem in an attempt to fix it.
Windows Vista : User Account Control
UAC can be enabled or disabled for any individual user account. If you disable UAC for a user account, you lose the additional security protections UAC offers and put the computer at risk.
Windows 7 : Troubleshooting Strategies - Determining the Source of a Problem (part 3)
If a program freezes, you won’t be able to shut it down using conventional methods. If you try, you might see a dialog box warning you that the program is not responding.
Windows 7 : Troubleshooting Strategies - Determining the Source of a Problem (part 2)
Select Start, type msinfo32, and press Enter to launch the System Information utility. In the Hardware Resources branch, check the Conflicts/Sharing sub-branch for device conflicts.
Windows 7 : Troubleshooting Strategies - Determining the Source of a Problem (part 1)
Launch the Event Viewer, open the Windows Logs branch, and then examine the Application and System logs. In particular, look in the Level column for Error or Warning events
Windows 7 : Enabling MAC Address Filtering
The MAC (Media Access Control) address is the physical address of a network adapter. This is unique to each adapter, so you can enhance security by setting up your AP to use MAC address filtering.
Windows 7 : Changing the Default SSID
Windows 7 sees your wireless network because the AP broadcasts the network’s SSID. However, Windows remembers the wireless networks that you have successfully connected to.
Windows 7 : Disabling Network SSID Broadcasting
Windows 7 sees your wireless network because the AP broadcasts the network’s SSID. However, Windows remembers the wireless networks that you have successfully connected to.
Windows 7 : Encrypting Wireless Signals with WPA
Wardrivers usually look for leaking wireless signals so that they can piggyback on the Internet access. They may just be freeloading on your connection, but they may also have darker aims, such as using your Internet connection to send spam or download pornography.
Windows 7 : Positioning the Access Point for Maximum Security
Almost all wireless network security problems stem from a single cause: wireless signals that extend outside of your home or office. This is called signal leakage, and if you can minimize the leakage, you’re well on your way to having a secure wireless network
SOA with .NET and Windows Azure : WCF Extensions - WCF Security
A trust boundary is a physical or virtual boundary within which actual levels of trust can vary. A trust boundary can be an application process, a machine, or even the Internet itself.
Windows 7 : Specifying a New Administrative Password
By far, the most important configuration chore for any new router is to change the default logon password . Note that I’m talking about the administrative password, which is the password you use to log on to the router’s setup pages
Windows 7 : Displaying the Router’s Setup Pages
All routers come with a built-in configuration program. This program is a series of web pages that you access via a web browser on one of your network computers.
Windows 7 : Preventing Users from Logging On at Certain Times
Windows 7 enables you to specify the days of the week and hours of the day that a particular user is allowed to log on to your system. When the user attempts to access your computer over the network outside of those hours
Windows 7 : Removing Stored Remote Desktop Credentials
When you log on to a network computer using Remote Desktop Connection, the logon dialog box includes a check box named Remember My Credentials,
Windows 7 : Disabling the Hidden Administrative Shares
I mentioned in the preceding section that you can add $ to a share name to hide the share, and that it is a good idea to also modify the share name to something not easily guessable by some snoop.
Windows 7 : Hiding Your Shared Folders
Setting up user accounts with strong passwords and then applying shared-folder permissions on those accounts are the necessary network security tasks, and in most small networks they also suffice for achieving a decent level of security.
Windows 7 : Setting Security Permissions on Shared Folders
If you want even more control over the use of your shared resources across the network, you should also set NTFS security permissions on the folder. Security permissions are similar to sharing permissions, except that you get a longer list of permissions for each group or user.
Windows 7 : Setting Sharing Permissions on Shared Folders
With the File Sharing Wizard no longer active, you can now share a folder with advanced permissions. You use these permissions to decide who has access to the folder and what those users can do with the folder.
Configuring Windows 7 for Secure Networking
Windows 7’s network security hatches are pretty tightly battened down right out of the box, but you need to do a couple of things to ensure the most secure networking environment
Windows 7 : Setting Up User Security - Determining Who Is Logged On
How do you know who’s logged on to a Windows 7 machine? For example, what if you’re sitting down at another person’s computer and you’re not sure who’s logged on and what privileges they have
Windows 7 : Setting Up User Security - Using the Guest Account to Give Folks Temporary Access
Windows 7 comes with a built-in Administrator account. This account is all-powerful on Windows, so the last thing you want is for some malicious user to gain control of the system with administrator access. This is why Windows 7 systems come with the Administrator account disabled by default.
Windows 7 : Setting Up User Security - Renaming Built-In Accounts for Better Security
Windows 7 comes with a built-in Administrator account. This account is all-powerful on Windows, so the last thing you want is for some malicious user to gain control of the system with administrator access. This is why Windows 7 systems come with the Administrator account disabled by default.
Windows 7 : Setting Up User Security - Hiding Usernames in the Logon Screen
When you start most Windows PCs, you end up at the logon screen so that you can choose your username and log on by entering your password. In Windows 7, the logon screen always displays icons for each user account, and each icon shows the name of the account.
Windows 7 : Setting Up User Security - Closing Off Your Computer by Disabling All Other Users
If you’ve got other user accounts on your computer, there may be times when you don’t want anyone else to use the computer for a while. For example, perhaps the hard drive is getting full and you don’t want anyone using the machine until you add more capacity
Windows 7 : Setting Up User Security - Preventing Elevation for All Standard Users
You saw earlier that when a standard user attempts a task that requires elevation, he or she sees a UAC dialog box that requires an administrator password, and the screen switches to secure desktop mode
Windows 7 : Using Parental Controls to Restrict Computer Usage (part 2) - Setting Up Parental Controls for Games
If you have kids, chances are, they have a computer—either their own or one shared with the rest of the family—and, chances are, they play games on that computer
Windows 7 : Using Parental Controls to Restrict Computer Usage (part 1) - Activating Parental Controls
With the User Controls window onscreen, click to activate the On, Enforce Current Settings option. This enables the Time Limits, Games, and Allow and Block Specific Programs links in the Windows Settings area
Windows 7 : Working with Users and Groups from the Command Line
You can script your user and group chores by taking advantage of the NET USER and NET LOCALGROUP commands. These commands enable you to add users, change passwords, modify accounts, add users to groups, and remove users from groups.
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us