programming4us
programming4us
DESKTOP
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 11 of 73, items 401 to 440 of 2882.
Windows 8 Explorer : Diagnosis and Recovery - The Performance and App History Tabs
Most people spend about 80 percent of their time (based on Microsoft’s telemetry-based research) using the Processes tab of the Task Manager. But there’s much more to be learned about your system on the remaining tabs
Windows 8 Explorer : Diagnosis and Recovery - The Processes Tab
In the Compact view, Task Manager doesn’t display much detail—it doesn’t even show you tile-based programs that are in use. But Task Manager is a very rich diagnostic tool.
Windows 8 Explorer : Diagnosis and Recovery - Task Manager
Task Manager is Windows 8’s premier diagnostic tool for examining the applications, processes, services, and performance characteristics of your system. A version of Task Manager has shipped with every version of Windows desktop and server since Windows 3.1.
Windows Small Business Server 2011 : Installing the Second Server (part 5) - Customizing the Server
Roles are a new way that Windows Server 2008 R2 groups similar functionality together for installation and configuration. A role is a specific set of functionality that the server needs for a particular set of uses. Roles can also have role services, which are subsets of the functionality in the role and can be installed only as part of the role.
Windows Small Business Server 2011 : Installing the Second Server (part 4) - Enable Updates and Feedback
The next group of settings on the ICT Wizard is used to set how updates are handled and what feedback is sent to Microsoft. The first setting in this section of the ICT Wizard is to actually configure what settings are used for updates and feedback
Windows Small Business Server 2011 : Installing the Second Server (part 3)
The Windows Server 2008 R2 setup process automatically assigns a random and meaningless name to a new server. Although this name is certainly unique on the network, it’s not a useful final name, so you’ll want to change it.
Windows Small Business Server 2011 : Installing the Second Server (part 2)
If no DHCP server is available, the server will have a link-local address—an autoconfiguration IP address that is unique on the network but won’t be forwarded by routers to another network.
Windows Small Business Server 2011 : Installing the Second Server (part 1) - Installation and Initial Configuration - Installation
Installing Windows Server 2008 R2 from standard distribution media onto a clean server with no operating system on it requires just seven screens at the very beginning, and the entire rest of the installation will complete without further interruption.
Windows Server 2008 : Working with Active Directory Accounts - Redirecting Computer Accounts, Redirecting User Accounts
When a computer joins a domain, the computer account is added to the Computers container by default; however, you can change the default behavior with the redircmp command.
Windows Server 2008 : Working with Active Directory Accounts - Using csvde to Export and Import Accounts
The comma separated value directory exchange (csvde) command works on comma-separated value files. Each element in the csv file is separated by a comma, and you can use the csvde command to import or export objects for AD.
Windows Server 2008 : Working with Active Directory Accounts - Using ldifde to Export, Import, and Delete Accounts
The ldifde command works on line-delimited, or line-separated values within files. You can use it to import or export data into or out of Active Directory (AD). You execute these commands on a domain controller (while logged on with an account with administrative permissions).
Automating Windows 7 Installation : Preparing a System with Sysprep
Original equipment manufacturers (OEMs) use System Audit mode to bypass the Windows Welcome program and install additional programs and applications. Once the programs are installed, you run Sysprep again, selecting the OOBE choice.
Automating Windows 7 Installation : Creating Bootable WinPE Media
You can create your own bootable WinPE disc. You can then use this disc to boot to WinPE on any system to capture or deploy an image using ImageX. The following section includes steps you can use to create a bootable USB drive or bootable CD. These steps assume you have installed the WAIK on your system.
Automating Windows 7 Installation : Creating Your First Image, Using the Windows Automated Installation Kit
You can use these tools to capture or deploy an image, and perform offline maintenance of images. Offline maintenance means that you aren't booted into the operating system; instead, you are modifying the contents of the WIM file.
Automating Windows 7 Installation : Getting Familiar with Microsoft Images (part 2) - Creating Operating System Images
Operating system images are also known as install images. They include a full operating system. A thin image (also called a basic image) is just the default operating system and nothing else. Thick images (also called custom images) include the operating system along with any customization and applications you may need.
Automating Windows 7 Installation : Getting Familiar with Microsoft Images (part 1) - Creating a Bootable VHD Image
A VHD image is simply a VHD file that includes a fully functioning operating system. This is the same VHD image type used by Microsoft Virtual PC and Microsoft's Hyper-V virtual program (which is available on Server 2008 and Server 2008 R2).
Windows 8 : Scheduling Maintenance Tasks - Viewing and Managing Tasks on Local and Remote Systems
The current tasks configured on a system are accessible through the Task Scheduler node in Computer Management. Tasks are organized and grouped together using a familiar folder structure, where base folders are named according to the operating system features, tools, and configuration areas to which they relate.
Windows 8 : Detecting and Resolving Windows 8 Errors - Using the Event Logs for Error Tracking and Diagnosis, Viewing and Managing the Event Logs
Any particular computer can have dozens, and in some cases hundreds, of different components, services, and applications configured on it. Keeping all these components working properly is a big job.
Windows 8 : Using Remote Assistance to Resolve Problems
Remote Assistance enables support personnel to view a user’s desktop and take control temporarily to resolve problems or walk the user through the execution of complex tasks.
Windows 8 : Managing Automatic Updates
By default, Windows Update gets updates for drivers from the Windows Update website. You also can specify that you want Windows Update to search the Windows Server Update Services managed server for driver updates, or to first search the Windows Server Update Services managed server, but if no update is found there, then search Windows Update.
Windows 8 : Managing Installed and Running Programs (part 3) - Configuring AutoPlay Options, Adding and Removing Windows Features
In Windows XP and earlier versions of Windows, you use the Add/Remove Windows Components option of the Add Or Remove Programs utility to add or remove operating system components.
Windows 8 : Managing Installed and Running Programs (part 2) - Managing the Command Path, Managing File Extensions and File Associations
File extensions and file associations also are important for determining how applications run. The types of files that Windows considers to be executables are determined by the file extensions for executables.
Windows 8 : Managing Installed and Running Programs (part 1) - Managing Currently Running Programs, Managing, Repairing, and Uninstalling Programs, Designating Default Programs
In Windows 8, you can view and work with a computer’s currently running programs and processes by using Task Manager. You can open Task Manager by pressing Ctrl+Alt+Delete and then selecting Task Manager. Alternatively, tap or click the lower-left corner of the screen and then tap or click Task Manager on the shortcut menu.
Windows 8 : Deploying Applications Through Group Policy, Configuring Program Compatibility
If you want to install 16-bit or MS-DOS-based programs, you might need to make special considerations. Additionally, to get older programs to run, you might sometimes need to adjust compatibility options. Techniques for handling these situations are discussed in the following sections.
Windows 8 : Installing Programs - Working with Autorun, Application Setup and Compatibility, Making Programs Available to All or Selected Users
Occasionally, Windows might not be successful in detecting the required installation permissions. This can occur if the installation manifest for the program has an embedded RequestedExecutionLevel setting that has a value set as RequireAdministrator.
Windows 7 : Windows Management and Maintenance - Additional Tools
Besides the standard Control Panel, Computer Management, Administrative Tools and System Tools categories, there are several other important tools that you can use to manage and maintain Windows.
Windows 7 : Windows Management and Maintenance - System Tools Folder in Start Menu
Some of the most frequently used tools to manage your system can be accessed from the System Tools folder in the Start menu. To open the System Tools folder, click Start, All Programs, Accessories, System Tools.
Windows 7 : Windows Management and Maintenance - Administrative Tools
The Administrative Tools icon in the Control Panel’s Large Icons or Small Icons view is not a single program; rather, as the name implies, it provides a convenient way to access a variety of specialized tools you can use to manage more technical aspects of your Windows 7 system.
Outlining AD DS Changes in Windows Server 2012 (part 3) : Auditing Changes Made to AD Objects
Another important change to Active Directory that can be enabled in a Windows Server 2008 or Windows Server 2012 functional domain is the concept of auditing changes made to Active Directory objects.
Outlining AD DS Changes in Windows Server 2012 (part 2) : Restarting AD DS on a Domain Controller, Implementing Multiple Password Policies per Domain
Windows Server 2008 originally introduced new capabilities to start or stop directory services running on a DC without having to shut it down. This enables administrators to perform maintenance or recovery on the Active Directory database without having to reboot into Directory Services Restore Mode.
Outlining AD DS Changes in Windows Server 2012 (part 1) : Restoring Deleted AD DS Objects Using the Active Directory Recycle Bin
The AD Recycle Bin was supported in the Windows Server 2008 R2 version of AD DS, but was extremely complicated to implement, and the administrative tools provided were not easy to use.
Windows Server 2012 : Understanding AD DS Replication, Outlining the Role of DNS in AD DS
For purposes of replication, AD DS logically organizes groups of servers into a concept known as sites. Generally speaking, a single site should be composed of servers that are connected to each other via high-speed connections.
Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 6) - Administrative Templates
The Administrative Templates node and subnodes in a GPO update the registry on the target computer, either under the HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER portion of the registry.
Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 5) - Security Settings - Public Key Policies, Software Restriction Policies
This node provides the ability to configure wireless networks for desktops running Windows XP or Windows Vista that are joined to the domain. The options for configuring the wireless network for Windows XP is somewhat limited compared to those for Windows Vista.
Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 4) - Security Settings - Wired Network, Windows Firewall with Advanced Security
The updated firewall that comes with Windows Vista and Windows Server 2008 provides additional configurations that enable granular security control over inbound and outbound communications and connection-specific security. You can configure these policies through a set of wizards.
Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 3) - Security Settings - Restricted Groups, System Services, Registry
This setting allows you to centralize the group membership of both groups that reside in Active Directory and those that live locally in the Security Accounts Manager (SAM) on each computer, referred to as local groups.
Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 2) - Security Settings - Account Policies, Local Policies
This node and its subnodes contain some of the most important security settings for your Active Directory domain and for the computers that are joined to the domain. Within this node, you will find the three important security nodes that control user account passwords, lockout policy, and Kerberos policy settings.
Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 1) - Software Settings
The Software Settings node is where you can configure the deployment of software to both computer and user accounts. There are slight differences between deploying software to computers and users, but they are minimal.
Windows 8 : Managing Application Virtualization and Run Levels (part 2) - Setting Run Levels, Optimizing Virtualization and Installation Prompting for Elevation
By default, only applications running with a user’s administrator access token run in elevated mode. Sometimes you’ll want an application running with a user’s standard access token to be in elevated mode.
Windows 8 : Managing Application Virtualization and Run Levels (part 1) - Application Access Tokens and Location Virtualization, Application Integrity and Run Levels
The focus on standard user and administrator privileges also changes the general permissions required to install and run applications. In Windows XP and earlier versions of Windows, the Power Users group gave users specific administrator privileges to perform basic system tasks when installing and running applications.
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us