programming4us
programming4us
DESKTOP
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 18 of 73, items 681 to 720 of 2882.
NZXT Kraken X40 Liquid CPU Cooler
The kraken X40 breaks the current trend of closed-loop water coolers rocking 12cm fans by upping its fan size to 14cm fan, which NZXT promises delivers more heat dissipation and better cooling without subjecting users to deafening fan noise. It’s a lofty promise, but having tested it, we can tell you that this Kraken's bite lives up to its bark.
Thermaltake Cases Are Suitable For Everyone’s Budget (Part 7)
It seems to be the same as MS-I, Commander MS-II is a much better surprise considering the ventilation aspect. It overwhelms MS-I for several degrees C at each temperature level. There’re only 2 hard drives that are hotter than 50°C at idle mode and one of which is hotter than 60°C at high load level.
Thermaltake Cases Are Suitable For Everyone’s Budget (Part 6)
The inside is pretty spacious compared to the products mentioned above because it’s a tower-shape computer case. It has hard drive slots with large enough space between each. There’s a space of up to 330 mm ensured for the expansion cards. There are 8 expansion slots at the back of the case, which is very important if you want to build a configuration with lots of GPUs besides 3 high-end graphics cards.
Thermaltake Cases Are Suitable For Everyone’s Budget (Part 5) : Thermaltake Armor Revo
This computer case show up in order to replace the once best-selling Armor case of Thermaltake. Appearing with a new name, we’re about to make a circle of researching for some kinds. Let’s see if Thermaltake can be able to make us surprised.
Thermaltake Cases Are Suitable For Everyone’s Budget (Part 4) : Thermaltake Level 10 GTS
The special features of the Level 10 model (having the compartments that are separate with the individual ventilation system) can’t be found here. Level 10 GTS looks pretty normal considering its interior design. The only reference point from the unique Level 10 here is the disk racks, which can be approached from the outside.
Thermaltake Cases Are Suitable For Everyone’s Budget (Part 3) : Thermaltake Commander MS-III
This case is different from MS-II at its front, but both are based on the same chassis. The removable front has a 4th 5.25-inch slot, supported by the design of the chassis, and the difference in overall structure, but that’s the only difference between the 2 models.
Thermaltake Cases Are Suitable For Everyone’s Budget (Part 2)
MS-II doesn’t look much different from the aforementioned MS-I model. We can only be able to find out some tiny changes such as the additional external 5.25-inch slot and the side window that has different shape.
Thermaltake Cases Are Suitable For Everyone’s Budget (Part 1) : Thermaltake Commander MS-I
Thermaltake is one of the oldest case manufacturers still staying strong on the market. Every day, the company is offering the products which are suitable for everyone’s budget; from the primary to the most advanced and sophisticated products.
Antec GX700 Value Gaming Computer Case
With its $90 price tag, the Antec GX700 straddles the fine line between budget and mid-range for an ATX case. It faces stiff competition from the likes of Xigmatek’s excellent Midgard II, as both cases now retail for the same price.
Turn An Old Computer Into A Server Using Ubuntu (Part 2)
Open Windows Explorer on one of your other computers and click the Network link on the left. You should be able to see and access your server. Double-click it and enter your username and password. You can create a shortcut to your shared folders by right-clicking the one you want and selecting ‘Map network drive’. It will appear on the left.
Turn An Old Computer Into A Server Using Ubuntu (Part 1)
If you’ve got an old PC that you’re not doing anything with, you could turn it into a server. This is a computer that sits on your network and stores data (such as photos, videos and music), which it can share with other computers on your network. It can also be used as a central location for keeping back-ups from your other PCs.
The Best PC Deals Around – May 2013 (Part 2)
One of the problems with powerful PCs is that they have a habit of sounding like a jet taking off. Nine different fans might give you unparalleled airflow, but it can also be very distracting if you’re trying to work. If that’s the case, you’ll want a silent PC.
The Best PC Deals Around – May 2013 (Part 1)
The CCL Elite Hawk II is a gaming PC that, in CCL’s words, is designed to give the best performance across FPS, RTS, MMORPG and action RPG games, as well as many other genres that don’t even have their depending on your choice of operating system – it’s cheapest without one, and Windows 7 Ultimate is the most expensive.
Windows Server 2008 R2 networking : Planning and Deploying DNS (part 4) - Monitoring and troubleshooting DNS
To ensure that you have reliable DNS services, you need to monitor your DNS Servers and ensure that they perform name resolution properly. In this section, we will take a look at some of the tools provided in Windows to monitor DNS and troubleshoot problems.
Windows Server 2008 R2 networking : Planning and Deploying DNS (part 3) - Setting up DNS zones
Hosting a domain on a DNS Server requires setting up the zone for that domain. To set up a new DNS zone, perform the following
Windows Server 2008 R2 networking : Planning and Deploying DNS (part 2) - Installing the DNS Server role, Configuring DNS Servers
After DNS is installed, you will need to configure the service to support name resolution. The primary DNS configuration tool is the DNS console in Server Manager. Let us take a look at DNS Server configuration settings.
Windows Server 2008 R2 networking : Planning and Deploying DNS (part 1) - Designing a DNS infrastructure
When creating your DNS design documentation, you will want to ensure that the infrastructure is highly available and redundant. As previously mentioned, DNS is one of the most mission-critical services on your network.
Windows Server 2008 R2 networking : Routing and Remote Access
Windows Server 2008 R2 includes Routing and Remote Access features to provide basic IPv4 and IPv6 routing as well as remote access services, such as VPN and dial-up. These access features allow remote users to connect to the corporate network and access network resources, such as file servers, print servers, and intranet Web sites.
Acer Aspire 5600U 23" Touchscreen All-in-One PC
The system used here comes from a third-party developer and, while Sony has previously experimented with basic gesture control, the Acer's system is far more extensive.
HP Envy 23 TouchSmart All-in-One
The screen, like four other systems here, has a 23" diagonal and 1920 x 1080 native resolution. Its average Delta E of 3.3 means this is the best PC here for color accuracy, and images never look oversaturated or insipid. It's great for photo editing and other work tasks, but a couple of minor issues put this panel into second place, behind the Asus – there’s a little bit of backlight leakage along the bottom edge, and the measured brightness of 208cd/m2 is a little low.
Sony VAIO Tap 20 - Sony's 20in Tablet Is An All-In-One PC
Sony has even crammed in some component access behind the rubberized rear panel, but the Vaio isn't without its issues. The 5.1kg device isn't exactly an iPad on the scales, and the battery doesn't last too long: it ran out of juice after 2hrs 27mins in the light-use test we use for laptops.
Toshiba All In One LX830 Computers
Toshiba’s LX830 is the most affordable system in this test and, on arrival, we were prepared to go easy – after all, the reduced budget should mean this PC wouldn't be able to compete with pricier rivals.
Acer Aspire 5600U 23" Touchscreen All-in-One PC
The system used here comes from a third-party developer and, while Sony has previously experimented with basic gesture control, the Acer's system is far more extensive. Waving an open palm around the screen moves the cursor; pinching two fingers together represents a click; and waving inwards from the right, left and top edges opens up Windows 8's Charms, previous apps and taskbar menus.
Asus ET2300 23" All-in-One Touch Desktop PC
That makes the Asus, along with the Sony, this month's most versatile machine that can be used at a desk when standing up, and at every position in between. The extremely flexible stand comes with great design and build quality: the 11.6kg system is well anchored to the desk, there's no hint of give when pulling the screen to and fro, and the base is made from attractive brushed aluminum.
Dell Inspiron One 23 - An Adequate All-In-One Desktop PC
Dell’s Inspiron brand is generally attached to a host of mid-range products, but the luxurious 11.5kg Inspiron One 23 makes a far more positive first impression.
Using Standard NT Security Features in Windows 7 : WORKING DIRECTLY WITH WINDOWS NT SECURITY (part 5) - Auditing Files and Directories
It's possible to audit many user (or other principal) activities by placing an audit directly on the user. However, the number of event log entries generated by such an action can be overwhelming. In many cases, you end up with too much information to process successfully.
Using Standard NT Security Features in Windows 7 : WORKING DIRECTLY WITH WINDOWS NT SECURITY (part 4)
In general, an administrator is going to set resource permissions on a system, including file and directory permissions. However, there are times when an application needs to set permissions.
Using Standard NT Security Features in Windows 7 : WORKING DIRECTLY WITH WINDOWS NT SECURITY (part 3) - Auditing User Actions
Windows 7 incorporates many forms of auditing. An audit simply tracks some system event and may not even have anything to do with the user specifically. For example, setting object access auditing tracks all access, not just the user's access.
Using Standard NT Security Features in Windows 7 : WORKING DIRECTLY WITH WINDOWS NT SECURITY (part 2) - Changing User Permissions
You can use WMI to make some modifications to group or user content. However, the changes you can make are limited to simple modifications such as the user or group name. In order to make significant changes, such as creating a new group or user, or assigning an existing user to a group, you need to use the DirectoryServices namespace.
Using Standard NT Security Features in Windows 7 : WORKING DIRECTLY WITH WINDOWS NT SECURITY (part 1) - Checking User Permissions
The factors that describe a user's permissions vary according to the user. A user will always have a SID and specific characteristics, such as an impersonation level.
Using Standard NT Security Features in Windows 7 : UNDERSTANDING BASIC NT SECURITY
Many developers view Windows NT security as difficult. However, the concepts behind Windows NT security are actually quite simple. When you leave your house, you close the door and lock it.
Windows Server 2008 R2 networking : Planning and Deploying a TCP/IP Network Infrastructure (part 2) - Policy-based QoS
QoS features allow administrators to configure certain network protocols and applications to have a higher network bandwidth priority than others. QoS also allows administrators to limit the bandwidth used by lower priority applications.
Windows Server 2008 R2 networking : Planning and Deploying a TCP/IP Network Infrastructure (part 1)
Window networks depend upon a reliable TCP/IP infrastructure. A properly designed and managed TCP/IP network helps to ensure a successful Windows Server 2008 R2 deployment, while a poorly designed network almost guarantees that problems are going to occur during and after your deployment.
Windows Server 2008 R2 networking : Overview of Windows Server 2008 R2 Networking
Microsoft has enhanced many of the core network features with the release of Windows Server 2008 and 2008 R2. Windows Server 2008 R2 also comes with some newly added features that deliver greater security, reliability, and a better end-user experience.
Windows Server 2003 : Recovering from System Failure
The System State on a domain controller includes the Microsoft Active Directory directory service and the Sysvol folder. You can back up the System State on a domain controller just as on any other system, using the Backup Utility or Ntbackup command.
Windows Server 2003 : Advanced Backup and Restore (part 2) - Scheduling Backup Jobs, Shadow Copies of Shared Folders
To schedule a backup job, create the job in the Backup Utility and then click Start Backup and configure advanced backup options. After all options have been configured, click Schedule and, in the Set Account Information dialog box, type the user name and password of the account to be used by the backup job.
Windows Server 2003 : Advanced Backup and Restore (part 1) - Managing Media, Backup Options, The Ntbackup Command
Backup options are configured by choosing the Options command from the Tools menu. Many of these options configure defaults that are used by the Backup Utility and the Ntbackup command. Those settings can be overridden by options of a specific job.
Windows Server 2003 : Managing and Implementing Disaster Recovery - Restoring Data
Restoring data is a straightforward procedure. After opening the Backup Utility and clicking the Restore And Manage Media tab as shown in Figure 1, you will be able to select the backup set from which to restore.
Windows 7 : Networking and HomeGroup Sharing - Sharing Between PCs (part 2) - Old-School Sharing
If you configured a user named Paul with the password 123 on a computer named PC-A and have likewise configured a user named Paul with no password (or a different password) on a computer named PC-B, the user Paul on PC-B won't be able to access any folders shared by Paul on PC-A unless he provides the appropriate logon information when prompted.
Windows 7 : Networking and HomeGroup Sharing - Sharing Between PCs (part 1) - HomeGroup Sharing
HomeGroup sharing does not replace the workgroup network scheme that was previously discussed. In fact, to use HomeGroup sharing, you must be on a workgroup. HomeGroup sharing does not work with domain networks like those found in corporations. It is very specifically a consumer-oriented feature aimed at home users.
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us