• Main Menu
  • Microsoft Windows

    • How to Add or Delete a Page in Microsoft Word

      How to Add or Delete a Page in Microsoft Word

      Microsoft Word is the commercial word processing program that the Microsoft Corporation created. It was first released in 1983. Since that time, the program has been upgraded to keep pace with technology and is available for use on both the Windows and OS X Operating Systems (OSs). A common task for Microsoft Word users is

    • How to Check Hard Drive Capacity in Windows

      How to Check Hard Drive Capacity in Windows

      Your hard drive is where your computer stores the operating system and most folders and files that it uses. Hard drives have grown in capacity over the years, and as storage capacity has increased so has the amount of data one can store on his or her computer. Knowing not only the capacity of your

    • Wireless Connection Security

      Wireless Connection Security

      Wireless Network Security Threats Wireless networks do not have the inbuilt physical security of wired networks, and are unfortunately more prone to attacks from intruders. Once unauthorized access is gained to the wireless network, the intruder would be able to easily access the resources of the corporate, internal network. To complicate matters, there are numerous

    • How to Monitor Windows Server

      How to Monitor Windows Server

      People monitor system resources in order to evaluate their computer workload, observe changes and trends in resource usage, test configuration changes, and diagnose problems. Task manager presents a snapshot of programs and processes that are running on the computer and provides a summary of the computers processor and memory usage. System monitor logs performance and

    • Configuring DNS Clients

      Configuring DNS Clients

      Configuring DNS Client Settings Configuring DNS client computers typically entail the execution of the following administrative tasks: Setting the client computer names for each computer. The computer names that you configure should not be greater than 63 bytes. The name can only include: Uppercase letters; A – Z Lowercase letters; a – z Numbers; 0

    • Designing Network Infrastructure Security

      Designing Network Infrastructure Security

      Network Infrastructure Security Overview Network infrastructure refers to the grouping of physical hardware and logical components which are needed to provide a number of features for the network, such as connectivity, routing and switching capabilities, network security, and access control. The physical infrastructure of the network refers to the physical design of the network together

    • How to Use the Outlook Autodialer

      How to Use the Outlook Autodialer

      If you find that multitasking is a way of life, autodialers can help keep everything under control. In the Microsoft Outlook environment, autodialers become another set of mouse clicks you make as you work through multiple projects simultaneously. In many respects, the question is not how to use an autodialer, but how it can be

    • Understanding Server Roles

      Understanding Server Roles

      A network or network infrastructure is the grouping of hardware devices and software components needed to connect devices within an organization and to connect the organization to other organizations and the Internet. The network infrastructure’s physical hardware and logical components are needed to provide a number of features for the network, including connectivity, routing and

    • Bonjour Service

      Bonjour Service

      The Bonjour service is an Apple, Inc. implementation of a service discovery protocol. It permits an application to find devices, services, and other computers on a network without configuring a DNS server or directory service by making use of the multi-cast network protocol. Although Bonjour started as a proprietary Apple networking protocol, the company has

    • Understanding and Managing Operations Master Roles

      Understanding and Managing Operations Master Roles

      Understanding the Operations Master Roles Active Directory operates in a multi-master replication manner. What this means is that each domain controller in the domain holds a readable, writable replica of the Active Directory data store. In multi-master replication, any domain controller is able to change objects within Active Directory. Multi-master replication is ideal for the

    177 queries in 0.617 seconds.