• Main Menu
  • Microsoft Windows

    • Understanding Host Name Resolution

      Understanding Host Name Resolution

      Understanding the Purpose of Host Names In TCP/IP based networks, the packets that are transmitted over the network contain the following IP addresses: The IP address of the computer sending the packet The IP address of the destination computer intended to receive the packet. The IP address information is used to forward the packet to

    • ExFAT

      ExFAT

      The Microsoft Corporation in conjunction with Windows Vista Service Pack 1 (SP1) released the exFAT file system. The exFAT file system was produced in order to address the short comings of the FAT32 file system; specifically on portable media such as USB sticks or portable hard drives where NTFS file structure use is inappropriate. The

    • MSN Error Code 80040154

      MSN Error Code 80040154

      MSN Messenger (now called Windows Live Messenger) is the Microsoft instant messaging program that is deployed with all versions of the Microsoft Windows Operating System (OS). The application is also installed on the Xbox 360, the Blackberry OS, the Zune HD, and the Symbian OS 9.x. The program connects the user to the Microsoft .NET

    • How to Turn the Screensaver Off in Windows?

      How to Turn the Screensaver Off in Windows?

      Quick jump: Turning Off the Screensaver in Windows XP Turning Off the Screensaver in Windows Vista Turning Off the Screensaver in Windows 7 Turning Off the Screensaver in the Windows 8?   At the beginning of the computer age, screensavers were applications designed to protect monitors from the phosphor burn-in on CRT and plasma displays, and that’s how they got this

    • Error 678

      Error 678

      Error 678 is an error that is reported when a remote system does not respond correctly when an attempt is made to connect to the Internet. The Error 678 message appears as “The remote computer did not respond.” Broadband connections If this error occurs with a broadband connection, it could be because of the following

    • Monitoring IPSec

      Monitoring IPSec

      Using the IP Security Monitor Snap-In to Monitor IPSec The IP Security Monitor snap-in, a new feature in Windows Server 2003, can be used to monitor and troubleshoot IPSec activity. The IP Security Monitor snap-in provides enhanced IPSec security monitoring. As long as the IPSec policy is active, you can monitor how the IPSec policy

    • The Shutdown Event Tracker

      The Shutdown Event Tracker

      An Overview on Shutdown Events Computer shutdowns can be sorted into either of the following categories: Expected shutdowns: An expected shutdown can be defined as a computer shutdown which you predict to occur. Expected shutdowns usually occur when one of the following actions are performed: Clicking Start, and then the Shutdown command Holding down Ctrl

    • How to Solve “Windows Installer Service Could not be Accessed”

      How to Solve “Windows Installer Service Could not be Accessed”

      Windows Installer is a very important component of all Windows operating systems. It installs, uninstalls, and supports applications and software. If the Windows Installer is corrupted or the service stops for an unknown reason, an error message comes up. The error message typically appears as: “The Windows Installer Service could not be accessed. This can

    • Error 1721

      Error 1721

      This is an error commonly witnessed when you try to uninstall a program using the "Add or Remove Programs" in Microsoft Windows XP. The message itself will read: "Error 1721. There is a problem with this Windows Installer package. A program required for this install to complete could not be run. Contact your support personal

    • Understanding and Implementing Access Control

      Understanding and Implementing Access Control

      An Overview of Access Control Allowing users and computers unlimited access to system resources and network resources can ultimately compromise the security and stability of an organization. Even though users and computers need to access network and system resources to perform certain tasks, the access that they require should be limited to those necessary to

    180 queries in 0.714 seconds.