There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen. There are two options for logging into an administrator account: The first option is to start up the machine in the welcome or log in screen and pull up the classic log in screen. Press Read More
How to Setup a PC Microphone
With the increased use of applications featuring live video chat options such as Google Talk, Skype, and Yahoo IM, setting up a PC microphone is now an essential task to ensure the highest quality of service while using these and other related products. Although most versions of the Windows OS are designed to automatically detect and auto-configure a microphone, to ensure optimum performance the device must be configured to minimize the effects of background noise on the quality of sound transmission. How to Set Up a PC Microphone Step 1 Read More
How to Improve Internet Speed
LAN vs WLAN Internet speed depends greatly on the type of network the computer is connected to. There are two basic types of networks that allow Internet connection. A LAN (Local Area Network) is a network that is established via an Ethernet cable and physically connects a computer to a router, modem, or access point. LANs provide much faster Internet speed, but limits the distance between a computer and the access point it is connected to. As a result, many switch to WLANs (Wireless Local Area Networks). A WLAN is Read More
How to Remove a Browser Hijacker
Browser hijackers are malicious programs that redirect computer users to websites that the hacker wants and deploy the computer malware. The hijacker may change a computer’s default homepage or redirect computer users trying to visit legitimate websites such as their bank or Google to a maliciously crafted copy of the site to deploy computer malware to the computer or steal the user’s data. Most browser hijacks are based on adware, and to a more limited degree, spyware functions. How do Browser Hijackers Infect Computers? When a computer browser is hijacked, Read More
Solder
Solder is a metal with a low melting point that is used to create the conductive joints between components and tracks in electrical circuits. There are many types of solder used for different metals, but the most common solder used for electronics is an alloy of tin and lead. Solder Flux Flux is essential for making good solder joints. It removes the thin film of surface oxidation that prevents two metals sticking together. It also prevents more oxidation occurring during soldering. Heat causes the flux to change it's chemical structure Read More
How to Install Active-X
ActiveX is designed to be a framework to allow software components to be reused independent of the programming language used in development. One or more of these components can be used for development of software applications and digitally signed to validate the identity of the author of the component. First developed in the mid-1990’s by the Microsoft Corporation, ActiveX controls are used by Windows Media Player, Microsoft Office, Internet Explorer, and Microsoft Visual Studio and can be embedded into web pages for added functionality. A common task that arises for Read More
How to Audit Windows NT/2000/XP Passwords
Microsoft Windows NT/2000/XP passwords are encrypted as 32-bit one-way hashes using the MD4 messages digest algorithm. This is similar to the way that Unix stores passwords, although the hashing algorithm is different. For compatibility with legacy Microsoft LAN Manager software, Windows NT/2000/XP also stores the passwords redundantly as a 56-bit DES (Data Encryption Standard) hash. This 56-bit hash is created by splitting the password into two 7-character uppercase strings, and then converting each to a 56-bit DES key which both then encrypt the string “KGS!@#$%” and concatenating the results. This Read More
Rheometer
A rheometer is a device that was developed to measure how a liquid’s suspensions or slurries flow when force is applied to it. Many fluids can be tested with a rheometer when a single numerical viscosity value cannot determine them due to their components. A rheometer can also be used to discover the additional parameters and values that a viscometer can correctly measure. In other words, the rheometer tests a fluid’s rheology. There are two types of rheometers that test a liquid’s rheology. There is an applied shear stress/strain option Read More
Trunking
Traditional radio equipment works because all parties involved in the communication agree on what frequencies they will utilize. Traditional radio scanners work by scanning for and then listening to those frequencies. Trunking radios, on the other hand, constantly renegotiate the frequencies utilized for the conversation. This allows for more efficient utilization of limited frequencies because each conversation does not require a dedicated channel. However, it also makes it very difficult to scan trunked conversations because you do not usually know what frequency the next portion of the conversation will appear Read More
How Does a Processor Work?
A computer processor is commonly referred to as the CPU, or central processing unit of a computer. The processor is the primary component of a computer designed to move and process data. Computer processors are commonly referred to by the speed that the CPU can process computer instructions per second measured in hertz and are one of the primary selling points of a computer. How Does the Processor Work? The computer processor acts as the primary coordinating component of the computer. The CPU will access programs, data, or other computer Read More
Share on: