Advert

DNS Error 80710102

Last edited by . Total of no comments in the discussion.

Sony’s Playstation 3 (PS3) is one of the most popular gaming consoles on the market. The user can connect the PS3 to the Internet to play multi-player, networked games and download or view movies/television shows. Users often encounter DNS Error 80710102 while attempting to connect their PS3s to the Internet. Router configuration issues or minor PS3 problems can cause this error. How to Correct DNS Error 80710102 Step 1 – Open a browser window on the computer and enter the home router’s IP address into the browser address bar. For Read More

Share on:

How to Change Vista Icons

Last edited by . Total of no comments in the discussion.

As with any new operating system, sometimes even simple tasks can be confusing. If you would like to change your Vista icons, here are some simple steps: First, a quick note regarding Windows Vista Icons. Windows Vista Icons have been given plenty of accolades for their design and beauty. Microsoft gave each window icon a 256 x 256 size instead of the smaller, lower resolution quality XP icons most people are used to. In order to change an individual Vista icon, follow these tips: Once Windows Vista has booted up, Read More

Share on:

NetBEUI

Last edited by . Total of no comments in the discussion.

NetBEUI (NetBIOS Extended User Interface) is a program used for communication between applications installed on separate computers within the same LAN (Local Area Network). It is an upgraded version of NetBIOS and provides much more flexibility and functionality by rearranging the information in a data transmission. Like NetBIOS, NetBEUI is not a networking protocol and must be used in conjunction with IPE or TCP/IP in order to operate. How NetBEUI Works NetBEUI assigns a name to each application to be used within it. It then displays the name or IP Read More

Share on:

How to Turn the Screensaver Off in Windows XP

Last edited by . Total of 3 comments in the discussion.

Monitors that are running screensavers have a tendency to consume the same amount of power as they would if they were running normally. This can be as little as a few watts for small LCD monitors, to as much as several hundred for the much larger plasma displays. The more modern computers have the ability to switch the monitor into a lower power mode and blank the screen altogether. This power saving mode for computer monitors is commonly an integral part of the power management options that is supported in Read More

Share on:

Understanding the Microsoft Model

Last edited by . Total of no comments in the discussion.

Microsoft Model Overview Before Windows NT 3.1 was released, users had to obtain the TCP/IP protocol suite from a third party, and then install it. This was necessary for users to connect to the network, which in turn usually resulted in a number of issues. When it came to network communication, the TCP/IP software which was obtained and installed often functioned differently to that of the particular operating system. With the release of Windows NT 3.1, TCP/IP was included as a component of the operating system. Because of TCP/IP being Read More

Share on:

How Do I Replace Vista with XP?

Last edited by . Total of 4 comments in the discussion.

While Vista is the most up to date operating system from Microsoft, many in the private and business sectors are less-than-pleased with its reliability, features and performance. For many, Windows XP has been a reliable, safe operating system to use offering enhanced performance and compatibility with the vast majority of network components and software. If you bought Windows Vista and installed it on a computer that once had XP and are now unsatisfied with the results, here are some tips on how to replace Vista with XP. Replacing Vista with Read More

Share on:

How to Enable Autologon in Windows Vista

Last edited by . Total of no comments in the discussion.

Login process Login is the process in which end-user or personal access to a computer is managed by the detection of user provided credentials. A user can access a computer by providing a username and password which is then verified by Windows User Accounts. In case of network login, the user name and password is verified by Windows Authentication. Users can then log out of the computer, once access is no longer needed. The log out process ensures that unauthorized users do not have access to the computer, which prevents Read More

Share on:

spooldr.sys

Last edited by . Total of 2 comments in the discussion.

The file spooldr.sys damages the stability of integral processes necessary for Microsoft (MS) Windows Operating System versions to function correctly. The spooldr.sys infects computers running on MS Windows by making use of the Trojan.Packed.13 malware application. The Trojan.Packed.13 is a malicious process that is distributed through spam known as Peacomm. The Peacomm spam convinces its recipients to navigate their browsers to a website with an applet.exe link. The site also executes a JavaScript routine that embeds a process which exploits WMP vulnerability. The WMP vulnerability is exploited by the JavaScript Read More

Share on:

How to Read IIS Server Logs

Last edited by . Total of no comments in the discussion.

IIS stands for Internet Information Services and it is a type of software that runs on servers using Microsoft Windows. IIS is the second most popular server software right behind Apache servers, which are open source and usually less expensive to run. Servers that run IIS include FTP, HTTP, HTTPS, SMTP and NNTP. One of the benefits of running IIS software for web based servers is the amount of information you can collect about your visitors, usually in the form of logs. Logs are a great way to collect, organize Read More

Share on:

Microsoft Excel Password Recovery

Last edited by . Total of no comments in the discussion.

Microsoft Excel documents can utilize three passwords: Password to open Password to modify Protect sheet or Protect workbook Password to Open The Password to open requires a user to enter a password to view the document. When the user sets a Password to open, the entire Microsoft Excel document is encrypted with the RC4 stream cipher. Password to Modify The Password to modify requires a user to enter a password to make changes to the document. When a user sets a Password to modify, the password is stored inside the Read More

Share on: