Advert

How to Disable Windows Hotkeys

Last edited by . Total of no comments in the discussion.

Windows Hotkeys are computer keys that are used as shortcuts. They can make it easier to use a computer because they minimize mouse use. The Windows logo key by itself opens or closes the Start Menu and the Windows logo key combined with other keys control many Windows functions. For example, pressing Win + M minimizes all windows.   There are a few simple steps for disabling Windows Hotkeys. Before doing so, read the following important note because disabling Windows Hotkeys has potential risks.   Important Note: System Restore Point Read More

Share on:

Remote Desktop

Last edited by . Total of 3 comments in the discussion.

Remote Desktop is a Microsoft collaboration software program that is designed to allow computer users to connect to other computers across the Internet. The application can be used to connect to your home computer while on the road, or to allow technicians troubleshoot issues from a remote location. Although the power to share and collaborate with the application is significant, the program has to be manually configured in order for a computer to be shared across the Internet for security reason. After a computer has Remote Desktop enabled, it can Read More

Share on:

How to Add Fonts to Word

Last edited by . Total of no comments in the discussion.

Microsoft Word comes with a large collection of fonts that can be used for word processing. However, there are times when other fonts are wanted. To get these requires downloading different fonts from the Internet. Some of these are free, but there are premium fonts that can be quite expensive. Typically, a free font can handle most of the things an individual wants to do. Adding New Fonts The very first step is to find the font that you want to use. There are many different sites on the web Read More

Share on:

How to Import Data in Excel

Last edited by . Total of 3 comments in the discussion.

Importing data to MS Excel is the process of transferring data from other database sources and converting it into .xls format. This process eliminates the need to manually enter every item into a new Excel worksheet. Importing data therefore saves the user a lot of time and reduces human error. The source data is called internal data source if it is located in files or folders in a personal computer. Importing Data through the Import Data Functionality On a new Microsoft Excel worksheet, click the Taskbar menu labeled Data then Read More

Share on:

How to Use the Command Prompt

Last edited by . Total of no comments in the discussion.

Most computer users utilize the graphical user interface (GUI) in the Microsoft Windows Operating System (OS). However, most users find that using command prompts to conduct network and file management operations is more efficient than the GUI. It may take a while for new command prompt users to learn the syntax required to manipulate files and network settings. However, once users become familiar with it, they will save a significant amount of time. What Makes the Command Prompt Different? Windows users who are new to command prompt can reduce confusion Read More

Share on:

How to Convert Word to PDF

Last edited by . Total of 28 comments in the discussion.

Portable Document Format (PDF) is a file format that the Adobe Corporation developed. It is used to easily transfer documents via the Internet. PDF files are protected from changes and retain a presentation’s exact elements, thereby avoiding problems like missing fonts or broken layouts. PDF files can be viewed with Adobe Acrobat Reader, an easily downloadable application for Windows and Mac OS X. A number of equivalents are available on Linux as well. Converting MS Word Documents to PDF Sending a uniform file to many recipients, transferring files from one Read More

Share on:

IPSec Policies

Last edited by . Total of no comments in the discussion.

IPSec Policies Overview IPSec encrypts data information contained in IP datagrams through encapsulation to provide data integrity, data confidentiality, data origin authentication, and replay protection. The two main IPSec components that are installed when you install IPSec are the IPSec Policy Agent and the IPSec driver. The IPSec Policy Agent is a service running on a Windows Server 2003 computer that accesses IPSec policy information. The IPSec Policy Agent accesses the IPSec policy information in the local Windows registry or in Active Directory. The IPSec Policy Agent then passes this Read More

Share on:

Monitoring SMS

Last edited by . Total of no comments in the discussion.

Monitoring SMS Activity You can use Performance Monitor utility to track various processes on a Windows system in real time. The utility uses a graphical display that you can use to view current data, or log data. You can specify specific elements or components that should be tracked. You can determine resource usage by monitoring trends. With Performance Monitor, objects, counters and instances are used to monitor the system. An object is a collection of counters which are associated with a system resource or service. As the object executes a Read More

Share on:

How to Change an Exchange Password

Last edited by . Total of 2 comments in the discussion.

To change a Microsoft Exchange password, follow these instructions: Press the [CTRL], [ALT], and [DELETE] keys at the same time. In the window that pops up, click the Change Password button Enter a User name Select the domain that the password is being changed for Enter the old password Enter the new password Enter the new password again Click the OK button A box that says “Your password has been changed” will pop up. Changing the Microsoft Exchange password will only change the password in the mail server. It will Read More

Share on:

Understanding Organizational Units

Last edited by . Total of 1 comment in the discussion.

An organizational unit (OU) is a container that logically organizes and groups Active Directory objects within domains. OUs are not part of the DNS namespace. They organize Active Directory objects into logical administrative groups. OUs therefore serve as containers in which users can create and manage Active Directory objects. OUs are considered the smallest unit to which an Administrator can assign permissions to resources within Active Directory. An OU enables users to apply security policies, deploy applications, delegate administrative control for Active Directory objects, and run scripts. An important thing Read More

Share on: