249 tutorials sorted by popularity. Show
Category: Windows 8 | Read 23,365 times | Last Modified on December 11, 2012
Windows 8 allows multiple users to share the same computer using different accounts. This allows each user to have their own location where they can store personal information such as documents, pictures, videos, saved games, and other files so that they are not mixed in with the files of other users on the same computer. Having multiple accounts also plays a strong role in Windows Security. It is advised that each account on the computer be setup as a Standard User, which has limited permissions, so that it is harder for malware to infect the computer. You should then create a separate account that will be for the Administrator of the computer. This account, though, would only be used to administer the computer as necessary and would not be used as a day-to-day account. Using this security plan significantly reduces the chance of your computer becoming infected.
Category: Windows 8 | Read 23,290 times | Last Modified on January 25, 2013
Windows 8 no longer includes the traditional Start Menu that Windows users have become associated with using. Instead they replaced it with a new interface called the Windows Start Screen that many people find to be not as intuitive as the traditional Start Menu. This is especially the case if you are not using a touch screen. With this in mind, a free program called Classic Shell has been updated to support the ability to add a Start Menu to Windows 8.
Category: E-Mail | Read 23,109 times | Last Modified on January 14, 2013
If your C: drive starts to run out of space, one of the most frustrating experiences can be figuring out what can be deleted or moved to another drive in order to free up storage. This is especially true with modern computers that are commonly configured with small SSD drives as their C: drive, which can easily run out of space due to their smaller storage capacity. If you are using Windows Live Mail it will store your email by default on your C: drive. If you are like me and save almost all of your email, then your Live Mail mail store can grow to a very large size. Thankfully, the program provides the ability to easily change the location where your mail is stored so that you can you move it to another drive that may have more free space available. This tutorial will walk you through changing where your Windows Live Mail e-mail is stored.
This tutorial will explain how to connect Surface to a public or private wireless network. This will allow you to connect to the Internet and use the full features of the Surface tablet.
Category: Windows 7, Windows 8, Windows Vista, Windows XP | Read 22,733 times | Last Modified on December 13, 2012
The default setting for Windows is to not display a file's extension. Therefore, when viewing files in Windows you would only see the portion of the filename that precedes the last period in it. To show what this means, if you have a file called test.doc.txt, Windows will only display test.doc. From this filename, you would then assume this is a Word document, but when you double-click on it, it would instead open in Notepad as it is actually a text file becaues its true extension is .txt. Even more serious is the fact that many malware creators create their infection files so that they exploit this default setting in order to hide the fact that it is actually an executable file.
Category: Windows 7, Windows 8, Windows Vista, Windows XP | Read 22,725 times | Last Modified on December 13, 2012
When you delete a file in Windows it is usually not permanently deleted. Instead, Windows moves the file to a special location called the Recycle Bin. First implemented in Windows 95, the Recycle Bin is a special directory where deleted files are stored in the event that you need to recover them. Sometimes the Recycle Bin is referred to as the trash, trashcan, or garbage. As a computer user, use of the Recycle Bin system is an extremely common task that is important to know about in order to effectively manage files. The purpose of this guide is to explain how to use the Recycle Bin to review, restore, and permanently erase your files. Additionally, this tutorial will cover some special settings that the Recycle Bin has.
Category: Security | Read 22,201 times | Last Modified on February 27, 2012
GDI+ is a programming interface or API that enables programs to use graphics and formatted text on a video display or printer. A vulnerability, GDI+ JPEG Vulnerability, was found in the DLL gdiplus.dll used by GDI+ that has faulty code when processing JPEG images. People who know how this code can be exploited can craft a specially designed JPEG that can exploit this bug and possibly take control of your machine. If you view an image using an application that has this vulnerability, then it is possible for the remote program to issue commands on your computer at the same security level as your user account. Therefore if your user account is an administrator of your machine, then the remote code will have administrative privileges and be able to have full access to the security of your computer.
Category: Windows 7 | Read 22,174 times | Last Modified on December 13, 2012
The Windows taskbar is one of the most important parts of the Windows 7 and Windows 8 user experience and customizing it to your specific needs will go a long way in making Windows easier to use. Unfortunately, a quick slip of the mouse or adding new items to the taskbar can change a configuration that you have gotten used. That is why it is important to customize the toolbar by pinning items and configuring toolbars so that it works well for you and then lock it into that state so that it does not get changed by mistake. In the future if you want to make a change, you can then unlock the taskbar, make your changes, and then lock it again. This tutorial will walk you through two methods that will allow you to lock and unlock your Windows 7 and Windows 8 taskbar.
Category: Windows 7 | Read 22,109 times | Last Modified on March 08, 2013
When you open files that have a particular file extension, Windows will look at its configuration to determine what the default program should be in order to work with these files. The default program that is assigned to a particular extension, though, may not be what you want to use. Therefore, it is possible to change the default program that is launched when you double-click on a particular file type. This tutorial will discuss how you can open a file using another program or to assign a new program to extensions that have not been opened before.
According to a report by The Radicati Group on May 9th, 2006, there about 171 billion e-mail messages sent daily, 1.1 billion e-mail users worldwide, and 1.4 billion active e-mail accounts. These numbers are staggering and truly reflect how e-mail has become such an important medium for communicating with friends, family, colleagues, and clients. Though so many of you use e-mail all the time, how many of you truly understand how e-mail works? This tutorial is designed to give an overview of how e-mail works as well as related e-mail features. Hopefully after reading this tutorial, you will be a more informed users and consumer of e-mail products or services. This is going to be a long and detailed tutorial so I suggest you print it out and read it casually so you can absorb it all.
|Tech Support Forums | The Computer Glossary | RSS Feeds | Startups | The File Database | Virus Removal Guides | Downloads|