
IE-SPYAD is a registry import file that will add a list of known sites and domains that are associated with spyware, hijackers, advertisers and other malicious programs that can affect the privacy and security of your computer. Please note that this will not protect you from all sites that contain this type of behavior, but only sites that are known and have been added to the IE-Spyad registry file.

When making a change to the Registry, it is recommended that you first create a export of the entries that you are about to modify. This allows you to save the information to a Registry file, or .reg file, so that if a problem occurs you can import the original settings back into the Registry.

The Windows 8 Start Screen contains tiles that allow you to launch an associated app. These tiles also have the ability to display notifications containing new information from that particular tiles application. For example, the Weather app will show updated weather information, the Stocks app will show recent stock quotes, and the News app will show the latest news stories. This tutorial will explain how you can clear these tiles when you logoff Windows 8.

When using Windows, under certain circumstances the Windows Desktop will not be shown. When this happens, when you login to Windows instead of seeing the desktop, start menu, or your normal icons, you are shown a blank screen instead. This tutorial will provide steps on how to restore a missing Windows desktop.

Many organizations that use Remote Desktop Services or Terminal Services are not using a VPN connection before allowing connections to their in-house servers or workstations. If no VPN is required, this means that the Terminal Server or Remote Desktop is publicly visible and allows connections from anyone on the network and in most cases the Internet. This is a major security risk because it allows remote hackers to attempt to use password cracking attacks on your accessible servers in order to gain remote access. As Remote Desktop Services are configured by default to listen on TCP port 3389, all a hacker has to do is scan the Internet for computers that have that port open and then use a cracking program to try and crack the computer's accounts and passwords. This may seem like a hard task, but it is actually not difficult at all using free and publicly available tools.

When you delete a file in Windows it is usually not permanently deleted. Instead, Windows moves the file to a special location called the Recycle Bin. First implemented in Windows 95, the Recycle Bin is a special directory where deleted files are stored in the event that you need to recover them. Sometimes the Recycle Bin is referred to as the trash, trashcan, or garbage. As a computer user, use of the Recycle Bin system is an extremely common task that is important to know about in order to effectively manage files. The purpose of this guide is to explain how to use the Recycle Bin to review, restore, and permanently erase your files. Additionally, this tutorial will cover some special settings that the Recycle Bin has.

Windows 8 has a settings screen called PC Settings that allows you to change some basic preferences and computer settings directly in the Windows 8 Start Screen. This screen allow you to change settings that include backgrounds, colors, synchronization preferences, and synchronization preferences. This tutorial will explain how to access these PC Settings and provide basic information about what each settings category allows you to configure.

Google Chrome extensions are small programs that can be installed to add or change the browser's functionality. When an extension is created and signed by Google, it will be given a unique ID that becomes associated with the extension. This tutorial will explain how to find that ID.

Though Firewalls are necessary when your computer is connected to the Internet, they can cause problems trying to get Internet aware programs working properly. For example, if you wanted to host a game server on your computer, unless you configure your firewall correctly, outside users would not be able to connect to your server. This is because by default a Firewall blocks all incoming traffic to your computer. This causes a problem, because programs that require incoming connections will now not be reachable. To fix this, we need to open the specific Internet port that the program expects to receive incoming connections on. This tutorial will cover how to open specific ports for programs, or to open these ports globally using Zone Alarm.

The Windows 8 Metro Start screen is designed to make it so that you can easily resize and move tiles as well as make new tile groups. This allows you to organize the interface in a way that works best for you. The instructions below will explain how you can perform these tasks in the Windows 8 Start screen.