• How to use the Windows 7 System Recovery Environment Command Prompt Image

    How to use the Windows 7 System Recovery Environment Command Prompt

    The Windows 7 System Recovery Command Prompt is a text-based console that allow you to perform maintenance and recovery tasks on your computer by typing the commands that you would like to execute. These commands allow you to perform a wide variety of tasks such as replace infected files, delete infections, repair boot up configurations for your hard drive, resize hard drive partitions, as well as many other tasks. Like the Windows Vista Recovery Command Prompt, the Windows 7 version also allows you to run graphical programs such as Notepad, Regedit, and possibly some anti-malware programs. This is a huge advantage as you now have a much larger variety of tools at your disposal to repair your computer.

  • How to use the Command Prompt in the Vista Windows Recovery Environment Image

    How to use the Command Prompt in the Vista Windows Recovery Environment

    The Windows Recovery Environment Command Prompt is a text-based console that allows that allows you to perform many tasks on your computer by typing in the commands that you would like to execute. These commands allow you to perform a range of tasks from managing the files on your hard drives, formatting and repartitioning hard drives, configuring how Windows boots, deleting and copying files, scanning your computer for malware, as well as many other tasks. In past versions of the Windows, the Command Prompt would typically not allow you to run any of your Windows programs that require a graphical user interface. The Command Prompt in the Windows Recovery Environment, though, does allow you to launch certain Windows programs. This is a huge advantage as you now have a much larger variety of tools at your disposal to repair your computer.

  • Windows 8 System Restore Guide Image

    Windows 8 System Restore Guide

    System Restore is a recovery feature in Windows 8 that allows you to restore your computer to a previous state. This is useful if your computer starts to function poorly or crashes and you cannot determine what the cause is. To resolve these types of issues, you can use System Restore to restore your computer back to a previous state that was saved before your problems started occurring. This will allow your computer to start operating correctly again.

  • How to partition and format a hard disk in Windows Image

    How to partition and format a hard disk in Windows

    In order to use a hard drive, or a portion of a hard drive, in Windows you need to first partition it and then format it. This process will then assign a drive letter to the partition allowing you to access it in order to use it to store and retrieve data.

  • How to Copy, Cut, and Paste in Windows Image

    How to Copy, Cut, and Paste in Windows

    A basic, but important, concept to understand when using a computer is cut, copy and paste. These actions will allow you to easily copy or move data between one application and another or copy and move files and directories from one location to another. Though the procedures in this tutorial are considered to be basic concepts, you would be surprised as to how many people do not understand these essential features. Even more importantly, once you understand these fundamentals you will be able to use this knowledge on almost any computer operating system as long as you know the corresponding keys that are used for these features. For the purpose of this tutorial I will cover how to cut, copy and paste with the Windows operating system. Other operating systems, such as Linux, Unix, and Apple support these concepts as well but will not be discussed in this tutorial.

  • Using Spybot - Search & Destroy to remove Spyware from Your Computer Image

    Using Spybot - Search & Destroy to remove Spyware from Your Computer

    If you suspect that you have spyware installed on your computer, then an excellent tool called Spybot - Search and Destroy can be used to remove them. Follow the instructions below to learn how to use Spybot - S&D to remove these programs from your computer. Word of warning, though, Spyware can sometimes be integrated tightly into software that you use, and if you remove the spyware, that software may not function correctly. So be careful as to what you remove.

  • How to enable the F8 key to start Safe Mode in Windows 8 Image

    How to enable the F8 key to start Safe Mode in Windows 8

    Windows 8 introduced a new boot loader that decreased the time that it takes Windows 8 to start. Unfortunately, in order to do this Microsoft needed to remove the ability to access the Advanced Boot Options screen when you press the F8 key when Windows starts. This meant that there was no easy and quick way to access Safe Mode anymore by simply pressing the F8 key while Windows starts. Instead in order to access Safe Mode, you would need to either start Windows 8 and then tell it to restart into safe mode or for Windows to fail to start, where you could then tell Windows reboot again into safe mode. Regardless of how you did, it became a 2-3 step process to access the Windows 8 Safe Mode rather than a 1-step process that we have become familiar with.

  • How to see hidden files in Windows 8 Image

    How to see hidden files in Windows 8

    Windows 8 hides certain files so that you are not able to view them while exploring the files and folders on your computer. Windows has two types of files that Windows will classify as hidden and hide from the user. The first type are actually hidden files, which are ones that are given the +H attribute or specified as Hidden in a file or folder's properties. The second type of file are System files, which are files that are required for the proper operation of Windows 8 as thus are hidden so that they are not changed or deleted by accident.

  • IP Addresses Explained Image

    IP Addresses Explained

    Every machine on the the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the Internet. You can look at your IP address as if it were a telephone number, each one being unique and used to identify a way to reach you and only you.

  • How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector (PSI) Image

    How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector (PSI)

    One of the most important things a user can do to keep their computer secure is make sure they are using the latest security updates for Windows and their installed programs. Unfortunately, staying on top of these updates can be a time consuming and frustrating task when you have hundreds of programs installed on your computer. Thankfully, we have a utility called Secunia PSI, which is vital component for any Windows user's toolkit.

Login

Remember Me
Sign in anonymously