A Windows Vista feature is simply a set of programs or a particular capability of the operating system that can be enabled or disabled by an administrator. It is important to note that in Windows Vista, when you remove or disable a feature, you are not actually removing files from your hard drive, but rather just deactivating them. Therefore disabling a feature should not be used as a method of freeing up hard drive space. On the other hand, by disabling a feature you may gain an increase in performance due to memory and processor utilization no longer being allocated towards the particular feature.
When you purchase a new computer, one of the most daunting tasks is figuring out how to transfer the data from your old computer to your new one. Windows comes with a feature called Windows Easy Transfer that makes this process a lot easier. The best and fastest way to do this is via an external USB hard drive. External hard drives cost around $50 dollars for 500GB drives, which will be suitable for most people. If you do not wish to spend the money on the new hard drive, then you can use a network to transfer the files, but that gets to be a little tricky. For the purpose of this guide we will be using an external hard drive.
One of the most frustrating tasks a non-technical user may run into is getting a new computer and having no idea how to move their old data to it. In this tutorial we will go over how to move your Internet Explorer favorites from one computer to another in a simple and easy to understand manner so that you have one less headache to deal with in these situations. For this tutorial we will use a floppy to transfer your favorites to a new computer though you can use other mediums such as a recordable CDROM.
Safe Mode is a Windows mode that uses only the most basic drivers and programs that are required to start Windows. This mode will also not launch any programs that are set to start automatically when Windows starts. This makes Safe Mode is very useful for diagnosing hardware driver problems and computer infections in Windows 8. It can also be useful when you want to uninstall a program or delete a file that you are unable to remove when Windows is started normally.
The Windows 8 Metro Start screen contains small squares and rectangles, called tiles, that are used to represent various programs that you can access. The default tiles that are on your Start screen are not, though, the only programs that you can add. It is possible to add other programs by searching for them or using more advanced techniques to make them available. This guide will explain how to go about adding and removing programs to the Windows 8 Start screen.
One of the top questions I see on forums is "How do I know if I have been hacked?". When something strange occurs on a computer such as programs shutting down on their own, your mouse moving by itself, or your CD constantly opening and closing on its own, the first thing that people think is that they have been hacked. In the vast majority of cases there is a non-malicious explanation for these problems such as faulty hardware or problematic software, but it is better to be safe than sorry for not investigating deeper. Unfortunately, the vast majority of computer users have no idea how to go about determining if their computer is hacked. It is for these people, that I am writing this tutorial.
The built-in Administrator account is disabled by default in Windows 8, Windows 7, and Windows Vista. It is disabled to enhance security as this is a common account targeted by hacking scripts and hackers when they try and access your computer without your permissions. In my opinion, you should leave the Administrator account disabled, but as there have been many requests for this information, I have decided to write this guide. This guide will provide three methods that will allow you to enable your Administrator account in Windows 8, Windows 7, and Windows Vista. It is important to note that in order to perform either of these methods you will need to be logged in with an account with Administrator privileges. Also, if you are enabling the Administrator account for the first time you will also need to assign it a strong password as it does not have a password by default.
If your C: drive starts to run out of space, one of the most frustrating experiences can be figuring out what can be deleted or moved to another drive in order to free up storage. This is especially true with modern computers that are commonly configured with small SSD drives as their C: drive, which can easily run out of space due to their smaller storage capacity. If you are using Windows Live Mail it will store your email by default on your C: drive. If you are like me and save almost all of your email, then your Live Mail mail store can grow to a very large size. Thankfully, the program provides the ability to easily change the location where your mail is stored so that you can you move it to another drive that may have more free space available. This tutorial will walk you through changing where your Windows Live Mail e-mail is stored.
The built-in Administrator account is one of the most targeted account names by malicious programs and hackers that are attempting to access your computer without your permission. It is therefore a wise security precaution to rename the Administrator account to another less common name so that it can no longer be targeted. By default, the Administrator account in Windows Vista, Windows 7, and Windows 8 are disabled, while in Windows XP it is enabled. Regardless, of your Windows version, if you choose to use the Administrator account, you can use the following tutorial to rename the account to make it less susceptible to hacking attempts.
Most people think computers, being electronic devices, don't require any mechanical maintenance, but this is not so. Many computer faults are caused by components overheating due to poor airflow in the case because of a buildup of dirt and dust over time. It's worthwhile cleaning your computer annually or even more often if it is in a particularly dusty environment, on carpet or in a household with pets. This tutorial is designed to help you safely clean the interior of your tower or desktop PC so as to maximize its lifespan. No computer knowledge is assumed other than familiarity with component names. Cleaning the computer is not rocket-science and does not require any special skills or tools but you do need to know how to avoid possible damage to some of the more sensitive parts. That's what we will demonstrate here. Although the same principle applies to laptops and notebook PCs, because of the difficulty dismantling them these instructions do not apply to those types of computer.