Fast user switching is a feature in Windows that allows you to switch to another user account on the same computer without logging off. This allows multiple users to use the same computer while keeping each account's programs and files open and running in the background. As you can imagine, this can be useful when someone wants to use their computer but another account is logged in with open files and programs. Instead of taking the risk of closing the user's programs and possibly losing data, a user can instead just switch to their account without affecting the other one.
It is important to know how to properly shut down or restart your computer so that you do not lose data or corrupt important Windows files or Registry locations. Many people think that you shut down your computer simply by pressing the power button. On some configurations, this will work as Windows will recognize that you press the power button and shut it down gracefully. On the other hand, if your computer is not configured to do this, when you press the power button the computer will turn off and any unsaved data in Windows will be lost. Shutting down a computer this way could also cause data corruption on your hard drive or within Windows.
An account picture is the small image that is shown in your Start Menu and in the login screen next to your account name. Windows 7 allows you to select an image from a small set of built-in images or you can add a custom image to it instead. This tutorial will walk you through changing your account picture to a built-in or custom picture.
When using Windows there may come a time where you will need to close a program or process that is not responding or that you are concerned is a computer infection. This tutorial will walk you through using the Windows Task Manager to close a program when you cannot close it normally.
The Windows Task Manager is a program that comes with Windows and displays information about the processes running and the resources being utilized on your computer. This utility allows you get a good overview of the tasks your computer is performing and the amount of resources each task is utilizing. Using this information you can tune your computer to run optimally and efficiently by disabling programs that may be using too many resources and thus slowing down your computer.
If Windows is configured with the wrong time and date, lots of strange and unpredictable behavior can occur. For example, browsers will state that web site certificates are invalid, Windows Update may not work properly, or you may receive alerts that Windows needs to activate again. There are typically two reasons for Windows showing the wrong time and date. The first is because you have the time zone set incorrectly and the second reason is because your BIOS battery in your computer has failed and the current time is not being saved when you shut off the computer.
When Windows, like any other operating system, is created there are bugs introduced into the software that could affect how the operating system runs. These bugs could cause Windows to not run reliably or could cause security vulnerabilities that would make Windows vulnerable to attacks. When these bugs are discovered, Microsoft creates updates to fix these issues and makes them available through the Windows Update utility. There is no set day that updates are released, except when it comes to security updates. Microsoft traditionally releases security updates for Windows on the second Tuesday of each month, which has become known as Patch Tuesday. In some cases, if a particular vulnerability is severe enough, Microsoft may release an update earlier in order to mitigate any issues that may be caused by this vulnerability. When Microsoft releases a security update ahead of schedule, this is called an out-of-band security update.
Many organizations that use Remote Desktop Services or Terminal Services are not using a VPN connection before allowing connections to their in-house servers or workstations. If no VPN is required, this means that the Terminal Server or Remote Desktop is publicly visible and allows connections from anyone on the network and in most cases the Internet. This is a major security risk because it allows remote hackers to attempt to use password cracking attacks on your accessible servers in order to gain remote access. As Remote Desktop Services are configured by default to listen on TCP port 3389, all a hacker has to do is scan the Internet for computers that have that port open and then use a cracking program to try and crack the computer's accounts and passwords. This may seem like a hard task, but it is actually not difficult at all using free and publicly available tools.
When you delete a file in Windows it is usually not permanently deleted. Instead, Windows moves the file to a special location called the Recycle Bin. First implemented in Windows 95, the Recycle Bin is a special directory where deleted files are stored in the event that you need to recover them. Sometimes the Recycle Bin is referred to as the trash, trashcan, or garbage. As a computer user, use of the Recycle Bin system is an extremely common task that is important to know about in order to effectively manage files. The purpose of this guide is to explain how to use the Recycle Bin to review, restore, and permanently erase your files. Additionally, this tutorial will cover some special settings that the Recycle Bin has.
When you double-click on a file in Windows, it will automatically open a default program that is configured to manage these types of files. It is common, though, want or need to use a different program to open a particular type of file. This tutorial will explain how to open a file using a different program than the default one.