This tutorial will walk you through recovering deleted, modified, or encrypted files using Shadow Volume Copies. This guide will outline using Windows Previous Versions and the program Shadow Explorer to restore files and folders as necessary.
In Windows it is possible to configure two different methods that determine whether an application should be allowed to run. The first method, known as blacklisting, is when you allow all applications to run by default except for those you specifically do not allow. The other, and more secure, method is called whitelisting, which blocks every application from running by default, except for those you explicitly allow.
If you are a system administrator, IT professional, or a power user it is common to find yourself using the command prompt to perform administrative tasks in Windows. Whether it be copying files, accessing the Registry, searching for files, or modifying disk partitions, command-line tools can be faster and more powerful than their graphical alternatives. This tutorial will walk you through creating a command-line toolkit that contains useful programs and utilities that can make administering and using your computer easier and more efficient. The tutorial will also walk you through configuring your PATH environment variable so that these tools are available whenever you need them without having to specify the complete path to your toolkit folder. At the end of the tutorial we have listed a variety of command-line programs that are included with Windows or are by 3rd party developers that you can use as part of your command-line toolkit.
A basic task that all Windows users should know how to do is to change their password. If your computer becomes compromised or you are concerned that someone may know your password, you should immediately change it in Windows.
Whenever you create a new account in Windows, you should create a password reset disk that allows you to reset your Windows account password if you forget it. If you have a lot of users and do not wish to create a reset disk for each one, then you should at least create one for the administrator account on that computer. You can then use that administrator account to change any other user's password. In order to create a password reset disk you need either a floppy disk or a USB drive. As most computers are no longer sold with floppy drives, you may want to pick up a cheap flash drive to use for this purpose. As the password reset disk file only uses 2KB of space, you can use any size flash drive or an existing one if you wish. Last, but not least, a password reset disk only works on local accounts and will not help you reset passwords for accounts on a Windows domain.
If you have forgotten your Windows password and have previously created a Windows Password Reset Disk, you can use this disk to change your password to a new one. This will allow you to login to Windows again using the new password. This tutorial will walk you through the steps of resetting a Windows XP, Windows Vista, Windows 7, and Windows 8 password using a Password Reset Disk.
When Windows is installed on your computer it can be installed as a 32-bit version or a 64-bit version. For most people, whether they use a 32-bit or a 64-bit version of Windows does not make a difference. It is, though, important to know whether you are running a 64-bit or 32-bit version of Windows when performing certain tasks on your computer. For example, if you install new hardware or update existing hardware drivers, then you need to know what version of Windows you are using so you can download the appropriate driver. This tutorial will explain how you can determine if you are running a 32-bit or a 64-bit version of Windows.
If you do not want users on a computer to be able to have the Lock option when they enter the Ctrl+Alt+Delete keyboard combination, you can disable it via a policy in the Group Policy Editor or via a Registry key.
Windows allows you to lock your screen so that others cannot access your computer without entering your password. This is very useful when you need to be away from your computer and do not want other people to use it or access your documents. This tutorial will walk you through locking your screen in all versions of Windows as well as a method of automatically locking your screen when your computer has been idle for a certain amount of time.
To achieve the best performance on your computer, it is suggested that you log off an account instead of switching to another one using Fast User Switching. By logging off an account, all the previous user's programs and files will be closed. This will allow the new account to have access to all of the computer's resources, which will allow it to be faster.