Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Vista
Change page: < 1 2 3 4 5 6 7 8 9 10 >  |  Displaying page 8 of 10, items 351 to 400 of 465.
Installing Windows Vista : Troubleshooting Installation Issues
Windows Vista includes numerous tools and features for troubleshooting a wide variety of potential installation issues. In some cases, however, customers might choose to reinstall the operating system. This should generally be considered a last resort because it can result in the loss of all operating systems and installed applications.
Improving System Performance (part 3)
The Disk Cleanup tool provides a quick way to identify temporary files that the system no longer needs. You can access it through the Start menu or by clicking Disk Cleanup in the Properties dialog box for a particular hard disk. The latter option is helpful if you want to restrict the cleanup operation to a single logical hard disk partition.
Improving System Performance (part 2)
The Windows Vista operating system keeps track of numerous different events that occur while the system is running. The types of messages include notifications from applications, system-related details, and security events. With relation to performance monitoring and optimization, particular portions of the event logs can be useful.
Improving System Performance (part 1) - Developing a Performance Optimization Approach & Managing Startup Programs
An important goal for the Windows Vista operating system is to provide the best possible performance for users. When people can use programs more quickly, they tend to be more productive. Numerous enhancements have been included in the core operating system to improve memory, disk, CPU, and network performance.
Using the Windows Vista Performance Tools (part 2)
You can save the data collected by the System Information tool so you can open it later on either the same or another computer running Windows Vista. The default file extension is .nfo.
Using the Windows Vista Performance Tools (part 2)
Windows Vista includes a powerful tool called Performance Monitor. As its name implies, Performance Monitor provides a method for collecting and viewing statistics about particular areas of system performance.
Using the Windows Vista Performance Tools (part 1)
Windows services are programs that are designed to run independently of a user. Unlike applications such as Internet Explorer, they do not require users to start them manually
Configuring Windows Vista Security : Understanding User Account Control (part 2)
With all of the options available in the Local Security Policy console, it might be tempting to try to change configuration settings just to see what happens. Although this can be a good method for learning, it’s important to make these changes on noncritical systems (such as a test computer).
Configuring Windows Vista Security : Understanding User Account Control (part 1)
Microsoft designed the UAC feature of Windows Vista to allow users to log on to their computers using a standard user account.
Configuring Windows Vista Security : Managing User Accounts
Modern operating systems such as Windows Vista have been designed to meet the needs of many different users. Accordingly, the operating system provides a method for creating multiple user accounts on a single installation of Windows Vista. You can configure and customize each user account based on the needs of the individual who will be using it.
Using Windows Security Center (part 3) - Configuring Malware Protection
Antimalware products are available from Microsoft and a number of different vendors. These programs have been designed to protect systems against the installation and operation of malware by providing several layers of protection.
Using Windows Security Center (part 2) - Configuring Automatic Updating
A critical aspect of maintaining security is to keep operating systems up to date. Over time, security or reliability problems might be found, and updates are necessary to avoid any potential problems
Using Windows Security Center (part 1) - Overview of Windows Security Center & Configuring Windows Firewall
Microsoft designed Windows Firewall to restrict inbound and outbound traffic based on a series of configurable rules. The goal is to ensure that only certain types of applications and services are able to connect to the computers.
Configuring Parental Controls (part 4) - Managing Application Restrictions & Reviewing Activity Reports
The activity reporting feature is designed to provide parents with an easy way to collect a wide variety of information about children’s usage patterns. When Parental Controls are enabled, activity reporting is also enabled by default.
Configuring Parental Controls (part 3) - Defining Computer Time Limits & Configuring Game Settings
Like other types of media, entertainment software such as games can contain a broad array of different types of content. Parents might feel that certain types of content are inappropriate for their children.
Configuring Parental Controls (part 2) - Defining Web Restrictions
Web restrictions settings enable parents to define which types of content are accessible to children who are using the computer. To access these settings, first enable Parental Controls for the child’s user account
Configuring Parental Controls (part 1) - Understanding Parental Controls
The Windows Vista Parental Controls feature is designed to provide several different types of restrictions on how children access programs and Web sites. It can also control when they can use the computer
Working with Mobile Devices (part 2) - Using Windows Sync Center
Windows Sync Center is designed to enable multiple computers and mobile devices to keep important information synchronized. It supports any computer that is running Windows Vista, as well as mobile devices that are running the Windows Mobile platform.
Working with Mobile Devices (part 1) - Using Windows Mobility Center
Portable devices such as notebook computers provide many useful features for customers who travel often or who work at multiple locations.
Installing and Managing Media Devices (part 4) - Installing and Managing Printers
Windows Vista includes a large database of available printer drivers. In most cases, the process of plugging in a wired printer results in the automatic installation of the appropriate drivers.
Installing and Managing Media Devices (part 3) - Using Windows Fax and Scan
The Windows Fax and Scan program allows users to perform the most common operations through an analog modem that is connected to a phone line.
Installing and Managing Media Devices (part 2) - Working with Scanners and Digital Cameras
In some cases, Windows Vista might not include the drivers that are required for a particular device. Sometimes, additional software is also required to provide the necessary functionality
Installing and Managing Media Devices (part 1) - Managing Hardware Devices
You first need to verify that the computer has an installed fax-capable modem. Windows Vista supports many different types of hardware devices. The primary location for working with hardware is the Hardware And Sound Control Panel item
Removing Malware from Windows Vista (part 3) - Troubleshooting Internet Explorer
Although the Internet provides numerous benefits to computer users, it also provides a method for malware authors to distribute and collect information from users’ computers. A common target of malware is the Web browser
Removing Malware from Windows Vista (part 2) - Removing Malware by Using Windows Defender
Windows Defender includes a combination of different technologies that are designed to work together to keep users’ systems free of unwanted software. For example, it has the ability to detect malware based on various “signatures” that are stored within its definitions database.
Removing Malware from Windows Vista (part 1) - Understanding Common Malware Issues
Before you can adequately defend a computer against typical types of malware, you must first understand issues related to how malware works.
Diagnosing Issues in Windows Vista (part 6) - Using Other Diagnostic and Troubleshooting Tools
In addition to the troubleshooting tools that you’ve learned about in this lesson, there are some other utilities in Windows Vista that can help in diagnosing and resolving common errors.
Diagnosing Issues in Windows Vista (part 5) - Repairing Windows Vista
You can access the Windows Vista Repair options by booting the computer, using the Windows Vista installation media. Home and small-business users usually receive this media from either their computer manufacturer (if the operating system came preinstalled) or with their retail purchase of the product
Diagnosing Issues in Windows Vista (part 4) - Troubleshooting Startup Problems
The most frustrating part of troubleshooting startup problems is that there is generally no available operating system with which to interact. Without the Windows Vista user interface, it’s not possible to launch standard graphical programs.
Diagnosing Issues in Windows Vista (part 3) - Performing Windows Memory Diagnostics
Modern operating systems such as Windows Vista rely heavily on the use of system memory to speed up common operations. Random access memory (RAM) chips are a very reliable component of the computer’s architecture
Diagnosing Issues in Windows Vista (part 2) - Using System Restore
The most common sources of system-related issues are stored in startup and configuration files and in the Windows Registry. Often, when problems occur, it is useful to revert these files to their previous state.
Diagnosing Issues in Windows Vista (part 1) - Monitoring Windows Event Logs
The Windows event logs enable operating system features, drivers, applications, and services to record important information that users might need to review. Application developers can create their own event logs or write to existing ones.
Using Windows Complete PC Backup and Restore (part 2) - Performing a Complete PC Restore
In the event of hard disk corruption or significant data loss due to hardware failure, the best method of getting up and running might be to restore the complete operating system as well as all user programs and data files
Using Windows Complete PC Backup and Restore (part 1) - Creating a Complete PC Backup
The Windows Vista Complete PC Backup and Restore feature is designed to simplify the process of recovering an entire operating system. The backup that is created includes the entire operating system, installed programs, user-specific and system-specific settings, and data files
Using the Backup and Restore Center (part 4) - Using Previous Versions of Files
Generally, the process of creating backups is useful for ensuring that your data remains protected. It provides an easy way to restore large numbers of files in the case of a large amount of data loss.
Using the Backup and Restore Center (part 3) - Restoring Files from a Backup
So far, you have focused on the process of performing backup operations on a computer. Of course, the primary purpose of creating backups is to enable restores. The process of restoring data is most easily started by clicking Restore Files in the Backup and Restore Center.
Using the Backup and Restore Center (part 2) - Performing File Backups
The process of backing up files and folders involves making a copy of users’ data and other types of information. This information is stored in a backup location and can later be used to recover information, if necessary
Using the Backup and Restore Center (part 1) - Planning for Backups
Another important consideration related to planning for backups is determining how often the data should be copied. The optimal answer varies based on the ways in which customers use their computers.
Windows Firewall: Bidirectional Protection
The script begins by creating instances of the InternetExplorer and WScript Shell objects. The Navigate method displays a page, and then turns off the toolbar, status bar, and menu bar.
Example: Scripting Internet Explorer
The script begins by creating instances of the InternetExplorer and WScript Shell objects. The Navigate method displays a page, and then turns off the toolbar, status bar, and menu bar.
Programming the WshNetwork Object
WshNetwork is a generic name for an object that enables you to work with various aspects of the Windows network environment.
Supporting Desktop Applications : Repair a Corrupted Operating System (part 4)
This tool is called the System File Checker (SFC); the executable is SFC.exe. It compares the following attributes of the system files on your computer to those that should be on your system
Supporting Desktop Applications : Repair a Corrupted Operating System (part 3) - Complete PC Backup and Restore
Complete PC Backup is an image-based backup tool. It does not just copy files. On the first backup, this feature copies all blocks that contain file content.
Supporting Desktop Applications : Repair a Corrupted Operating System (part 2) - System Restore
System Restore relies on an underlying service called the Volume Shadow Copy Service (VSS) that must be running for System Restore to take its “snapshots” of the system. If this service is stopped, you must start it before System Restore will function properly.
Supporting Desktop Applications : Repair a Corrupted Operating System (part 1)
Application support involves not only supporting applications, but also supporting the underlying operating system. Application availability in a Microsoft environment depends on a functioning operating system.
Maintain Desktop Applications (part 2) - Using Group Policy to Manage Application Compatibility
The Group Policy known as Prevent Access to 16-bit Applications prevents the execution of the NT Virtual DOS Machine (NTVDM.exe) subsystem when enabled.
Maintain Desktop Applications (part 1) - New Program Compatibility Wizard
Every new operating system release from Microsoft has brought new constraints for application behavior. Software vendors in the past had a free ride, for the most part, in where configuration data and application data could reside.
Supporting Desktop Applications : Troubleshoot Software Restrictions
Software restrictions are another way to ensure desktop security. Applications that are not to be used within an enterprise have found their way in one way or another over the years
Support Deployed Applications
Supporting deployed applications involves ensuring the functionality of applications in use while rolling out a brand new operating system. Sounds like the perfect description for a daunting task.
Configure Network Security (part 2 ) - Windows Firewall
Windows Vista now provides a more complete security configuration in the included firewall by allowing for control of outbound connection requests as well as inbound connection attempts.
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server