Advert

Cannot Copy and Paste in Windows

Last edited by . Total of 1 comment in the discussion.

Copy and paste are Windows commands that allow users to copy content from a source that is then “pasted” in another window or program. The process can be done by selecting any supported content such as text or a file on the disk, right clicking to open the context menu, selecting copy from the list, moving the cursor to the next location and opening the context menu again, then selecting “paste.” It can also be handled with the hotkeys, “Ctrl+C” to copy and “Ctrl+V” to paste. An example of the Read More

Share on:

Implementing Folder Redirection with Group Policy

Last edited by . Total of 2 comments in the discussion.

An Overview on Folder Redirection Folder Redirection is a Group Policy feature that enables users to redirect the system folders containing the profile of a user on the network, through the use of the Folder Redirection node in the Group Policy Object Editor console. This basically makes folder redirection a user configuration option. Through the use of the Folder Redirection feature, users can configure that the system folders’ contents on the user remains the same, irrespective of the particular computer used to log onto the system. The system folders that Read More

Share on:

How to Uninstall Vista

Last edited by . Total of 9 comments in the discussion.

Although Vista is the most recent and technologically advanced operating system available from Microsoft, many users still consider Windows XP or other operating systems more stable. One of the reasons that many end users who have Windows Vista loaded onto their computer want to uninstall it is that many computers just are not powerful enough or configured properly to take advantage of all of Vista’s features. Uninstalling Vista is, in most cases, a fairly simple process. The process takes about an hour or two. Here are some tips. There are Read More

Share on:

Ntoskrnl.exe is Missing or Corrupt

Last edited by . Total of no comments in the discussion.

The NTOSKRNL.EXE is missing or corrupt error message is usually encountered during the boot process of NT based Windows operating systems. It can also be classified as a blue screen error, which is a colloquial term coined by users to describe error screens displayed by Windows. These errors are displayed due to critical system errors which may cause the system to shutdown to avoid system damage. This specific error may occur because of common hardware failure, the Ntoskrnl.exe file is missing or corrupt, Windows is not installed in the location Read More

Share on:

Shared Folder Permissions

Last edited by . Total of 11 comments in the discussion.

Shared folder permissions are used to restrict access to a folder or file that is shared over a network. Folder sharing is normally used to grant remote users access to files and folders over a network. Web sharing grants remote users access to files from the Web if Internet Information Services (IIS) is installed. Members of the Administrators or Power Users group can share folders on a Windows member server. Users have to be members of the Administrators or Server Operators group to share folders on a domain’s domain controller. Read More

Share on:

What is a CDFS?

Last edited by . Total of no comments in the discussion.

The term CDFS (CD File System) is used for both the Linux and Windows Operating Systems (OSs). CDFS is a file system that was created for Linux in 1999 and exports all boot images and tracks on a CD as normal files. On the Windows OS, CDFS is the driver file that is used to support CD-ROM players and replace the traditional MSCDEX driver used on MS-DOS. CDFS also uses a VCACHE driver to control CD-ROM caches on Windows computers, which makes music playback smoother. CDFS Commands on Linux CDFS Read More

Share on:

Monitoring and Troubleshooting Internet Connectivity

Last edited by . Total of no comments in the discussion.

Common Methods for Troubleshooting Internet Connectivity With the technology available today, Internet connectivity can be established in various ways: Remote access server Network Address Translation (NAT) Internet Connections Sharing (ICS) A direct connection by using a device such as a modem or network card Because of the various methods in which Internet connectivity can be established, and the manner in which certain organizations are dependent on the Internet for daily business transaction, it is important to have some knowledge on the methods which you can utilize to troubleshoot Internet connectivity Read More

Share on:

Error Number: 0x800CCC0E

Last edited by . Total of 9 comments in the discussion.

Error Number: 0x800CCC0E occurs in the Microsoft Windows family of operating systems when there is a problem with Microsoft Outlook Express. A conflict with Simple Mail Transfer Protocol (SMTP) servers while using one of the Microsoft Outlook Express programs to read or browse through mail traditionally causes the error. The full text associated with the error may be: “The connection to the server has failed. Account: , Server: , Protocol: SMTP, Port: 25, Secure (SSL): No, Socket Error: 10051, Error Number: 0x800CCC0E.” What Causes this error? The Error Number: 0x800CCC0E Read More

Share on:

How to Flip a Computer Screen Upside Down

Last edited by . Total of 1 comment in the discussion.

Windows Hot Keys allow computer users to conduct specific Windows operating system (OS) functions without having to navigate to application menus, which saves time. A common task that can be accomplished through Window Hot Keys is flipping a computer screen upside down. The resulting display can also be reversed with a similar method or by using applications found in the Windows Control Panel. How to Flip a Computer Screen Upside Down with Windows Hot Keys Step 1 – Press the “Ctrl” + “Alt” + “Down Arrow” keys simultaneously. The computer Read More

Share on:

Understanding Host Name Resolution

Last edited by . Total of no comments in the discussion.

Understanding the Purpose of Host Names In TCP/IP based networks, the packets that are transmitted over the network contain the following IP addresses: The IP address of the computer sending the packet The IP address of the destination computer intended to receive the packet. The IP address information is used to forward the packet to the destination computer. The IP addresses of computers therefore have to be both unique and correct so that they can be forwarded to the correct destination. IP addresses also contain the following important information: Network Read More

Share on: