Advert

How to Install Fonts

Last edited by . Total of no comments in the discussion.

Fonts are typefaces that we see on the monitor screen. Arial and Times New Roman are examples of fonts, and they outline the shape of the characters that appear on the screen. A font could be a serif font or a sans serif font and can be used in several different sizes. There are basically three types of fonts: TrueType fonts that you can use on any version of the Microsoft Windows operating system. OpenType fonts that you can use with Microsoft Windows 2000 and later versions. PostScript Type1 fonts Read More

Share on:

mfefire.exe

Last edited by . Total of no comments in the discussion.

Mfefire.exe is McAfee Anti-virus Firewall Service’s process. The McAfee Firewall prevents malicious programs from installing themselves or third party components on the computer. Mfefire.exe is not a system process, but is required to run the McAfee Firewall. Mfefire.exe generally runs on the Windows Operating System and can be found in the primary hard drive’s Program Files folder.   How Mfefire.exe Works Mfefire.exe runs in the computer background and, when activated, prevents programs from running and/or installing themselves on the computer without permission. It detects processes as they attempt to run, Read More

Share on:

COM Surrogate Has Stopped Working

Last edited by . Total of no comments in the discussion.

A common problem that Windows Vista users face is getting the “COM Surrogate Has Stopped Working” error message whenever a folder that contains multimedia or video files is opened. COM components that third party applications that are not fully compatible with the Windows Vista (and other versions of the Windows platform) install normally cause this error. Some applications that have been known to cause the error include DivX and Nero. There are a number of solutions that have been found to solve the error depending on the specific build of Read More

Share on:

Analyzing ISA Server Performance using ISA Server Reporting

Last edited by . Total of 1 comment in the discussion.

Understanding the ISA Server Reporting Feature ISA Server includes a reporting feature that you can use for a number of purposes: Use reports to obtain and view information on usage statistics of the server for both computers and client users. Create your own reports. Each report here consists of a number of sub-reports, taking the form of charts and graphs. This concept is illustrated on the 2nd page of the Article: The predefined ISA Server reports are listed here: Summary reports: These reports combine data from the Firewall service log Read More

Share on:

Active Directory Security

Last edited by . Total of 2 comments in the discussion.

Active Directory security is determined by the following components: * Security groups: A security group is a made up of a set of users, and is created to assign permissions to access resources, and to assign user rights to group members. Permissions control access to resources, while user rights define what actions users can perform. Security groups are considered security principal accounts because they can contain user accounts. It is the security principal accounts that are used in authentication and access control. The security settings of a security principal account Read More

Share on:

Logical Structure of an Active Directory

Last edited by . Total of no comments in the discussion.

Active Directory fulfills all the needs of an organization by designing a directory structure. It provides flexibility in designing the business structure according to current and future needs for an organization, so it should be examined prior to installing active directory. In Active Directory, resources are organized in a logical structure, and this grouping of resources logically enables a resource to be found by its name rather than by its physical location. Benefits of AD Logical Structure Logical Structure provides more network security by means of providing access to resources Read More

Share on:

How to Recover a Lost Windows Password

Last edited by . Total of 9 comments in the discussion.

There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen. There are two options for logging into an administrator account: The first option is to start up the machine in the welcome or log in screen and pull up the classic log in screen. Press Read More

Share on:

How to Audit Windows NT/2000/XP Passwords

Last edited by . Total of no comments in the discussion.

Microsoft Windows NT/2000/XP passwords are encrypted as 32-bit one-way hashes using the MD4 messages digest algorithm. This is similar to the way that Unix stores passwords, although the hashing algorithm is different. For compatibility with legacy Microsoft LAN Manager software, Windows NT/2000/XP also stores the passwords redundantly as a 56-bit DES (Data Encryption Standard) hash. This 56-bit hash is created by splitting the password into two 7-character uppercase strings, and then converting each to a 56-bit DES key which both then encrypt the string “KGS!@#$%” and concatenating the results. This Read More

Share on:

Understanding Active Directory

Last edited by . Total of no comments in the discussion.

The Limitations of the Windows NT Domain Model and Network Security With Windows NT, domains were utilized to manage users, and to manage and secure network resources. A domain is the logical grouping of servers and network resources under a single domain name. In Windows NT, a domain could be considered as a central database containing security information which was then basically used to manage users and network resources. The Windows NT computers operated as domain controllers, with each domain essentially having one Primary Domain Controller (PDC) and one or Read More

Share on:

How to Turn Off Your Computer in Vista

Last edited by . Total of no comments in the discussion.

Turning off your computer in Vista can be a bit tricky because Vista doesn't show you a "Turn off computer" button. So when you want to turn off your computer, here are four simple options: Method 1 Start up your computer. Click on the power button in the Start menu. If you see a yellow exclamation point on the power button that means Vista will install updates before it turns your computer off. Method 2 Lock your computer Click on the lock button in the Start menu. To be able Read More

Share on: