Installing and configuring a Domain controller might be a piece of cake to anyone, we can just to go google or YouTube and with the few clicks, there BOOM our domain controller is ready to go live. But have we ever thought the domain controller which we have installed and configured is proper??? Is it
HI, back again to the blog. This time I have been doing research for the ‘GROUP POLICY EDITOR’ for server 2008 R2 and Server 2012. During my research I found that ‘GPMC’ is a quite vast tool and can control almost everything of the system on AD. Here I have created a custom group policy
After a long time I am again back to my blog….it has been almost 2 months I was on vacation. Now just returned to my normal life. Few days ago, I have an issue of creating a automatic shortcut on the desktop of the machine which was the member of the domain. I Struggle with
I have been playing with windows 7 when the pre-beta version of windows 7 had been released. I was so happy to see the different new feature on the windows 7 in respect to the older version of operating system, and performance was awesome…….I too was surprised to learn hidden control panel applets of windows
Some days ago when we few friends meet carrying our laptop we try to play the game with each other, connecting the laptop to a local access point… and if there is absence of that access point then the day use to be worse…we only don’t get the medium to connect our laptop and enjoy
Market running with a lot of rumors….and while talking about the future operating system is first we get a little news and second is it is hard to speculate two years out about technology that might change considerably between now and then. But this time the Intel has announced that USB 3.0 will be an
Few months ago I had blogged the virtual XP mode in the in Windows 7….Where you can use all your real hardware in the virtual mode of XP which was the great facility for us…if also our hardware was not capable to run in the Windows 7 we can easily go to the virtual mode and
Authors of rogue antivirus software hesitate little when it comes down to copying the design and branding of official security solutions in an attempt to pass their fake antivirus code as genuine offerings. It is, of course, just one of the aspects of the social engineering techniques designed to trick end users into paying for
Hiren’s Boot CD is a boot CD containing various diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems. It is a Bootable CD; thus, it can be useful even if the primary operating system cannot