Almost everyone with a computer and internet access has at least one email address, often more. How you access your email depends on the method you choose. Some people use webmail services… Read More
As Microsoft “improves” its Internet Explorer web browser they make changes for security and performance improvements. But as they make these changes we end users have to deal with adjusting the browser… Read More
IPv4, the Internet Protocol that was chosen to be used as the backbone for the internet, is in the process of being phased out in favor of its successor known as IPv6.… Read More
Unlike group types, which are fairly simple to understand, group scopes can be frustrating to those new to working with Windows Server and Active Directory. The scope of the group identifies the… Read More
WEP (Wired Equivalent Privacy) was originally intended to give you the same or similar level of security as on a wired network but it turns out that it does not. WEP works… Read More

The video card is the hardware component in your computer that translates the video signal from your computer to your monitor. Without one you can’t see what is going on with your… Read More
If you use a Windows 2000, XP or Vista (or newer) client to connect to a Windows 2000 or 2003 (or newer) Server using remote desktop and get an error that says… Read More
Windows has always offered a way to shut down your own computer or other computers on the network remotely via a command line using the shutdown command. This comes in handy if… Read More
When it comes to web search engines, Google has become the most widely used search engine in the world. Many web surfers users prefer Google for a variety of reasons. Some may… Read More
With the introduction of Windows Server 2003 came some new command line utilities designed to make server and network administration easier. These commands are used to configure and repair the operating system… Read More
