Browsed by
Year: 2010

How To Auto-Logon To A User Account At Startup In Vista

How To Auto-Logon To A User Account At Startup In Vista

One of the annoying features of Vista is that because you have to create an account and a password for every  PC or device that you want to share files with. Because of this, upon boot up Vista will display all of these accounts, even if you don’t actually use them on the PC, and you also have to login everytime. By following these steps this can be done away with: Click on the Start button and type in ‘netplwiz‘….

Read More Read More

Diagnose slow Windows boot with Event Viewer

Diagnose slow Windows boot with Event Viewer

Microsoft developers did a lot of work to make Windows Vista or Windows 7 boot more quickly than previous versions. But, there are still issues that can make your computer boot more slowly than it should. Event Viewer to track down potential causes of long boot times. Windows Event Viewer is a great tool for gathering information that you can then use to troubleshoot many different problems — including longer than normal boot times. Now, there are a whole host…

Read More Read More

10 PowerShell commands every Windows admin should know

10 PowerShell commands every Windows admin should know

Over the last few years, Microsoft has been trying to make PowerShell the management tool of choice. Almost all the newer Microsoft server products require PowerShell, and there are lots of management tasks that can’t be accomplished without delving into the command line. As a Windows administrator, you need to be familiar with the basics of using PowerShell. Here are 10 commands to get you started. 1: Get-Help The first PowerShell cmdlet every administrator should learn is Get-Help. You can…

Read More Read More

Safely edit the Windows Registry with these five tips.

Safely edit the Windows Registry with these five tips.

The Windows registry is a powerful tool, but one wrong edit can render a Windows machine unusable or worse – unbootable. And there’s nothing worse for an IT pro than making the problem worse while trying to fix an end user’s machine. The first tip should be self-evident, but too many end users and IT pros don’t follow it. And that’s to back up the registry before making any edits. No matter what you are about to do in the registry,…

Read More Read More

How do I use a RAM disk to help speed up disk-intensive applications?

How do I use a RAM disk to help speed up disk-intensive applications?

There are certain applications that do an unusual amount of reading and writing data. Under normal operating circumstances, these applications work fine. But what happens when those disk-intensive applications start competing with other applications? When this happens, a serious slowdown can occur. You can prevent those slowdowns with the help of RAM disks. A RAM disk is basically a special partition of your PC’s memory that has been formatted and configured (via a special application) to be used as a…

Read More Read More

10 Sysinternals tools you shouldn’t be without

10 Sysinternals tools you shouldn’t be without

Sysinternals has been around for quite some time and was acquired by Microsoft in 2006. These are great little tools for getting some heavy-hitting Windows things done and sometimes done better than when using the built-in tools for a task. The entire suite of products is available for download. While this is the easiest way to get the tools because they are bundled together, there are some tools that I find myself using far more than others. Here’s a look…

Read More Read More

How to wipe a hard disk with DBAN

How to wipe a hard disk with DBAN

Any time a hard drive leaves your possession, whether you’re recycling, reselling, or returning it to the manufacturer, you should securely delete the data it contains. Although physically destroying your old hard drives or running them through a degaussing machine are probably the safest ways to protect your data. These options will destroy the drives along with the data. And, they may not be practical in all situations — like when you need to return a drive that’s under warranty….

Read More Read More

Disable Windows Update for device driver installation

Disable Windows Update for device driver installation

When new hardware is installed on a Windows Server, there are a number of options, such as which driver to use and whether to utilize Windows Update for the driver. There are options for specifying this behavior. For standalone systems, the Device Installations settings option from System properties can dictate behavior for device installation. Figure A shows this option for standalone systems. Figure A If the option needs to be centrally managed for a number of computer accounts, Group Policy…

Read More Read More

Malware Infecting Other Malware Can Complicate Antivirus Detection

Malware Infecting Other Malware Can Complicate Antivirus Detection

Malware authors don’t always get along – in fact, there have been a number of instances where attackers target each other. But sometimes, malware infecting malware can be a good thing for attackers. According to Trend Micro Threat Response Engineer Roland Dela Paz, there has been an uptick of this kind of activity, which he called “hybridized malware.” Recently, Dela Paz wrote, Trend observed an IRC bot detected as WORM_LAMIN.AC that was also infected by a mother file infector PE_VIRUX.AA-O. “It’s…

Read More Read More

Malware Infects More than 1.2 Million Web Sites

Malware Infects More than 1.2 Million Web Sites

More than 1.2 million Websites were infected by malware in the third quarter of 2010, according to security firm Dasient. This includes legitimate sites belonging to government agencies and malvertisements, or malicious advertisements. In the third quarter of 2009, there were 560,000 Websites infected. While Dasient’s researchers had expected the number to increase, the fact that it doubled was a surprise, said Dasient CTO Neil Daswani. Instead of just growing in volume, malware has also changed in the way it…

Read More Read More