Windows 7 Tutorials

Subcategoreis

subcategoryBeginners
subcategoryNetworking
subcategorySecurity and Privacy

Install Windows 7 from a USB Drive

If you want to install Windows 7 on a netbook or other computer without an optical drive, fortunately, you're not out of luck. Windows 7 and Vista can be installed from a USB Storage Drive. Read more...

Configuring Security Policies

Use of Group Policy to help provide your network with a safe and secure computing environment. Malicious individuals are forever devising new means of invading your network to steal and corrupt data Read more...

Installing and Configuring an RODC

Windows Server 2008 introduced the read-only domain controller (RODC), which contains a full replication of the domain database. Read more...

Configuring The Encrypting File System (EFS)

Encrypting File System (EFS) is an encryption service built into Windows 8 that has been around since the release of Windows XP. EFS is designed to provide file level encryption to protect your confidential files when others have physical access to your c Read more...

Automated optimization of disks

As files are created, modified, and moved, fragmentation can occur both within the volume's allocation table and on the volume itself. This happens because files are written to clusters on disk as they are used. Read more...

Design and Implement Data Caching

Windows Store applications have various options to store data, and each has its advantages and disadvantages. The right place to store information or cache depends on the application, the scenario in which the user works, and whether the application relie Read more...

Installing and Configuring DFS Replication

The other part of DFS is DFS Replication. DFS Replication enables you to replicate folders between multiple servers. To allow efficient use of the network, it propagates only the changes, uses compression, and uses scheduling to replicate the data between Read more...

Auditing File and Folder Access

Access permissions only help protect data; they don't tell you who deleted important data or who was trying to access files and folders inappropriately. Read more...

Implementing Active Directory Domain Services

The process of implementing Active Directory Domain Services (AD DS) is similar whether you are installing Active Directory for the first time or extending your existing Active Directory infrastructure. Read more...

Configuring File and Storage Services Windows Server

In this tutorial, we will examine the various aspects of Windows Server 2012 storage and firewall services. The various types of storage technologies, this tutorial will primarily focus on iSCSI because of the native features in Windows Server 2012. We wi Read more...

Installing and Configuring Device Drivers

Devices have changed from being single-function peripherals to complex, multifunction devices, with a large amount of local storage and the ability to run applications. They have evolved from a single type of connection, such as USB, to multi transport de Read more...

Windows Quick and Easy Solutions

We have quick and easy solutions for some of the most annoying PC problems, covering everything from sluggish speeds and desktop deficiencies to boot problems, installation issues, cryptic error messages and more. So don't just put up with Windows Read more...

Windows 8 Security Tips

Windows 8 is being touted as a major change in the way that people will use and interact with their PCs, tablets and other devices. Much of the change is evident in the user interface, with its tiled appearance and app-friendly setup. Read more...

Windows Desktop Tips

The windows desktop has been around 18 years, but if it is new to you, here is how to get to grips with it. Many people keep program? shortcuts on their desktop, but open windows can block your view of the desktop. Read more...

Windows 8 Shortcut Keys

Make life a lot easier - and save a bunch of time too - with this collection of 40 great shortcuts for windows 8. Read more...

(149 Tutorials) Page 1 of 10 123 Next