Windows 7 Tutorials
Subcategoreis
Manage public cloud services. This objective may include, but is not limited to: Manage Windows Live services including trusted PC, storage, SkyDrive/Live Mesh apps, and groups; implement Office 365 using the Office 365 desktop setup; manage Office 365.
Read more...
In this tutorial, you will learn how to work with Internet Information Services (IIS). The IIS server role gives an environment the ability to have web services for both internal- and external-facing websites.
Read more...
Despite our care and attention, despite our best efforts to design the perfect Exchange server environment, something will inevitably go wrong at some point.
Read more...
Windows Internet Naming Service (WINS) enables computers to register and resolve Network Basic Input/Output System (NetBIOS) names on Internet Protocol version 4 (IPv4) networks.
Read more...
Computers are useful beasts that do some pretty amazing tricks. However, one trick they haven't yet mastered is selfmaintenance. Most of our other appliances run for years without much tending, but our computer appliances, being much more complex than you
Read more...
Everyone who uses Windows knows that you typically sign in, or "log in" as we used to say, to the PC using an account with which unique settings, documents and files, and even applications are associated.
Read more...
Configure system recovery options. This objective may include but is not limited to configure startup settings; configure System Restore; determine when to choose Last Known Good Configuration; perform a complete restore; perform a driver rollback; and pe
Read more...
Users and computers are the basic leaf objects that populate the branches of the AD DS tree. Creating and managing these objects are everyday tasks for most AD DS administrators.
Read more...
How to fix a problem involving Windows startup. Obviously, your computer isn't much use to you if you can't start it up and get to the logon screen. The startup system for Windows changed significantly in Windows Vista, and it has changed again with Windo
Read more...
The uptake and usage of virtualization varies depending on the industry and application, but there can be no doubt that even as portable computers and smartphones become more powerful-now equipped with quad-core processors as standard- virtualizing operat
Read more...
Over the years, you've probably seen new Windows versions as well as hundreds, if not thousands, of updates from Microsoft. Updates can offer new functionality, fix problems, plug security holes, and update drivers.
Read more...
In this tutorial, you'll find plenty of ways to improve system performance and get more productive when using Windows 8. Whether using the Task Manager to rev up your PC, using the new File History tool for recovering old versions of files, or finding out
Read more...
There is an old saying that nothing lasts forever, which means one should live it up, take chances, and never have any regrets. That might be sound advice in some situations, but it's not the approach you want to take when it comes to protecting your data
Read more...
Authentication is the act of confirming the identity of a user or system and is an essential part used in authorization when the user or system tries to access a server or network resource.
Read more...
This article describes how Mobile Internet Protocol version 6 (IPv6), defined in RFC 3775, allows an IPv6 node to change its location on an IPv6 network and still maintain existing connections.
Read more...