If you followed our guide to encrypting your removable disks with Bit Locker, you will recall that we saved our recovery key to the cloud, which is a new feature in Windows 8. The first thing we need to do is go and retrieve that key, which can be done by heading over to this URL. At this point you will need to sign into your Microsoft account, the same one you signed into Windows 8 with.
Whether you want to prevent your child from accessing Facebook or are simply sick of the advertisements that litter webpages, a custom hosts file can come in handy.
In this installation of Geek School, we look at how we can administer our machines remotely using Remote Assistance, Remote Desktop, Windows Remote Management also known as WinRM, and PowerShell.
Come and join us as we make a the world a safer place using our Windows Firewall in this edition of Geek School.
In the last two articles, we looked at how to prepare your PC for network access. In this installment, we are going to look at wireless network configuration.
Last time we looked at the theory behind IP addresses, subnet masks and name resolution, and we ended the installment with a practical guide on how to change your network settings. This time we take that knowledge and extend it by introducing things like DHCP, Network Locations, Ping and much more.
In this edition of Geek School, we are going to look at how IP addressing works. We will also cover some advanced topics like how your PC determines if the device you are communicating with is on the same network as you. We will then finish with a brief look at two name resolution protocols: LLMNR and DNS.
Have you seen that message in Windows 8 that tells you your computer is going to reboot and there is not a thing you can do about it except save your work? Here’s how to make sure that never happens again. This tip works for Windows 7 as well.
Internet Explorer is a complex piece of software and hasn’t always been the browser choice of us geeks, but the truth is that it has gotten a lot better over the years so come and see what it has to offer.
In past versions of Windows Server, after using the GUI to add the Active Directory binaries to your server, you would use DCPromo to promote your server into a Domain Controller. However, DCPromo was deprecated with the release of Server 2012.
BitLocker is a lesser-known technology included in Windows that allows you to both password protect and encrypt the contents of your storage mediums.
Have you ever wondered why your favorite game from Windows 95 just doesn’t seem to run on Windows 7 but other applications do? Well we have the answer for you, as well as a few solutions for how to fix it.
Hard Drives: every computer running Windows has them and none can function without them. They house all our data, so we should set them up correctly. Read on to learn more about how to use RAID to protect your data.
In this edition of Geek School we are going to cover the configuration of hardware in Windows 7. Come join us.
In the second installment of our new Geek School series, we walk you through Upgrades and Migrations for Windows 7, from the perspective of learning to take your certification exam.
Most of our readers are familiar with Windows 7, but just how knowledgeable are you? Could you pass a Microsoft certification test? In our new Geek School series, we’re going to try and teach you about technology in a more in-depth fashion – starting with Windows 7, but we’re not stopping there.
By default Windows keeps track of which files you have opened with a particular program in its Jump List. Here’s how to limit the amount of entries it stores or even disable it altogether.
Windows 8 includes a pretty good mail client, however one of the things we don’t like is the fact that it adds a signature to the bottom of your mail.
Windows Defender doesn’t scan removable drives by default, like USB drives or SD cards, but you can quickly change a setting to make that happen automatically.
We are always on the lookout for geeky ways to impress our friends, and recently we came across a way to connect to our wireless network from the command prompt, so today we’ll show you how to do it as well.
We have already shown you how flexible the Linux shell can be, but that’s not to say Windows is any further behind. Here’s two techniques you can use depending on your shell preference, cmd or PowerShell.