SEARCH

INFORMATION TECHNOLOGY ARTICLES

There are numerous modern apps that are a built into Windows 8 and they are featured prominently on the Start screen. It may well be the case that you don’t want to use them because they just aren’t apps you’re interested in, or it may be that you have found a better alternative.

about 1 year ago - by  |  Comments (3)

Internet Explorer is a complex piece of software and hasn’t always been the browser choice of us geeks, but the truth is that it has gotten a lot better over the years so come and see what it has to offer.

about 1 year ago - by  |  Comments (0)

In past versions of Windows Server, after using the GUI to add the Active Directory binaries to your server, you would use DCPromo to promote your server into a Domain Controller. However, DCPromo was deprecated with the release of Server 2012.

about 1 year ago - by  |  Comments (0)

Have you ever wondered why your favorite game from Windows 95 just doesn’t seem to run on Windows 7 but other applications do? Well we have the answer for you, as well as a few solutions for how to fix it.

about 1 year ago - by  |  Comments (6)

Hard Drives: every computer running Windows has them and none can function without them. They house all our data, so we should set them up correctly. Read on to learn more about how to use RAID to protect your data.

about 1 year ago - by  |  Comments (8)

In this edition of Geek School we are going to cover the configuration of hardware in Windows 7. Come join us.

about 1 year ago - by  |  Comments (10)

In the second installment of our new Geek School series, we walk you through Upgrades and Migrations for Windows 7, from the perspective of learning to take your certification exam.

about 1 year ago - by  |  Comments (10)

Most of our readers are familiar with Windows 7, but just how knowledgeable are you? Could you pass a Microsoft certification test? In our new Geek School series, we’re going to try and teach you about technology in a more in-depth fashion – starting with Windows 7, but we’re not stopping there.

about 1 year ago - by  |  Comments (24)

Have you ever needed to backup your Citrix Xen Virtual Machines (VMs) but didn’t want to break the bank doing it? HTG has just the bash script for you with Xen-pocalypse.

about 2 years ago - by  |  Comments (1)

If you are a command line junkie like me, and have been testing out Windows 7 or Vista… one of the first things you’ll notice is that there is no way to run a command from the run box in “Administrator” mode. Until now.

about 2 years ago - by  |  Comments (92)

In years past, automating network drive creation required the use of primitive batch files, luckily for us you can now do it through PowerShell.

about 2 years ago - by  |  Comments (11)

We’ve talked about how to use LVM before, but what if you wanted to accomplish the same tasks only with a comfortable graphical interface? HowTo Geek dives into how to manage LVM drives with a GUI.

about 2 years ago - by  |  Comments (3)

Image by kaneda99.

about 2 years ago - by  |  Comments (0)

PowerShell 3 has a lot of new features, including some powerful new web-related features. They dramatically simplify automating the web, and today we are going to show you how you can extract every single link off a webpage, and optionally download the resource if you so wish.

about 2 years ago - by  |  Comments (7)

PowerShell is a great way to automate almost anything in Windows. However, its not just a scripting language. If you find yourself using it as a command line shell it may be useful to store your functions and customizations in a profile that gets loaded every time you load the Console. Read on to find out how.

about 2 years ago - by  |  Comments (9)

Linux’s terminal commands are powerful, and Linux won’t ask you for confirmation if you run a command that won’t break your system. It’s not uncommon to see trolls online recommending new Linux users run these commands as a joke.

about 2 years ago - by  |  Comments (69)

On Linux, the Root user is equivalent to the Administrator user on Windows. However, while Windows has long had a culture of average users logging in as Administrator, you shouldn’t log in as root on Linux.

about 2 years ago - by  |  Comments (23)

Want to allow a standard user account to run an application as administrator without a UAC or password prompt? You can easily create a shortcut that uses the runas command with the /savecred switch, which saves the password.

about 2 years ago - by  |  Comments (15)

VirtualBox and VMware both create virtual machines with the NAT network type by default. If you want to run server software inside a virtual machine, you’ll need to change its network type or forward ports through the virtual NAT.

about 2 years ago - by  |  Comments (5)

Want to secure your SSH server with easy-to-use two-factor authentication? Google provides the necessary software to integrate Google Authenticator’s time-based one-time password (TOTP) system with your SSH server. You’ll have to enter the code from your phone when you connect.

about 2 years ago - by  |  Comments (15)

Most people know that you can enable or disable the optional Windows features through the Control Panel, but today we’re going to show you how you can do the same thing through the PowerShell command line.

about 2 years ago - by  |  Comments (3)

The X server on Linux provides your graphical desktop. If it crashes, you’ll lose all unsaved work in graphical programs, but you can recover from the crash and restart the X server without restarting your computer.

about 2 years ago - by  |  Comments (6)

On Linux, the magic SysRq key can send commands directly to the Linux kernel. You can use it to recover from freezes or cleanly restart your system, even if nothing appears to be responding.

about 2 years ago - by  |  Comments (18)

As part of their ongoing push to simplify their product lineups, Microsoft is discontinuing their popular small office/home server platform Windows Home Server. On to see the new alternative for small volume users.

about 2 years ago - by  |  Comments (17)

VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works.

about 2 years ago - by  |  Comments (13)