SEARCH

WINDOWS ARTICLES / EVERYTHING ABOUT MICROSOFT WINDOWS

Windows has included batch files since before it existed… batch files are really old! Old or not, I still find myself frequently creating batch files to help me automate common tasks. One common task is uploading files to a remote FTP server. Here’s the way that I got around it.

about 11 months ago - by  |  Comments (46)

Normally, the command prompt can be opened as a regular user to run commands that don’t require administrative rights. However, if you need to run a command that requires administrative rights, you must open the command prompt window as administrator.

about 11 months ago - by  |  7 Replies

Google made 64-bit builds of Chrome available in the Dev and Canary channels during the early part of June, but as of this week, those 64-bit builds have graduated to the Beta channel. So if you were waiting for a more stable version to try, then now is the time to grab a copy of the new 64-bit build for your system!

about 11 months ago - by  |  1 Reply

Have you ever noticed that little blinking line at the end of whatever you are typing? Of course you have! But did you know that you can make the line darker if you want to? It also makes a fun prank setting to mess with your friends.

about 11 months ago - by  |  1 Reply

Windows is packed full of system tools, and many of them are in the Administrative Tools folder. The tools here are more powerful and complex, so they’re hidden where most Windows users won’t stumble across them.

about 11 months ago - by  |  1 Reply

Set up a new disk on Windows 8.1 or 8 and you’ll be asked whether you want to use MBR or GPT. GPT is the new standard and is gradually replacing MBR.

about 11 months ago - by  |  13 Replies

Windows’ BitLocker encryption defaults to 128-bit AES encryption, but you can choose to use 256-bit AES encryption instead. Using a 256-bit AES key could potentially offer more security against future attempts to access your files.

about 11 months ago - by  |  3 Replies

Unknown devices show up in the Windows Device Manager when Windows can’t identify a piece of hardware and provide a driver for it. An unknown device isn’t just unknown — it’s not functioning until you install the right driver.

about 12 months ago - by  |  15 Replies

It’s happened to everybody at some point—you go to install a new application, and Windows tells you to reboot first. Or reboot after. Or it asks you to close out of every other application first. Why does it do that?

about 12 months ago - by  |  4 Replies

Ask any PC tech person how to make your computer faster, and almost every one of them will tell you to defrag your PC. But do you really need to manually trigger a defrag these days?

about 12 months ago - by  |  9 Replies

Being able to find your favorite applications using substrings makes your workload just a bit easier to deal with, but what do you do when this useful search feature stops working? Today’s SuperUser Q&A post has the answer to solve a reader’s ‘broken’ search feature problem.

about 12 months ago - by  |  1 Reply

Windows 8.x finally bundled an antivirus utility that used to be called Microsoft Security Essentials and rebranded it as Windows Defender. The only problem is that you can’t easily setup automatic scheduled scans anymore.

about 12 months ago - by  |  3 Replies

BitLocker normally encrypts entire drives and partitions, but you can also create encrypted container files with tools built into Windows. Such encrypted VHD files can easily be moved between systems, backed up, and hidden when not in-use.

about 12 months ago - by  |  9 Replies

Whether you want to use a new font in a Word or just change your operating system’s system font to give it a different look, you’ll first have to install the font on your operating system.

about 12 months ago - by  |  3 Replies

Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don’t wait until you’ve lost your hardware to think about this — these features need to be enabled ahead of time.

about 12 months ago - by  |  2 Replies

Windows can encrypt entire operating system drives and removable devices with its built-in BitLocker encryption. When TrueCrypt controversially closed up shop, they recommended their users transition away from TrueCrypt to BitLocker.

about 12 months ago - by  |  8 Replies

Passwords can be reset or bypassed on every operating system. On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files.

about 1 year ago - by  |  3 Replies

Searching for a singular file or file type is one thing, but what do you do when you need to search for multiple file types at the same time? Today’s SuperUser Q&A post comes to the rescue for one reader’s file search dilemma.

about 1 year ago - by  |  2 Replies

Windows 7 and 8 create a special “System Reserved” partition when you install them on a clean disk. Windows doesn’t assign a drive letter to these partitions, so you’ll only see them when you use Disk Management or similar utility.

about 1 year ago - by  |  13 Replies

When working on a long document or a book in Word, it’s common to divide the document into sections or chapters. A common practice is to start each new section or chapter on an odd page. This is easily accomplished using sections in Word.

about 1 year ago - by  |  2 Replies

Internet connection data caps are becoming more widespread in the US. Internet service providers may claim their data limits are good for “millions of emails,” but emails are small and HD videos on Netflix are much, much larger.

about 1 year ago - by  |  2 Replies

If you use remote desktop, remote file access, or other server software, you may leave your computer on at home or work when you leave the house. This uses more power. Instead, you could simply remotely power on your PC whenever you need to use it.

about 1 year ago - by  |  8 Replies

All mainstream desktop operating systems include powerful search features. They all offer the ability to create a “saved search,” which functions as a virtual folder. The saved search folder appears to contain the files that match your search.

about 1 year ago - by  |  2 Replies

Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can change, or “spoof,” MAC addresses in software.

about 1 year ago - by  |  5 Replies

System images are complete backups of everything on your PC’s hard drive or a single partition. They allow you to take a snapshot of your entire drive, system files and all.

about 1 year ago - by  |  21 Replies