Microsoft announced that it will fix a dangerous new zero-day security flaw in Windows that it says is being exploited by hackers in Russia. But Microsoft is also understandably outraged that Google inexplicably outed the flaw before a patch was ready.
Windows has an unfixable security flaw. That’s the frightening conclusion of this researcher, who says he can inject code—at will—into browsers and other Windows apps. It affects all versions of Windows released in the past 16 years, he says. And it can’t be patched, without breaking legitimate desktop apps. It could be bad for containerized server workloads, too…
Whenever you plug in an external monitor to your Vista computer the OS is supposed to remember your setup and then replicate it each time you plug that monitor in again. However, this doesn’t always happen. In this article, MVP Daniel Petri provides a couple quick solutions for getting multiple monitors to configure correctly in Windows Vista.
One of the most handy tricks in Windows Vista (and previous operating systems) is the My Computer shortcut. In this article, MVP Daniel Petri shows you how to quickly access any folder on your computer through a cool toolbar shortcut.
Windows Vista (and Windows Server 2008 and even Windows 7 for that matter) are configured so that after the installation completes and the user first logs on, the desktop is totally empty from any icons, and only the Recycle bin is present. While this setup might fit some users, most users want control over their old desktop icons. In this article, MVP Daniel Petri will show you how to do that.
Windows Vista has a Visual Basic script built-in that will allow you to extend the trial period of Windows Vista by 30 days. You can use this script a total of three times which will extend your trial period up to 120 days. This process is known as “rearming” and it utilizes the “slmgr.vbs” script […]
If you’re running Windows Vista, this tool can verify whether your existing Internet router supports advanced features, such as improved download speeds. The tool is intended to be run from a home network behind a home Internet (NAT) router. Running this tool from behind a corporate firewall or on operating systems other than those specified […]
Installing the Adminpak.msi will install all of the management tools that are needed to administer Windows 2000, Windows XP Pro and Windows Server 2003 computers and network. Adminpak.msi has a few versions, and the latest one is for Windows Server 2003 SP1. Read more about Adminpak.msi on the Download Windows 2000 Adminpak.msi, Download Windows 2003 […]
With the release of Windows Vista, many users have been dual booting between Windows XP and Windows Vista. Unfortunately, the process of changing the boot operating system is not entirely intuitive. Windows Vista has a little known, but very useful tool, that allows the user to select which operating system to load when dual (or […]
One of the many upgrades to Windows Vista is the Reliability and Performance Monitor. The following is the description of the Reliability and Performance Monitor from the help file: “You can use Microsoft® Windows® Reliability and Performance Monitor to examine how programs you run affect your computer’s performance, both in real time and by collecting […]
One of the cool features in the Windows 2000/XP/2003 Command Prompt (CMD) window was the ability to drag and drop files from it. You could drag a file from your desktop or from within any folder in Windows Explorer, and drop it to an open Command Prompt window. This feature was nice to have […]
The free, open source application Cygwin can be used in combination with OpenSSH to turn Windows Vista into an SSH Server. Cygwin is an extremely robust application and one of the many uses of Cygwin is an SSH Server. This tutorial will demonstrate how to setup Cygwin and consequently OpenSSH on Windows Vista. Among many […]
The Event Viewer is an application that enables you to browse and manage event logs. Event logs are special files that record significant events on your computer, such as when a user logs on to the computer or when a program encounters an error. Whenever one of these types of events occur, the system records […]