The best magazine
Sign in
Recover your password.
A password will be e-mailed to you.
Browsing Category
Microsoft Software & solutions : Technology
How to Stop the iTunes Pop-Up in Compatibility Mode
Apple's iTunes application for Windows is designed to work properly on current versions of Windows. Windows includes a compatibility mode for running old software, but this mode can interfere with newer programs such as iTunes if it's enabled. If compatibility mode is enabled for iTunes, it will pop
How to Add Grills to Existing Andersen Windows
Grilles add charm and character to a window, creating the look of individual panes, or mullions, for a single glass section. They typically install directly against the window glass, and are available in a range of colors and styles, including Colonial, traditional and rustic. Installing one is a re
How to Uninstall a Sound Driver
Every single piece of hardware on your computer requires a driver. Although some drivers simply supply Windows with the hardware's name and purpose, others are more complex and provide Windows with advanced information on how to best use the hardware. The driver for your sound card is no different.
How to Fix the Time Zone in XP
Traveling with a computer across time zones is easy enough, but unlike most cell phones, the computer will not automatically update the time zone. If your account on Windows XP has administrator privileges, just a few clicks of the mouse can put the computer in the correct time zone. Once the comput
How to Disable Windows Vista Pre-Installed Virus Protection Software
The Windows Vista operating system has integrated anti-virus software. The Windows Security Center has an anti-virus and firewall bundled with the operating system. If you have your own anti-virus application, you can disable the Windows anti-virus software in your Vista Control Panel. This helps av
How to Disable Wallpaper in the Registry
If your computer's wallpaper keeps getting changed by other users, you can disable that function to restrict the editing capabilities of others. To disable the wallpaper in the registry, you need to configure the settings of a specific key item. Proceed with caution every time you make changes to th
Backup or Restore Your Microsoft Office Toolbar Customizations
You may be switching computers or devices, or just want a fail-safe against losing your Microsoft Office 2010 or 2013 customizations for the ribbon and Quick Access Toolbar. This is really simple to do.
How to Restore Vista System Files
Windows Vista depends on a number of system files for proper operation. If any are missing or damaged, then your computer may behaves in an unpredictably or fail to boot. Windows Vista system has a utility that scans the operating system files and if necessary obtains clean copies from the installat
How to Update a Windows XP Product Code
If you receive a notice from Microsoft that your copy of Windows XP is not genuine, you may need to go into your system and update your product key code. You could have a pirated copy of Windows XP on your computer system, even if you purchased the computer from a store, and Microsoft's Genuine Adva
Windows XP Black Taskbar Troubleshooting
If the taskbar at the bottom of your PC computer screen is black, then there may be a problem with the Windows XP operating system or a display theme may have been set up on your computer without your knowledge. There are several control panel settings that could be causing your taskbar to display i
How to Upgrade From an Access Database to MSDE Citrix 4.0
Citrix is a company that develops application and system virtualization software for use on local and private networks and over the Internet. Presentation Server 4.0, which is being branded as Xenapp, is one of the company's application delivery products; the latest version of Xenapp is 6.0 (as of J
How to Create a User With No Login in Ubuntu
The "Nologin" is a type of shell that can be assigned to a user's Linux account. Typically, when a Linux user logs in the system supplies him with his default shell, such as "Bash" or "Ksh." When "Nologin" is specified, the shell immediately rejects the logon and boots the user from the system. You
How to Recover Information from a Damaged Disk Program
Damaged or corrupted disks can cause havoc with your computing "life," necessitating plenty of cleanup work to repair the data lost through the calamity. Recovering information and programs from the damaged disk is step one, which can be done using the disk repair tools within your operating system.
How to Reset a User Account Password on Windows Vista
Windows Vista allows users to set a password to prevent unauthorized users from accessing their account, but if the password is lost or the account security is compromised, another user with administrative privileges can reset the password to a new value. Only the Business and Ultimate editions of W
How to Open the Task Manager Command Line
The Task Manager on your Windows computer gives you access to the processes that are running on your computer, along with information about the CPU, RAM and network usage of the machine. You can gain access to this program through the regular menus on your computer, through a key combination or thro
How to Tell What Programs Are Using a Connection in Windows Vista
Windows Vista includes a Reliability and Performance Monitor application. This tool monitors your computer and displays information about the current resource usage, including the usage of your CPU, disk and memory along with the network. You can view more detailed information about the programs and
How to Close Running Programs to Run ScanDisk
ScanDisk is a tool used by the Windows operating system to scan and repair bad clusters, sectors files on the computer hard drive. When running ScanDisk, it is a good idea to close down any unnecessary programs running on your computer. This helps to free up memory for the scan and ensure that no d
About Registry Fixing
The computer registry is used extensively because the settings of programs, applications and system components are stored there where they can be manipulated when necessary. Because it is the central control unit for a PC with a Windows operating system, it is vulnerable to attacks and should be mai
What Are Radio-Frequency Identification Tags?
Radio frequency identification, RFID, offers real-time data on the location of goods. While a boon for large retailers who would be able to manage their goods more efficiently, there are a variety of barriers in the way of RFID technology. The cost alone will delay its full implementation for some t