While Windows sets a system restore point, the “shadow copies” are able to monitor and backup around 600 file types. Under Windows XP […]Continue reading "
Everything about Windows 8 / 8.1. Mainly I am concerned with the security of users and their usability.
A current definition of antispyware, which we have just updated, may be responsible for the serious problems with other software products or the […]Continue reading "
Today I installed a new set of software on my system and subsequently checked the Windows logs for errors. In the system logs I had some […]Continue reading "
Which program is running with administrative rights? We can use the Windows Task Manager to check whether a program with extended (administrative) rights has been started or is running. To […]Continue reading "
Stabilize Windows Explorer Regular Windows Explorer crashes are now part of everyday life. And so we increase stability. We leave Windows Explorer in a separate […]Continue reading "
The UAC (user account control) is a security-relevant and important feature to keep malicious programs away from the system. The shutdown should be well thought out! And […]Continue reading "
Programs that are located in the Autostart folder or are started using the RUN key in the registry start with a delay of ~ 10 seconds, excluded from this […]Continue reading "
There is, for example, the possibility to lock the PC when it is inactive via the screen saver or via the applied energy mode. With this registry key we set a […]Continue reading "
Reveal WLAN password Under Windows 8 it is possible to query the WLAN password using the following command: First, we query the name of the profile: […]Continue reading "