This is great news from Microsoft. In a recent blog post (read it here), Microsoft announced the different versions of Windows that will be released. In essence, they’ve whittled this list down to four different versions. I have, for some time, thought that there were way too many versions of Windows, causing a large amount of confusion in the market (for consumers). In this recent announcement, Microsoft is smart to remove some of the confusion, but is it perfect?
How do you easily rotate my videos so you can post them on sites like Youtube? Well, you’ve come to the right place; I’m going to show you how to use your Windows computer to rotate those videos EASY.
All I was looking for in this case was a 45W MagSafe power adaptor (commonly used with Macbook Air computers). Join me as I order one off the Internet in an effort to save a little money.
RIM is quickly becoming the kind of company we talk about when we think of what could be a great innovator. There was a time when RIM made products early adopters wanted for great features like BBM and “Push” email. Now, many have walked away from the platform and sales have gone cold for the Blackberry platform. With revenue down 19%, the fourth quarter results from RIM (read here) were quite brutal by anyone’s measure. But, what makes RIM the company of what could have been? Let’s look at some great things that could have been, shall we?
OK folks, don’t go getting superstitious on me! Today we have the unluckiest day to look at all sorts of interesting different story and links around the web.
When I was able to get my hands on a Dell PowerEdge R210 II Server with Windows 2008 R2 pre-installed, I was looking forward to relaying my thoughts about this one. After ordering, this server took about a week to arrive.
So, it should come as no surprise that I’m quite interested in what can be done to combat threats on a Windows computer with tools you already have. Today I’m going to look at three tools you’ll find on most any Windows flavour out there: Windows XP, Windows Vista, and Windows 7. Namely, wmic and taskkill. This is going to be more of a beginning overview of how you might use these tools to identify and stop a rogue application on your computer
Looking at permissions dialogs for both Windows 7 and Windows 8, you’d be forgiven if you thought they looked exactly the same. Essentially they do, but the changes that Microsoft have brought to permissions appear to be more involved when you go past the surface. One of the most common things an IT Guy/Girl or administrator will have to do […]
When you’re in this business of fixing and maintaining technology – one of the most common questions you’ll be asked is “What do I look for in a new computer?”. While I’m usually obliged to ask for more about the prospective computer in question – sometimes the brand names come up and sometimes it’s just a general question because the customer wants to buy a new one. Coming to me (the IT Guy) is a good step and a worthwhile use of time, but without me, what kind of stuff can you do to find the computer that’s best for you?
So, you’ve cleaned an infected Windows PC and yet some stuff still lingers. You can’t right click on the desktop, you can’t get into task manager and you just know that a host of other policy related stuff is going on. Often, with Virus Scanners, they’re adept at removing files and folders, but they’ll leave behind things like registry settings (often […]