You’ve created several signatures that you use for various types of emails. Then, you get a new machine and have to set up Windows and all your programs again. However, you can easily preserve your signatures in Outlook and restore them to the new machine. Signatures are not stored in the .pst file Outlook uses […]
All posts by admin
What to do when your WSUSContent folder grows too large
Occasionally administrators run into an issue with WSUS where their WSUSContent folder gets too large and they are at risk of running out of disk space. The only supported way to resolve these disk space issues is to use the wsusutil.exe RESET command. (see below) I want to provide some background of how this problem […]
How to Turn off Internet Explorer Enhanced Security Configuration
A very annoying thing in Windows 2008 R2 is the Internet Explorer’s error: “content from the website listed below is being blocked by the internet explorer enhanced security configuration“. Ok now, but how do we disable this security setting ? ( it is called Internet Explorer Enhanced Security Configuration – IE ESC ). FOR WINDOWS 2008: 1. If […]
SSHD: GUIDE TO HYBRID DRIVES
Solid state hybrid drives or SSHDs are a combination of a traditional Hard Disk Drive with a small amount of SSD storage built into one Hybrid enclosure. The partnership of SSD, for quick access data, and HDD, for long term inexpensive storage, means that users of SSHDs have the best of both worlds when it […]
WHAT IS POWER OVER ETHERNET
Power over Ethernet is the generic term for network cables carrying both LAN signal and electrical power to a device. The technology, known as POE, is often found in devices that require both a power (electricity) and wired Ethernet (LAN) connection. POE can be added to a network by using a POE Network switch and […]
RAID (redundant array of independent disks)
RAID (redundant array of independent disks; originally redundant array of inexpensive disks) provides a way of storing the same data in different places (thus, redundantly) on multiple hard disks (though not all RAID levels provide redundancy). By placing data on multiple disks, input/output (I/O) operations can overlap in a balanced way, improving performance. Since multiple […]
How to Spot a Phishing email
Every day countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages are so outlandish that they are obvious frauds, others can be a bit more convincing. So how do you tell the difference between a phishing message and a legitimate message? Unfortunately, there is no one single […]
How to Install Software from Unsigned Developers on a Mac
Click the System Preferences icon on your Dock. Alternatively, you can click on the Apple icon in the top left of your screen and then click “System Preferences.” Click Security & Privacy. It will be located under the heading “Personal.” Click the lock in the bottom left of window. Enter your password when prompted. Then, […]
OS X Mavericks: Set up a connection to a virtual private network
To connect to a virtual private network (VPN) you need to enter configuration settings into Network preferences. These settings include the VPN server address, account name, and any authentication settings, such as a password or a certificate you were given by the administrator of the network. If you were given a VPN settings file, try […]
Redirect your Documents folder to another Location.
NOTE: The following steps need to be repeated for each user account in your Windows 7 system for which you want to move the My Documents folder. To move the My Documents folder in Windows 7, click on the Start button and select Documents from the list. In the left panel of the Explorer window, click on […]