The best magazine
Microsoft Software & solutions : Technology
Apple's iTunes application for Windows is designed to work properly on current versions of Windows. Windows includes a compatibility mode for running old software, but this mode can interfere with newer programs such as iTunes if it's enabled. If compatibility mode is enabled for iTunes, it will pop
Grilles add charm and character to a window, creating the look of individual panes, or mullions, for a single glass section. They typically install directly against the window glass, and are available in a range of colors and styles, including Colonial, traditional and rustic. Installing one is a re
Linux is a free, open-source computer operating system with over 600 distributions as of 2010. Ubuntu is the most popular and user-friendly version of Linux, with a free, upgraded release every six months. Ubuntu has desktop access to Linux software repositories, offering hundreds of applications in
Every single piece of hardware on your computer requires a driver. Although some drivers simply supply Windows with the hardware's name and purpose, others are more complex and provide Windows with advanced information on how to best use the hardware. The driver for your sound card is no different.
Traveling with a computer across time zones is easy enough, but unlike most cell phones, the computer will not automatically update the time zone. If your account on Windows XP has administrator privileges, just a few clicks of the mouse can put the computer in the correct time zone. Once the comput
The Windows Vista operating system has integrated anti-virus software. The Windows Security Center has an anti-virus and firewall bundled with the operating system. If you have your own anti-virus application, you can disable the Windows anti-virus software in your Vista Control Panel. This helps av
If your computer's wallpaper keeps getting changed by other users, you can disable that function to restrict the editing capabilities of others. To disable the wallpaper in the registry, you need to configure the settings of a specific key item. Proceed with caution every time you make changes to th
You may be switching computers or devices, or just want a fail-safe against losing your Microsoft Office 2010 or 2013 customizations for the ribbon and Quick Access Toolbar. This is really simple to do.
Windows Vista depends on a number of system files for proper operation. If any are missing or damaged, then your computer may behaves in an unpredictably or fail to boot. Windows Vista system has a utility that scans the operating system files and if necessary obtains clean copies from the installat
If you receive a notice from Microsoft that your copy of Windows XP is not genuine, you may need to go into your system and update your product key code. You could have a pirated copy of Windows XP on your computer system, even if you purchased the computer from a store, and Microsoft's Genuine Adva
If the taskbar at the bottom of your PC computer screen is black, then there may be a problem with the Windows XP operating system or a display theme may have been set up on your computer without your knowledge. There are several control panel settings that could be causing your taskbar to display i
Citrix is a company that develops application and system virtualization software for use on local and private networks and over the Internet. Presentation Server 4.0, which is being branded as Xenapp, is one of the company's application delivery products; the latest version of Xenapp is 6.0 (as of J
The "Nologin" is a type of shell that can be assigned to a user's Linux account. Typically, when a Linux user logs in the system supplies him with his default shell, such as "Bash" or "Ksh." When "Nologin" is specified, the shell immediately rejects the logon and boots the user from the system. You
Damaged or corrupted disks can cause havoc with your computing "life," necessitating plenty of cleanup work to repair the data lost through the calamity. Recovering information and programs from the damaged disk is step one, which can be done using the disk repair tools within your operating system.
Windows Vista allows users to set a password to prevent unauthorized users from accessing their account, but if the password is lost or the account security is compromised, another user with administrative privileges can reset the password to a new value. Only the Business and Ultimate editions of W
The Task Manager on your Windows computer gives you access to the processes that are running on your computer, along with information about the CPU, RAM and network usage of the machine. You can gain access to this program through the regular menus on your computer, through a key combination or thro
Windows Vista includes a Reliability and Performance Monitor application. This tool monitors your computer and displays information about the current resource usage, including the usage of your CPU, disk and memory along with the network. You can view more detailed information about the programs and
ScanDisk is a tool used by the Windows operating system to scan and repair bad clusters, sectors files on the computer hard drive. When running ScanDisk, it is a good idea to close down any unnecessary programs running on your computer. This helps to free up memory for the scan and ensure that no d
The computer registry is used extensively because the settings of programs, applications and system components are stored there where they can be manipulated when necessary. Because it is the central control unit for a PC with a Windows operating system, it is vulnerable to attacks and should be mai