How to Backup and Restore Signatures in Outlook 2013

You’ve created several signatures that you use for various types of emails. Then, you get a new machine and have to set up Windows and all your programs again. However, you can easily preserve your signatures in Outlook and restore them to the new machine. Signatures are not stored in the .pst file Outlook uses […]

Read More

What to do when your WSUSContent folder grows too large

Occasionally administrators run into an issue with WSUS where their WSUSContent folder gets too large and they are at risk of running out of disk space. The only supported way to resolve these disk space issues is to use the wsusutil.exe RESET command. (see below) I want to provide some background of how this problem […]

Read More

How to Turn off Internet Explorer Enhanced Security Configuration

A very annoying thing in Windows 2008 R2 is the Internet Explorer’s error: “content from the website listed below is being blocked by the internet explorer enhanced security configuration“. Ok now, but how do we disable this security setting ? ( it is called Internet Explorer Enhanced Security Configuration – IE ESC ). FOR WINDOWS 2008: 1. If […]

Read More

SSHD: GUIDE TO HYBRID DRIVES

Solid state hybrid drives or SSHDs are a combination of a traditional Hard Disk Drive with a small amount of SSD storage built into one Hybrid enclosure. The partnership of SSD, for quick access data, and HDD, for long term inexpensive storage, means that users of SSHDs have the best of both worlds when it […]

Read More

WHAT IS POWER OVER ETHERNET

Power over Ethernet is the generic term for network cables carrying both LAN signal and electrical power to a device. The technology, known as POE, is often found in devices that require both a power (electricity) and wired Ethernet (LAN) connection. POE can be added to a network by using a POE Network switch and […]

Read More

RAID (redundant array of independent disks)

RAID (redundant array of independent disks; originally redundant array of inexpensive disks) provides a way of storing the same data in different places (thus, redundantly) on multiple hard disks (though not all RAID levels provide redundancy). By placing data on multiple disks, input/output (I/O) operations can overlap in a balanced way, improving performance. Since multiple […]

Read More

How to Spot a Phishing email

 Every day countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages are so outlandish that they are obvious frauds, others can be a bit more convincing. So how do you tell the difference between a phishing message and a legitimate message? Unfortunately, there is no one single […]

Read More

How to Install Software from Unsigned Developers on a Mac

Click the System Preferences icon on your Dock. Alternatively, you can click on the Apple icon in the top left of your screen and then click “System Preferences.” Click Security & Privacy. It will be located under the heading “Personal.” Click the lock in the bottom left of window. Enter your password when prompted. Then, […]

Read More

OS X Mavericks: Set up a connection to a virtual private network

To connect to a virtual private network (VPN) you need to enter configuration settings into Network preferences. These settings include the VPN server address, account name, and any authentication settings, such as a password or a certificate you were given by the administrator of the network. If you were given a VPN settings file, try […]

Read More

Redirect your Documents folder to another Location.

NOTE: The following steps need to be repeated for each user account in your Windows 7 system for which you want to move the My Documents folder. To move the My Documents folder in Windows 7, click on the Start button and select Documents from the list. In the left panel of the Explorer window, click on […]

Read More