How to configure and use Windows 2008 Server Backup utility

How to configure and use Windows 2008 Server Backup utilityIn this article we will show you how you can install and use Windows Server 2008 backup utility. The backup utility feature is no longer standard and does not come installed with a default installation of Windows Server 2008. The new Windows Server 2008 backup utility has lots of new and advanced feature. The best feature I like is the fact that you do not need to restore from multiple backup if the backup you created was incremental. You are now able to restore just individual files instead of whole folders. You can also remotely manage your backups using a MMC. System restore feature for restoring your operating system is much simpler and advanced. The backup technology used in Windows Server 2008 Backup utility is much faster and nicer!

How to use Microsoft Problem Steps Recorder in Windows Seven

How to use Microsoft's problem steps recorder in Windows SevenWindows Seven has another new feature called Microsoft' problem steps recorder. This application lets you capture your interaction with the operating system and the applications you are using, it takes detailed screen captures and literally spells out every step you took while getting to the problem. The result is all contained in one single .mht file which can be opened in Internet Explorer and it can tell your IT support technician of exactly what you were trying to do when the problem happened. If you have ever worked in IT support or a HelpDesk environment, you would quickly come to appreciate this application as it replicates and captures all the information for the support staff. In this article we will show you, step by step, how to use Microsoft Problem Steps Recorder application.

How to change Firewall Rules using command line in Windows Seven

How to change Firewall Rules using command line in Windows SevenIn this article we will show you how you can change the Advanced Windows Firewall rules using the command line in Windows Seven. Some of you might have already tried this and might ask, why do it using command line when you can use the GUI. That's true, you can do it using the GUI, however, with command line, you can put this functionality in a batch file and if you are in a corporate environment and need to deploy this to multiple computers at the same time, then a batch file can be pushed to the machines as a startup policy via active directory, making your task much easier than visiting each computer individually. In Windows Seven, the Windows Firewall has evolved a lot as compared to earlier versions of Windows. The new Firewall in Windows Seven has an advance interface and much much granular rules. The manipulation commands are also different in Windows Firewall and have depreciated the old syntax

Cool sites - Write Something - A Collaborative Online Book by thousands of users like you

Cool websites - Write Something A Collaborative Online Book by thousands of users like youKeeping up with the tradition of introducing a fun and exciting website as part of our Friday Fun Series, we introduce you today to the "Write Something" website. Write Something is an online site where you can write your mind out, whatever is on your mind! People will react to it, maybe.. or they might simply put in whats on their mind. The website acts like a Collaborative book, which is authored from thousands of users like me and you. Don't worry, there is no registration required, there are no hidden fees or catches. All you have to do is visit there and write what's on your mind, yes even anonymously! Believe it or not, this online collaborative collection of people's short comments has grown up to be a whopping 11,000 pages, if you ever commented on this website, you can always scroll back and see your comment.

What is Visual Cryptography

What is Visual CryptographyYou have come across pictures and symbols like this, but you have often ignored them because either they don't make sense to you or second, you thought that this some sort of cryptic computer scan code. Well, pictures like these are not just white noise, often a part of visual cryptography. Visual Cryptography is a system by which information such as picture and text can be decrypted without the use of a computer, visually by just human eye. Visual Cryptography often consists of two or more pieces such as pictures or parts of text, which as an individual piece do not make any sense. However, when combined with the second or more pieces of the Visual Cryptogram, reveals a message, picture or another form of sensible information. In this article we will discuss visual cryptography and demonstrate it using some examples.