How To Articles

How to use Microsoft Problem Steps Recorder in Windows Seven

How to use Microsoft's problem steps recorder in Windows SevenWindows Seven has another new feature called Microsoft' problem steps recorder. This application lets you capture your interaction with the operating system and the applications you are using, it takes detailed screen captures and literally spells out every step you took while getting to the problem. The result is all contained in one single .mht file which can be opened in Internet Explorer and it can tell your IT support technician of exactly what you were trying to do when the problem happened. If you have ever worked in IT support or a HelpDesk environment, you would quickly come to appreciate this application as it replicates and captures all the information for the support staff. In this article we will show you, step by step, how to use Microsoft Problem Steps Recorder application.

How to change Firewall Rules using command line in Windows Seven

How to change Firewall Rules using command line in Windows SevenIn this article we will show you how you can change the Advanced Windows Firewall rules using the command line in Windows Seven. Some of you might have already tried this and might ask, why do it using command line when you can use the GUI. That's true, you can do it using the GUI, however, with command line, you can put this functionality in a batch file and if you are in a corporate environment and need to deploy this to multiple computers at the same time, then a batch file can be pushed to the machines as a startup policy via active directory, making your task much easier than visiting each computer individually. In Windows Seven, the Windows Firewall has evolved a lot as compared to earlier versions of Windows. The new Firewall in Windows Seven has an advance interface and much much granular rules. The manipulation commands are also different in Windows Firewall and have depreciated the old syntax

What is Visual Cryptography

What is Visual CryptographyYou have come across pictures and symbols like this, but you have often ignored them because either they don't make sense to you or second, you thought that this some sort of cryptic computer scan code. Well, pictures like these are not just white noise, often a part of visual cryptography. Visual Cryptography is a system by which information such as picture and text can be decrypted without the use of a computer, visually by just human eye. Visual Cryptography often consists of two or more pieces such as pictures or parts of text, which as an individual piece do not make any sense. However, when combined with the second or more pieces of the Visual Cryptogram, reveals a message, picture or another form of sensible information. In this article we will discuss visual cryptography and demonstrate it using some examples.

How to configure Windows Updates using local group policy in Windows Seven

Windows Updates Using Local Group Policy on Windows SevenWindows Updates are an essential part of your operating system that makes it running smooth and secure. If you are in a corporate domain environment, the Windows Updates to your machine are likely being pushed down from a WSUS server, SMS or System Center Configuration Manager. WSUS, SMS and SCCM are great products that let administrator control the patches and security hotfixes that get installed on the machine. However, this centralized administration is possible only when the machine is joined to a Domain, WSUS, SCCM and SMS can not make use of Domain GPOs (Group Policy Objects) to enforce it on machines on a Workgroup. In such a case, you can always use a local group policy on Windows Seven to configure the Windows Update Settings. In this article we will show you how you can use Windows Seven Local Group Policy to configure your Windows Update Settings and its advantages

How to use Credentials Manager in Windows Seven

Credentials Manager in Windows SevenWindows Seven has a cool new feature called Credentials Manager. Credentials Manager safeguards all your Windows and other passwords that you provide to them and even auto fills them when needed. You often map network drives, go to secure websites etc that need a login and a password, credentials manager can store these for you. Whats really cool is that you can backup and restore your Credentials Manager Vault or copy it to another computer. When you copy the vault to another computer, you do not have to remember and provide credentials for resources, network drives or web pages that are already stored in the Credentials Manager. Its a completely secure way of storing your credentials. In the step by step articles we will show you how to access, use, backup, restore and move Windows Credentials Manager vault.