Win Audit

WinAudit is easy to use, no special knowledge is required to use the programme. It is a self-contained single file that needs no installation or configuration. It can be run from a floppy disk or USB stick. Simply download the zip archive, extract the programme and double click on it. User interface translations have been… read more »


Get your own DNS queries out of your Windows machine!! Commands: dig (domainname) Do a series of commands depending on what you are trying query NS-A, CNAME, MX or ANY Dig ANY (domainname) To change the color to your CMD background type color 02 Mine is color 82 [button link=”http://www.isc.org/downloads/” target=”_blank” ]large blue rounded[/button] Instructions… read more »

Vipre PC Rescue Virus/Malware Removal

I manage a small data center a dental practice to be more exact. VIPRE has been selected as the top antiviruses scanner and malware detection removal for the practice. I also use this for my personal computers and other computer may come my way. I would like to share with you the best free malware… read more »

Windows Logon Background Change

Change your Windows logon background. It’s easy just follow the instructions below or even better see the video. * Navigate to %WinDir%\System32\oobe – (Hit start paste the path and hit enter) * Create the following directories under oobe ( %windir%\system32\oobe\info\backgrounds\) * In Backgrounds the name of the picture needs to be named backgroundDefault.jpg ( Please note that the… read more »

Secured Connections

Secured Connections GRE ( Generic Routing Encapsulation):  A tunneling protocol developed by Cisco Systems as an encapsulation protocol that can transport a variety of other protocols inside IP tunnels IPsec: A prtocol suite designed to secure IP traffic using authentication and encryption for each packet Layer 2 Forwarding ( L2F) A tunneling protocol developed by Cisco Systems to establish… read more »

Network Devices Definitions -Wireless definitions

Network Devices Once you decide on the types of connections you will use for your network you have to decide how your components connect to one another. Only the simplest networks with very few devices have every component connected. Hub The simplest network devices ia hub. A hub is simply a box with several connectors,… read more »


Full Backup (or Reference Backup) When you set the Backup Type setting to Full, all the files and folders on the drive are backed up every time you use that file set. To set the backup type, click Options on the Settings menu, and then click the Backup tab. Example: In Backup, click the drives,… read more »

Malware Definitions

Malware definitions Malware refers to a collection of different types of software that share the goal of infiltrating a computer and making it do something, it is called Malicious software. This software are most of the time installed with the end users full consent. There are two types of malware: 1. Programs that spread or infect 2. Programs that… read more »


Installing Mac OS X 10.6 & 10.7 on a built PC Build your PC and get it ready for Mac Yes, it is Possible for you to install Mac OS X 10.6. Well known as Snow leopard on a PC. It is not as easy as 1,2,3. There are several steps that have to be… read more »