Last Updated on 1 Nov. 2016, Total: 3132 Knowledge Base Tips
| 449 | Windows 2000 |
| 280 | Admin Tips |
| 73 | Registry Tips |
| 96 | User Tips |
| 367 | Windows 2003 |
| 361 | Admin Tips |
| 4 | Registry Tips |
| 2 | User Tips |
| 275 | Windows 7 |
| 230 | Admin Tips |
| 21 | Registry Tips |
| 24 | User Tips |
| 75 | Windows 8 |
| 71 | Admin Tips |
| 1 | Registry Tips |
| 3 | User Tips |
| 845 | Windows NT |
| 480 | Admin Tips |
| 296 | Registry Tips |
| 69 | User Tips |
| 304 | Windows Server 2008 |
| 300 | Admin Tips |
| 3 | Registry Tips |
| 1 | User Tips |
| 219 | Windows Server 2012 |
| 217 | Admin Tips |
| 153 | Windows Vista |
| 116 | Admin Tips |
| 3 | Registry Tips |
| 34 | User Tips |
| 444 | Windows XP |
| 233 | Admin Tips |
| 76 | Registry Tips |
| 135 | User Tips |
Some experts say that renaming the Administrator account is pointless. Any worthy hacker knows that the true Administrator account has a unique identifier and how to find it. But, that doesn't mean you need to make it easy for the hackers who aren't worthy... Read More
Exchange 2003 supports OWA interface in different languages. When using Internet Explorer 5 and above, the Language settings of Internet Explorer is sent to the OWA server which is turn changes the OWA interface to the matching language... Read More
Microsoft Internet Explorer offers the AutoComplete feature to remember past entries and automatically pre-populate fields as you type to save you some time and effort. You may find it quite convenient, but having AutoComplete remember username or password information can pose a security risk... Read More
Members of the Administrators group typically have full control to modify registry keys. Unwittingly executing a malware-infected or other questionable program with Administrator privileges can result in registry additions or edits which may adversely affect the system. To safeguard the registry without logging out you can use this trick... Read More
Windows creates hidden Administrative Shares at the root of each drive and to the system root folder to allow administrators to remotely access the data. If a server or workstation will not be administered remotely or has no need for the Administrative Shares though, they should be removed so that they don't provide a potential attack vector for a hacker... Read More