Last Updated on 8 June 2011, Total: 444 Knowledge Base Tips
| 233 | Admin Tips |
| 10 | Booting |
| 31 | Customization |
| 5 | Drivers |
| 4 | IE and Explorer |
| 45 | Miscellaneous |
| 49 | Network |
| 35 | Security |
| 29 | TroubleShooting |
| 25 | Utilities |
| 76 | Registry Tips |
| 3 | Command shell |
| 14 | Customization |
| 8 | Disable - Hide |
| 5 | IE |
| 19 | Miscellaneous |
| 13 | Network |
| 14 | Security |
| 135 | User Tips |
| 11 | Boot |
| 1 | Command Prompt |
| 19 | Customization |
| 11 | IE and Explorer |
| 24 | Miscellaneous |
| 19 | Network and Security |
| 6 | Outlook and Outlook Express |
| 5 | Performance |
| 18 | TroubleShooting |
| 21 | Utilities |
<li>Before You Begin Installation <li>Hardware Requirements <li>Checking Hardware and Software Compatibility <li>Obtaining Network Information <li>Backing Up Your Files <li>Upgrading vs. Installing a New Copy <li>If You're Installing a New Copy (Clean Install); if you're upgrading <li>Collecting User and Computer Information <li>Joining a Workgroup ; joining a domain... Read More
<li>Before You Begin Installation <li>Hardware Requirements <li>Checking Hardware and Software Compatibility <li>Obtaining Network Information <li>Backing Up Your Files <li>Upgrading vs. Installing a New Copy <li>If You're Installing a New Copy (Clean Install); if you're upgrading <li>Collecting User and Computer Information <li>Joining a Workgroup ; joining a domain... Read More
Clean up the startup entries by deleting blank items... Read More
Hard drives are cheap and people typically have more space than they know what to do with these days. But, that is no reason to just waste it. When you install Windows patches, hidden folders are created which contain the uninstall data. Viewing the hidden data on my computer, I found 50 or so patch uninstall folders taking up over... Read More
Windows XP offers the ability to save passwords for web sites and network resources. This can be very convenient as opposed to remembering and entering the username and password each time you need access, but it poses a security risk because anyone who has physical access to your computer would also be able to log into those sites using your... Read More