twitter


For more than a decade, businesses such as yours have been leveraging Microsoft’s Windows Server 2003 technologies and getting a great return on their investment. Substantial improvements to server operating systems have been made since then that help businesses compete better in today’s marketplace. As such, Microsoft will end support for Windows Server 2003/R2 on 14th July 2015.
May 13, 2015 | 0 comments | Labels: , ,
With the release of Windows 10 this summer, Microsoft is radically changing the way users upgrade Windows.

Microsoft says that Windows 10 will be its final release of the iconic operating system that's installed on over 90% of computers.

"Right now we're releasing Windows 10, and because Windows 10 is the last version of Windows, we're all still working on Windows 10," said Jerry Nixon, Microsoft's developer evangelist, at the Ignite tech conference.
May 10, 2015 | 2 comments | Labels: ,
Share A Printer From Vista

To share the printer on a Vista machine click on Start and enter printers into the search box and hit Enter.


Apr 26, 2015 | 1 comments | Labels: ,

I am looking to buy an external hard drive for extra storage. Could you tell me about the advantages of owning a desktop external drive over a portable hard drive?

Apr 19, 2015 | 0 comments | Labels:
Google Drive is one of the most popular cloud services today, used by millions around the world. Every Google account holder has his own free cloud space, which integrates so well with other Google products. From simple file sharing to hosting a website, there's a lot you can do with Google Drive. Google is now giving away an extra 2GB of free space, which I am sure many of you will find welcome.


Remember: This is a limited time offer. You can retain the extra 2GB forever, but only if you claim it before 17th February!
Feb 12, 2015 | 2 comments | Labels:

Microsoft has taken the wraps off a new version of Windows and a new wearable 3D gadget it calls the HoloLens. 

The company showed the new headset, which lets users view and interact with three-dimensional images, at an event where it also revealed new features coming to the company's flagship operating software. 
Jan 22, 2015 | 1 comments | Labels:
Temp folder is used for keeping temporary files used in various programs. It has merits and demerits, when the files in it increased, it will slow our computer. So we need to clear it regularly. As it is risky, I am here to describe you how to clear your Temp folder automatically
  • Open Run and type gpedit.msc
  • Press OK
  • Expand the tree to the following path
Nov 16, 2014 | 5 comments | Labels:

It’s safe to say that the days of the tripod and camera with the hood over it are nearing an end, thanks in part to the clarity and definition of cell phone cameras. It’s hard to find anybody that leaves home without their mobile phones and thus rarely a moment occurs in life that isn’t captured forever. That being said, keeping all these amateur paparazzi pics on the cell phone can be risky for a number of factors from losing the phone to handy hackers stealing the data. For this, sometimes a person should transfer those pics from an unstable cell phone to a more secure home computer and here are some of the most popular ways:
Nov 6, 2014 | 2 comments | Labels: ,

Best Security Apps For Your Smartphone
Mobile phones practically carry our lives from our personal information to the things we do every single day, every moment. As the world is getting more sophisticated technologically, there are threats of hacking. These phones are not protected from people software attacks, so how do you keep hackers and viruses out? Well here are some of the best security apps for phones compiled by Gizmodo.
| 1 comments | Labels: ,
TeamViewer is the fast, simple and friendly solution for remote access over the Internet - all applications in one single, very affordable module.
| 1 comments | Labels: ,
How do you tell if your Windows computer has a virus? Seriously! You have an  antivirus software installed and you go about using the computer with the feeling that it was well-protected and hence malware-free. But maybe, just maybe, there could be malware or a Trojan or a key logger operating on your computer without your knowledge and compromising your security or damaging your data.
Oct 14, 2014 | 7 comments | Labels: ,