Ask the Experts
Ask the Experts
-
What is the multiple desktop feature in Windows 10?
The Windows 10 multiple desktop features gives workers the feel of using multiple monitors on the same screen, which can increase productivity for users that keep many windows open at once. Continue Reading
-
Does Windows 10 provide the same user experience across all devices?
Microsoft's universal apps can change to fit the device they're run on, but there are some screen resolution problems users may have to contend with. Continue Reading
-
Is Windows 10 really the last version of Windows?
Microsoft has said that Windows 10 is the last version of Windows, and that's sort of true. Rather than releasing Windows 11 in years to come, the company will deploy perpetual updates to Windows 10. Continue Reading
-
How do I build Apportals in Windows 8.1?
Windows Apportals let you put the applications certain user groups need right in front of them, but you need some development knowledge and a Windows Developer License if you want to build them yourself. Continue Reading
-
How much memory do my Windows 8 desktops really need?
It can be tough to know how much memory Windows 8 and 8.1 desktops need before they're actually in use, but the Windows Task Manager can help you see memory usage. Continue Reading
-
What do I do if a user accidentally deletes the Recycle Bin?
It used to be really easy for users to delete the Recycle Bin. Luckily, there are easy ways to restore it in most versions of Windows, and Microsoft has made it tougher to delete in newer OSes. Continue Reading
-
What options exist for customizing the Windows 8.1 taskbar?
If you made changes or personalizations to your taskbar in Windows 7, you'll be happy to learn that many of the same customization options are available for the Windows 8.1 taskbar. Continue Reading
-
Is it a security risk to have Microsoft Windows PowerShell on my desktops?
Microsoft Windows PowerShell is a versatile and powerful command-line tool for administrators, but it's probably not something users need installed on their desktops. Continue Reading
-
Can you provision desktop apps with Windows To Go?
It's OK to install desktops applications on a Windows To Go image, as long as they're small enough to fit on the USB drive and can run locally. Continue Reading
-
Why do I see multiple svchost.exe processes running?
You might notice multiple instances of Service Host running in your list of processes, and that's perfectly fine. It usually corresponds to a system service. Continue Reading
-
What are my options for configuring Windows 8 startup?
The System Configuration tool features four tabs of options you can use to configure Windows 8 startup. Continue Reading
-
What are some common Office 2013 problems?
Office 2013 problems can stem from an incomplete install, or your particular version or settings. Luckily, there are simple fixes for most issues. Continue Reading
-
How do I open an .xpx file in Office 2002 SP3?
An .xpx file can cause problems for Office 2002 SP3 users, but Microsoft does provide help in Windows 7 and with a free XPS viewer. Continue Reading
-
What are some of the biggest software patching myths?
Desktop patch management is subject to its share of myths. Our expert penetrates the fog around waiting on software patching and Windows XP security. Continue Reading
-
Why doesn't closing a file return me to Microsoft Windows Explorer?
If you open a Windows document in Windows Explorer rather than in the Microsoft Word interface, closing it launches File Explorer. The file hasn't moved. Continue Reading
-
What are some alternatives to Windows Defender?
Windows Defender is useful for Windows 8 security, but it can't keep up with malicious software alone. Several third-party products can help. Continue Reading
-
How does Windows 8.1 support affect Active Directory?
Windows 8.1 support for endpoint security includes Open MDM and biometrics, but removing Remote Server Administration Tools can affect Active Directory. Continue Reading
-
What Web application monitoring tools exist for desktops?
Microsoft Intune and other mobile device management tools are also useful for desktop management from the cloud and Web application monitoring. Continue Reading
-
Untangling the Gordian knot of the Windows boot process
An infinite reboot loop is a common issue with the Windows boot process. Start up in Windows Safe Mode to diagnose device driver or hardware problems. Continue Reading
-
What's the best way to reformat a hard drive remotely?
Whether you need to remotely reformat a hard drive for security or prepare new network-attached machines, a few utilities can make the job easier. Continue Reading
-
What does Windows 8 startup offer fans of Windows 7?
Easier file access across devices and faster Windows 8 startup are among the Windows 8.1 features that could win over Windows 7 users. Continue Reading
-
How do I create a bootable Windows 7 USB drive?
Windows To Go only works for Windows 8 bootable USB flash drives; to create a virtual hard drive for Windows 7 installation, try Boot to VHD. Continue Reading
-
What are the concerns around the Windows 7 end of life?
As the Windows 7 end of life arrives, IT admins must find extended support for the OS. Microsoft provides some help, but it won't always be free. Continue Reading
-
How come Microsoft Internet Explorer collects my data?
Some users have noticed that Microsoft Internet Explorer collects personal information through its AutoComplete feature. There is a way to turn it off. Continue Reading
-
How do I remove admin restrictions from Windows 7 laptops?
To relax the usual restrictions on Windows 7 laptops, use the Windows administrator account, but remember to record your password. Continue Reading
-
What security needs is Windows Defender best for?
Windows Defender is included with Windows 8, but it isn't enabled by default, and enterprises will want more third-party antimalware protection. Continue Reading
-
What's the best way to remote wipe a user-owned laptop?
Tools are now available to IT for a remote wipe of user-owned laptops. But set clear BYOD security policies and inform users. Continue Reading
-
What's the best way to delete a file or folder whose Windows path is too long?
In addition to Copy as Path, the third-party Long Path Tool might be helpful for deleting a file or folder whose Windows path is too long. Continue Reading
-
What new Windows 7 security tools are available?
Even if you're looking at prior or later operating systems, tools for multiple Windows 7 security tasks abound and should be useful across OS versions. Continue Reading
-
How to create PDFs since Windows Fax and Scan won't
While Windows 8 does include Windows Fax and Scan, it doesn't create PDFs of scanned documents. Here are some Windows 8 PDF reader workarounds. Continue Reading
-
Hyperthreading, cache distinguish Core i5, i7 processors
A laptop processor comparison differentiates Intel's chips by their cores, hyperthreading and cache, which affects speed. Continue Reading
-
How to allow multiple users to share an Excel workbook
Public folders allow users to share an Excel workbook, but OneDrive and Windows 8.1 HomeGroups might be better. Continue Reading
-
Older suites such as Microsoft Office 2007 can be run in Windows 8
Windows 8 supports past versions of Microsoft Office, but installation problems may interfere with getting Office 2007 Ultimate to run in Windows 8. Continue Reading
-
Before you clone HDD to SSD, know the benefits and danger to data
Which type of drive is better: hard disk drive or solid-state drive? HDD to SSD cloning can ease data access, but SSDs aren't without risks to data. Continue Reading
-
A PDF reader reinstall might fix a doc that won't open in Windows 7
To successfully open a PDF in Windows 7, you may have to overcome problems such as corrupt files or the PDF reader itself. Continue Reading
-
Can I plug a USB drive into a phone with a micro-USB connector?
This week, our expert answers a question on how to connect a phone or tablet to a USB drive with a micro-USB connector. Continue Reading
-
A Windows user profile can cause problems even if it's not corrupt
Corrupt Windows user credentials can cause problems at login, but that's not the only thing that can interfere with a Windows user profile. Continue Reading
-
Yes, you can make a Windows disk partition read-only
This week, our expert answers a question on mounting a disk volume as a read-only Windows disk partition, as in Linux. Just don't do it by accident. Continue Reading
-
No touchscreen, no problem -- using a keyboard for Windows 8 interface
The Windows 8 interface may seem daunting to those without touchscreens. However, it's possible to work around gestures using some keyboard commands. Continue Reading
-
Understanding the errors behind a temporary Windows profile
A Windows user finds that he has been issued a temporary Windows profile. Our expert shows how that can happen and how to fix the underlying problem. Continue Reading
-
How to delete a file or folder when the Windows path is too long
Our expert answers a question on how to delete a file or folder when its Windows file name is beyond the Windows path length limit. Continue Reading
-
Finding free alternatives for remote desktop apps and services
Our expert takes a look at free software and infrastructure alternatives for Windows Remote Desktop for remote desktop access. Continue Reading
-
Ways to detect and delete duplicate files in Windows systems
Our enterprise desktop expert answers a question about some third-party tools for eliminating duplicate files in Windows desktops. Continue Reading
-
Copying Windows Explorer files without slowing down a system
Our expert explains how to avoid overtaxing processors when copying Windows Explorer files. Process priority and a command should do the trick. Continue Reading
-
How to connect a Windows XP client to a Microsoft SQL Server one
Incompatibilities can crop up when IT admins try to connect a Microsoft SQL Server instance to a Windows XP client. Here are ways to overcome them. Continue Reading
-
Why you should avoid a Windows 7 external hard drive installation
Microsoft doesn't support Windows 7 external hard drive installation. Our expert explains why putting the OS on a USB drive is a bad idea. Continue Reading
-
How to resolve Windows file-sharing problems
Windows file sharing isn't as easy as it sounds. Our expert explains how to deal with different OS versions, classic problems and Windows HomeGroup. Continue Reading
-
How to get a preloaded Microsoft Office version to work
This week, our expert answers the question of what to do when a preloaded Microsoft Office version stops working on a computer. Continue Reading
-
Running multiple versions of Microsoft Office on one machine
Our Ask the Experts feature returns, starting with an answer about whether it's a good idea to run multiple versions of Office on one machine. Continue Reading
-
Remotely wiping down multiple systems
No one wants to manually wipe down hundreds of machines. Save yourself a lot of time with one of these tools. Continue Reading
-
How do I track file access in Windows folders?
These seven steps will teach you how to track file access and enable auditing in Windows XP and Windows Vista. Continue Reading
-
Windows server access management in Active Directory
With so many ways to manage server access in Active Directory domains, you'll want to learn about some of these Windows security strategies. Continue Reading
-
Limit Windows Remote Desktop users' server rights
How can you manage access to Windows Explorer and the DOS command prompt to control Windows Remote Desktop users network rights? Continue Reading
-
Folder/file management for Windows network security
Learn how to prevent users from creating and deleting folders, and improve folder management and file management for Windows network security. Continue Reading
-
Can I delete certificates from the CA?
Learn how you can manage Microsoft security certificates and improve Internet Information Services (IIS) security. Continue Reading
-
How do I apply a Group Policy Object at the OU level?
Learn how to apply a Group Policy Object at the organizational unit (OU) level with this advice from Wes Noonan. Continue Reading
-
How to use GPOs to deny folder permissions
You can use a Group Policy Object (GPO) to deny folder permissions in Windows. Find out how to manage folder permissions with GPOs with this advice from Kevin Beaver. Continue Reading
-
How can I detect IP addresses that connect to IIS?
If you've ever wanted to detect IP addresses that try to connect to your IIS (Internet Information Services) servers, this advice can help. Continue Reading
-
Prevent copying files from shared folders to remote computers
It's a tricky issue -- how to stop users from copying files from shared folders. Learn how to manage a user's file and folder copying rights with this advice from Windows security expert Kevin Beaver. Continue Reading
-
Restricting user permissions in folders
If you have a question about managing the permissions of a folder in your domain, this advice from Jonathan Hassell tells you how to set those permissions and prevent users from deleting that folder. Continue Reading
-
Cracking a hard drive password
Windows hardening expert Jonathan Hassell explains what to do if you can't boot up a system equipped with Windows software and how to crack Windows passwords for hard drives. Continue Reading
-
Making a Windows folder read-only
Windows hardening expert Jonathan Hassell explains how to make a Windows folder that multiple users share read-only. Continue Reading
-
Prevent users from deleting files in shared folders
Jonathan Hassell explains one of the functions of using Advanced Permissions. Continue Reading
-
Virus causing sound and video problems?
Are your sound and video problems a result of a virus? Even though anything is possible with malicious code, says site expert Kevin Beaver, that might not be the problem you're experiencing. Continue Reading
-
Setting permissions for a shared Excel file
Do you get the "read only file" error message when trying to save changes in a shared Excel file? Continue Reading
-
Clear the hard drive BIOS password
Kevin Beaver explains how to clear the hard drive password in the BIOS. Continue Reading
-
The difference between antivirus and antispyware/malware software
Windows security threat expert Kevin Beaver provides a thorough description of the differences between antivirus and antispyware/malware software. Continue Reading
-
Preventing domain admins from logging onto domain controllers
Windows network security expert Wes Noonan explains how to control who can log onto domain controllers. Continue Reading
-
Does your computer reboot when using PowerPoint?
Your computer keeps rebooting -- but only when you run Microsoft Office applications. In this response, site expert Kevin Beaver helps troubleshoot your rebooting computer woes. Continue Reading
-
Setting 'log-on-to machines' in Active Directory
Many enterprise environments need to limit systems access by setting account options. In this response, site expert Jonathan Hassell explains more about the "set log-on-to machines" feature. Continue Reading
-
Default passwords for Windows 2000 and Windows XP
With or without administrator access, resetting a particular account's password could be difficult. Site expert Kevin Beaver suggests Proactive Password Auditor or NTAccess to solve this authentication problem. Continue Reading
-
How can I restore my search engine to its default?
I keep getting unwanted search engines appearing as a default when looking for a site. How can I set my default search engine and keep it set that way? Continue Reading
-
Creating a testing environment for hotfixes and patches
Testing patches and hotfixes in a live environment ensures a more successful deployment process. Site expert Jason Chan describes how to set up a testing environment. Continue Reading
-
"Failed to Open the Group Policy Object" error
"Failed to Open the Group Policy Object" error could indicate an Active Directory communications issue. Site expert Kevin Beaver gives advice on how to solve this AD problem. Continue Reading
-
Setting NTFS rights to deny Delete permission
Site expert Wes Noonan explains how to set NTFS rights on a Windows 2000 Advanced Server so that users are not able to delete files or folders, but they are able to save and make changes. Continue Reading
-
Establishing a network printer connection without authentication
Authenticating users prior to granting them access to resources is is a cornerstone concept in Microsoft resource access says site expert Wes Noonan. Though not recommended, he does reveal a way to print without using Windows Active Directory. Continue Reading
-
Blocking software installation at an Internet cafe
-
Granting access to resources in a multiple domain environment
-
Seven steps to troubleshoot server access problems
-
Can a power user install software and allow Windows Updates?
-
Why is our mapped drive reverting to previous mapping?
-
How to manually enable SMB signing
-
Specifying users with Remote Desktop permissions through Group Policy
-
Setting auditing policies in the registry
-
Finding the CLSID for ActiveX controls in IE
-
Bypassing the logon password on Windows 2000 Pro
Roberta Bragg explains that, while you cannot bypass the login password in Windows 2000 Pro, there are tools that help assist you crack passwords and/or replace them. Continue Reading
-
Using "netstat" to display open ports on a Windows XP computer
-
Ways a virus can enter a system
-
How can I prevent users from uploading files using IE?
-
How can I prevent users from changing settings without affecting admins rights?
-
How can I set up a BIOS password on my PC?
-
Where is the 'User Profile' file, and how can I access and view its contents?
-
I can't open files that I encrypted -- is there a way to decrypt the files?
-
What are TCP/UDP ports 9, 11 and 13 used for?
-
Do I need to install Certification Authority on a domain controller?
-
Can I allow users to modify but not delete?
-
How does decryption work?
-
Exactly how is a SID created?
-
What are the advantages and disadvantages of patch management?
-
How can I bypass the password to Windows 98?