Tips
Tips
-
How to enable or disable the command prompt extension
Step-by-step instructions for enabling or disabling the command prompt in Windows 2000. Continue Reading
-
Valentine's Day virus
A look at one of the more nasty viruses out there. Continue Reading
-
The difference between hackers and crackers
The difference between hackers and crackers. Continue Reading
-
Are you getting a 'file not found' error for a shared network file?
How one IT pro figured out what was causing a user's file not found error and how she fixed it. Continue Reading
-
Fix a login screen stuck in a loop
If your login screen is stuck in a loop, and you cannot log in to Windows 2000, dust off your old Windows 9x disk. Continue Reading
-
Disable the caching of SSL sites
By default, Internet Explorer will cache all sites in your temporary Internet folder -- but you can prevent this. Continue Reading
-
Continuous ping
Continuous ping Continue Reading
-
Consider the security risks before integrating new technology
Here are some tips about preparing a risk management strategy. Continue Reading
-
Find those missing Control Panel icons
How to solve the disappearing icon bug. Continue Reading
-
Antivirus hardware?
Here's a look at antivirus appliances. Continue Reading
-
Using honeypots to fake out an attacker
Honeypot systems attract hackers like bees to honey. If implemented correctly, they offer the network administrator a way to discover unwanted activity on a network. Continue Reading
-
Understand the KERNEL_STACK_INPAGE_ERROR
How to figure out what a KERNAL_STACK_INPAGE_ERROR means and how to fix it. Continue Reading
-
What is CHKNTFS?
Most admins are familiar with CHKDSK, but what about it's lesser known cousin, CHKNTFS? Continue Reading
-
How to prevent a Smurf attack
A Smurf attack is a very unique but popular method of attack. This member-submitted tip tells how to guard against them. Continue Reading
-
Access logs in Excel format
Obtain an Exce-readable, comma-delimited security logon/logoff/lockout log file (.csv) of a server. Continue Reading
-
Benefit from Windows file encryption
What you can do with file encryption. Continue Reading
-
Create a shortcut to lock your computer
Create a shortcut to lock your workstation. Continue Reading
-
Disable or restrict Internet access
Settings to disable or restrict Internet access with Internet Explorer. Continue Reading
-
Connect Mac to Windows 2000
How to connect Mac to Windows 2000 Continue Reading
-
Labeling your computer: Add a "welcome" message to your logon screen
Member Giovanni Davila shows a trick for customizing your Windows login screen with a label/phrase of your choice. Continue Reading
-
File system security
This tip describes some basics of the Windows 2000 file system security apparatus. Continue Reading