Categories
- Gaming (5)
- Reviews (1)
- Tips & Tricks (1)
- Hardware (10)
- Reviews (2)
- News (2)
- Site News & Editorials (2)
- Site News (2)
- Site News & Editorials (2)
- Programming (3)
- Software (32)
- Multimedia (2)
- Tips & Tricks (19)
- Web (7)
- Tips & Tricks (4)
- Gaming (5)
Tags
adobe reader alternatives AVG backups batch scripting browser classic default email error code error message freeware games hardware HDD hotkey IE install inventory KB keyboard Knowledge Base limit login logon Microsoft navigation open source optimization PDF PDF viewer requirements restrict scan screensaver search shortcut software storage taskbar tinyurl user Windows Windows explorer Windows XPArchives
- February 2012 (1)
- September 2011 (1)
- July 2011 (1)
- June 2011 (2)
- April 2008 (1)
- February 2008 (5)
- January 2008 (9)
- December 2007 (6)
- November 2007 (1)
- September 2007 (1)
- November 2006 (1)
- October 2006 (1)
- August 2006 (5)
- July 2006 (5)
- June 2006 (1)
- May 2006 (3)
- December 2005 (2)
- September 2005 (1)
- March 2005 (1)
- August 2004 (1)
- June 2004 (1)
Tag Archives: Windows
It appears that there has been some interest in using this handy tool instead of relying on MS for Windows updates, especially if you may have use for the updates again on other machines or because of a reformat. However, there has also been a bit of confusion on how to get it and install…Read More »
In my last blog entry, I wrote the generalized process I had to go through to create an unattended install CD for Windows XP SP2. Today, I’ll go through that in more detail. Before I do, let me point out the site I used as a primary reference: http://unattended.msfn.org/unattended.xp/view/web/1/ Unattended install The first step I…Read More »
Spyware in General Spyware: a term computer users have been hearing about more and more often during their travels through the World Wide Web, or through visits to the repair shop. Spyware is something that has been becoming increasingly common on systems. A system brought online with no protection is completely vulnerable within the first…Read More »