How To and technical articles, covering a range of subjects relating to computers, operating system configuration and day-to-day computer use.

 

Looking for something specific? Try the search box.

 

How to Keep a Window on Top in Windows 10 and 11

How to Keep a Window on Top in Windows 10 and 11

Check out this new YouTube video which explains how you can make a window stay on top in Microsoft Windows 10 and 11, using free software from Microsoft.
Read More
What digitally signed software is, and how you can check a digital signature

What digitally signed software is, and how you can check a digital signature

Having a program or app which is digitally signed shows potential users that it really is from the person or company that it says it is, and that it has not been modified by a third-party and / or had a virus, worm, or other nefarious code added. To find...
Read More
How to Backup a Windows Registry (and how not to)

How to Backup a Windows Registry (and how not to)

Backing-up The Windows Registry As an IT professional, I have often been asked what the best way is to backup the Windows Registry. Most people use the Windows Program Regedit. Check out my latest YouTube video to find out why this may not be the best idea. The answer may...
Read More
What is The Windows Registry?

What is The Windows Registry?

From time-to-time one may come across a reference to the Registry, whilst reading articles in respect to the Windows operating system or PCs. So, what is it?   The Registry The Windows Registry is a hierarchical database that contains information, settings, and options about software and hardware installed on the...
Read More
What Are SHA-256 Hash Values, Relating To File Downloads?

What Are SHA-256 Hash Values, Relating To File Downloads?

SHA-256 is one of a set of cryptographic hash functions designed by the NSA. The SHA-256 algorithm is often used to produce a hash value (see below) in order to confirm a file’s integrity.   Why do we need a hash value for file downloads? When we download files from...
Read More
How To Easily Secure A WiFi Network

How To Easily Secure A WiFi Network

Many people still unpack their new router and set up their WiFi network without giving a second thought to security. This is sometimes due to the fact that the less experienced WiFi user believes that the router is secure, straight out of the box. This, of course, is not the...
Read More
What Are Windows Reboot Operations?

What Are Windows Reboot Operations?

Often referred to as Pending File Renames, these operations are events relating to folders and files which take place when your PC is rebooted, or switched off and back on again. These events fall into the following categories: Delete files / folders Rename files / folders Move files / folders...
Read More
What is an ADS (Alternate Data Stream)

What is an ADS (Alternate Data Stream)

Alternate Data Streams (ADS) are part of the NTFS file system in Windows operating systems. They are not included in the FAT and FAT32 file systems. ADSs were originally included in NTFS to provide compatibility with the Macintosh File System. What is an ADS? Every file has a primary data...
Read More