How To and technical articles, covering a range of subjects relating to computers, operating system configuration and day-to-day computer use.
Looking for something specific? Try the search box.
The Easiest And Fastest Way To Launch The Task Manager In Windows 10/11
When your PC is running slowly, the fewer keystrokes you need in order to display the Windows Task Manager, the better. This Quick Bytes video shows you how, in under one minute.Read More
How to Keep a Window on Top in Windows 10 and 11
Check out this new YouTube video which explains how you can make a window stay on top in Microsoft Windows 10 and 11, using free software from Microsoft.Read More
What digitally signed software is, and how you can check a digital signature
Having a program or app which is digitally signed shows potential users that it really is from the person or company that it says it is, and that it has not been modified by a third-party and / or had a virus, worm, or other nefarious code added. To find...Read More
How to Backup a Windows Registry (and how not to)
Backing-up The Windows Registry As an IT professional, I have often been asked what the best way is to backup the Windows Registry. Most people use the Windows Program Regedit. Check out my latest YouTube video to find out why this may not be the best idea. The answer may...Read More
What is The Windows Registry?
From time-to-time one may come across a reference to the Registry, whilst reading articles in respect to the Windows operating system or PCs. So, what is it? The Registry The Windows Registry is a hierarchical database that contains information, settings, and options about software and hardware installed on the...Read More
What Are SHA-256 Hash Values, Relating To File Downloads?
SHA-256 is one of a set of cryptographic hash functions designed by the NSA. The SHA-256 algorithm is often used to produce a hash value (see below) in order to confirm a file’s integrity. Why do we need a hash value for file downloads? When we download files from...Read More
How To Easily Secure A WiFi Network
Many people still unpack their new router and set up their WiFi network without giving a second thought to security. This is sometimes due to the fact that the less experienced WiFi user believes that the router is secure, straight out of the box. This, of course, is not the...Read More
What Are Windows Reboot Operations?
Often referred to as Pending File Renames, these operations are events relating to folders and files which take place when your PC is rebooted, or switched off and back on again. These events fall into the following categories: Delete files / folders Rename files / folders Move files / folders...Read More