Make that change
You’re having problems with an application, and you’ve been asked to make a change to the application’s configuration file from the command line. Which of these programs can help you modify the text-based configuration file?
You’re having problems with an application, and you’ve been asked to make a change to the application’s configuration file from the command line. Which of these programs can help you modify the text-based configuration file?
You’re having problems with a serial port on your laptop, and your diagnostics software needs an external tool to help complete the testing. Which of these tools is often used for testing physical ports?
Windows 7 gives you many different utilities to help keep your disks in peak operating condition. In this video, you’ll learn how to defragment your drives, how to check your disk for errors, and how to configure your Group Policies to provide control over removable storage media.
Installing and managing disk volumes and RAID configurations is an important skill to have in Windows 7. In this video, you’ll learn how to manage disk volumes, decide between MBR and GPT partitions, convert between disk types, and build Windows 7 software-based RAID arrays.
The Windows 7 operating system is constantly updated, but many environments would like to control the update process. In this video, you’ll learn how to configure every aspect of the update process, including the types of updates, update policies, hiding updates, reviewing update history, and rolling back updates.
Now that your remote VPN connection is running, you can take advantage of some Windows 7 technologies to make the most of your limited bandwidth. In this video, you’ll learn about Windows’ NAP technology, the process for auditing your remote connections, and how to publish individual applications using Remote Desktop’s RemoteApp feature.
Microsoft 70-680: 6.5 – Remote Connections – Part 2 Read More »
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.
Microsoft 70-680: 6.4 – Remote Connections – Part 1 Read More »
You would like to allow your office computers to access your wireless network, but you would like to hide the wireless network name from appearing on other wireless-enabled devices. What wireless network security feature can limit the visibility of your network name to other wireless systems?
One of your clients has called and complained of a blue-screen error that occurs about once a day. Unfortunately, they’ve not written down any of the messages that appear on the error page. Where can you find details about the Windows Stop Error after the computer has been rebooted?
You’ve started your computer, but your browser can’t seem to connect to your usual Google start page. When you check your network configuration, you notice that the physical port is lit but you don’t have an IP address. Which of these is the most likely cause of this issue?