사이트 로그인
2026.01.21 05:04
Click one of the computer names that you want to access. Choose "Remote Control" from the menu that shows up. Enter your buddy's password and you'll get remote access to that computer. The whole password situation used for Remote Control bothers me a bit. While this is fine if you are in a work/home scenario, this might not be a good idea in the "buddy" scenario as the Remobo password and the Remote Control password are the same. So if you know someone's remote control password, you know their account password. Kinda l
Simply put, the research options button provides one click access to particular reference books and research sites that the Microsoft Office 2007 suite provides as information resources. For example, the Research services to choose from include dictionaries, thesauruses, and various Internet research Web sites in several languages. The Research pane also includes a very useful translation serv
Now if you did follow all of the advice, is your wireless network safe? Probably not. Even the strongest encryption can be hacked, every firewall has a hole and if someone really wants to break in, they will find a way. It's not very likely, but it's still possi
I talk a lot about Windows, and using the "Run" command is a large part of it. It is a simple and easy method of accessing programs quickly. If you happen to want to make a shortcut to an application your own way, guess what, you
I have been saying repetitively how wonderful Windows is. The registry particularly can make customization easy and definitely fun. Today, we will be looking at just a few registry tweaks that can increase your ability to customize Windows to an extreme le
A contingent requirement lead me to the "˜discovery' of Research feature in Microsoft Word 2007 . Since Office 2003, this feature has been a quite presence. Perhaps, not used as frequently because for most of us a browser is more second nature. But a Research feature within the Office suite has its own value
The research functionality includes quite a few known resources as can be seen from the dropdown. Third party reference mines like Dow Jones' Factiva iWorks, the premiere online library HighBeam, Gale Company Profiles and Microsoft's own Live Search coupled with its rich Encarta dictionary and encyclope
Clicking on "View Shared Files" will open up a webpage that allows you to view all the shared files (yours and others') and also allows you to browse the files categorized by usernames so that you know who is sharing which fi
Nevertheless, AirSnare can be a valuable tool. The main window shows three major categories on the left: Network Adapters, Unfriendly MAC Addresses and Friendly MAC Addresses. To start monitoring your network connections, double click the respective network adapter(s) or right-click and select >Start. Then watch for detection of unfriendly MAC addresses. You can manually add friendly MAC addresses by right-clicking the category and selecting >Add New or you right-click on a MAC address reported as unfriendly and select >Add to Trus
So what do you do when you detect a questionable MAC address? If there is suspicious activity on your wireless network, you best change your network key, exclude the MAC address via your router, and eventually change your IP subnet. If the activity comes in via the wired network, you should also increase your local security, scan your system for malware, update your firewall, and lock up your network as best as you
(5) WinDirStat - Handy piece of software that offers an informative visual display of your hard-drive usage. Lets you quickly figure out what occupies most of your disk space (movies, documents, pics, those hidden videos :-) , etc.) Downloads last week: 11,
1. Go to "Start," "Run," and type regedit .2. Navigate to the following: HKEY_CURRENT_USERControl PanelDesktop 3. Find the key labeled "MenuShowDelay" and right-click, then click Modify .4. Change the value to whatever you like. (The range is 0-999 in millisecon
The AirHorn option is a cool idea, but as of Windows XP SP2 won't work, if the windows firewall is on and the messenger service is turned off on the receiving machine. I couldn't get the >Send E-mail on alert option to work eit
What happens when BitTorrent meets Hamachi meets remote desktop meets networking? Well you get something similar to Remobo (no longer available). Remobo lets you create an IPN which is an Instant Private Netw
(3) Spybot - Search & Destroy [Broken URL Removed] - Yet another spy/ad/craplet removal tool. Also lets you clean-up program and web-usage tracks, and even fix spyware-caused Registry inconsistencies. I have been using it for more then a year now and love it. (Nr. of downloads last week: 184,
So in the example I'm going to provide, we will say the home network has two computers. One is a Linux box running the SSH server and the other is a Windows gaming Setup|https://windowsmastery.com/ box with Remote Desktop enabled. We want to set up two tunnels: a dynamic tunnel and a local tunnel to connect to the Windows machine via Remote desk