Preventing Orphaned GPOs
When you remove a computer from a domain there are a few steps you should take to ensure that its GPO settings are removed properly as well.
When you remove a computer from a domain there are a few steps you should take to ensure that its GPO settings are removed properly as well.
This registry tweak will allow you to toggle the Internet Explorer popup blocker. By extrapolating the information here, you can actually control popups in other programs as well, such as MSN Messenger, Windows Explorer, and others. This hack has been tested on Windows XP SP2 and SP3, but not Vista. You can try with Vista, but your mileage… Read More »
The default behavior for XP is to save the desktop configuration on exiting the operating system. To prevent saving the desktop configuration, make the following registry edit:
This tweak prevents the system beeps from being audible without altering any other audio settings.
Windows stores the location of per-user special folders under the following registry key:
This will prevent Windows Vista from checking the space on your hard drive and popping up the notorious “Hey, you”re running out of space!” warning balloon.
Windows Vista’s User Account Control (UAC) is the new operating system’s most universally reviled feature. Sure, it helps protect you, but it also annoys you to no end.
This registry hack will control what happens to AutoPlay when you put a CD into the drive caddy. Researching NoDriveTypeAutoRun, reminds me of a tip that I was given for playing chess; when you find a good move, look for an even better one. Previously I had known about plain AutoRun, but now I have found a more… Read More »
Defragmenting your hard drive is a simple way to improve disk access and improve the overall zip of your PC. The only downside is that it can take several hours to run. Also, it’s not something that most people remember to do on a regular basis.
Here is a quick tip to finding out where the FSMO roles for a domain are located. When dealing with Active Directory on a domain that is unfamiliar, you may be placed in a situation where you have to verify the location of the domains FSMO roles.