Disable the Windows Key
Create a new Binary value, or modify the existing value, called ”Scancode Map” and edit the value according to the settings below.
Create a new Binary value, or modify the existing value, called ”Scancode Map” and edit the value according to the settings below.
Here’s a tip for those who like to keep their Windows Vista computer super-secure. You can encrypt your pagefile so that data can’t be easily extracted from it.
Windows Vista’s User Account Control (UAC) is the new operating system’s most universally reviled feature. Sure, it helps protect you, but it also annoys you to no end.
Wireless networking has experienced a huge increase in popularity over the last couple of years. The necessary hardware is widely available to consumers, it is very affordable, and relatively easy to install and configure. Gateway devices, common called “routers” or “firewalls” by consumers, that allow users to share a broadband connection with and protect multiple computers on a… Read More »
According to an FBI report from 2003 to 2004 online scams doubled with nearly ten million new victims. This crime cost those victims nearly $5 billion of money they could not afford to lose.
There is this one law school student whose thesis is about money laundering so oftentimes she would google the term to come up with a ready list of online references. This proved to be useful to her and the entire process of writing her paper. After several months of doing so, she was confronted with problems like being… Read More »
Adware, spyware and computer virus share some similarities, one of which is that all three are major nuisances for computer users. Let’s differentiate the three.
A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.
Data security has become a bigger concern as the information age goes into full swing. Computers are becoming more and more commonplace as versatile tools for a wide variety of tasks and uses. This has made digital storage increasingly the data storage format of choice, since digital information is easily accessed and processed by computers.
After you complete this procedure, the MRU list does not appear in Windows Explorer-style dialog boxes; however, this list is not removed from the registry.