Physical Layer Details
The physical layer is level one in the seven-level OSI model of computer networking as well as in the five-layer TCP/IP reference model. It performs services requested by the data link layer.
The physical layer is level one in the seven-level OSI model of computer networking as well as in the five-layer TCP/IP reference model. It performs services requested by the data link layer.
The session layer is level five of the seven level OSI model. It responds to service requests from the presentation layer and issues service requests to the transport layer.
Are you sick of seeing the same tips again and again when you first logon to Windows? Now you can change them to whatever you want, whether it’s quotes, jokes or a to-do list, anything is possible. Simply open your registry and find the key below.To create a new tip, click on Edit | New | String Value… Read More »
Windows has the option to automatically dial your Internet Service Provider (ISP) to establish an Internet connection. This option can be controlled using this tweak.
This setting disabled the automatic logon to Netware servers.
This tweak hides the Help option on the Start Menu.Open your registry and find the key below.Create a new DWORD value, or modify the existing value called ‘NoSMHelp’ set the value to equal ‘1’ to enable the restriction.Exit your registry, you may need to restart for the changes to take effect. Key:
Removes the context menu that would normally appear when the user right clicks on the desktop or in the Explorer right results pane. (This option was added in Service Pack 2.)
When this option is enabled, a dialog box is shown apon successful validation by a Windows NT domain.
Removes the context menus for the tray, including the Start button, Tab control, and Clock. (This option was added in Service Pack 2.) Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]Value Name: NoTrayContextMenuData Type: REG_DWORDData: (0 = disabled, 1 = enabled)
Windows stores the names of previously mapped drives; this can be a security threat if vulnerable hidden shares are listed. An advantage is that this key can also be used to set default items for list, if for example inexperienced users where required to map common drives, you could store them here.