Google automatically forms a cache of your site; however, you can disable this.
If you find yourself frequently changing one or more printer properties such as print quality or grayscale, you can set the default properties on each printer on your system to make your life easier.
This tech-recipe explains how to use the xargs command in Korn shell to work with multiple files. The instructions will show how to combine ten files into one file, without manually combining them using a: cat file1 > bigfile, cat file2 >> bigfile, etc. The uses of this command are wide and most helpful. Using the xargs command is an effective way to work with large amounts of files. For example, it can even help you avoid “the parameter list is too long” message when trying to grep more than 1024 files.
This is another handy tech-recipe for XP install geeks. This tutorial explains how to ‘slipstream’ a service pack into your Windows XP Installation and then create a bootable Windows XP with an install CD. This is convenient since the slipstreaming will update your XP installation files to have the service pack applied before you install. That means no more downloading or updating to SP3 on new installs.
The password paradox is a commonplace condition. Make your passwords strong and difficult to guess, change them frequently, and do not write them down. It is a formula for forgetfulness. Eventually, many organizations find themselves locked out of their PIX. This tech-recipe describes the process for resetting the PIX password.
Whenever you type a password in the password field of a metro app or a website, a reveal password button will appear at the end of the field. Clicking this button will display your password on the screen. Security conscious users (and network administrators) will worry about this feature and many will want to disable it for extra security. This tutorial will show you how to do exactly that.
Most ripped videos will come into iTunes into the Movies category. This tutorial will show you how to change the category so it will appear correctly in your iPhone, iPod, or AppleTV. This technique works in all versions of iTunes including 8, 9, and 10.
The Box application for Android phones is sure one of the most convenient way to store, access, and share files with your friends. However, if your phone is stolen, your files can be accessed easily. This tutorial will show you how to set up the passcode within the application for extra security.
This is a tech-recipe for creating maximum efficiency for your PC. The steps describe setting up a dual monitor configuration.
This tech-recipe explains the basics of flashing one’s BIOS or firmwares. Although the following instructions pertain to motherboards specifically, the principles are the same throughout each realm (i.e., video card, CD/DVD Drive).
The bash shell allows a number of methods for accessing elements of variable arrays. This tech-recipe demonstrates some of these techniques.
Occasionally, you do not want people to be able to uninstall software easily from a system. This reg hack will prevent it from showing up in the Add or Remove Programs List.
1...336337338...525Page 337 of 525 error: Content is protected !!