Basic Tips and tricks for Windows XP

Running Applications in Compatibility Mode With Windows XP, you can run programs as if though they were being run under a different operating system. (This is known as "emulation".) Simply right-click a shortcut, select "Properties" and then check "Run in compatibility mode" and select the operating system you wish to make the program believe it is being run under. This fools or tricks the program into thinking you are really using a previous version of Windows, such as NT, 2000, 98, or 95. This is especially useful for certain games that won't run properly. Be careful *not* to use this with certain system utilities, such as antivirus, defrag, registry, and disk tool applications.

Customizing the Start Menu Right click on the "Start" button and left click "Properties". From here, you can select the new Windows XP style Start Menu, or return to the Windows 2000/Millennium style one. You can also customize the two possible choices using their corresponding "Customize" buttons. This also allows you to turn on or disable cascading menus and other options that are useful, such as large or small icons and more.

Bring Back Those Desktop Icons After you install Windows XP, you probably noticed that some of your icons from previous versions of Windows you've used are missing. Microsoft did this intentionally to help simply and reduce clutter. Of course, for some people, this isn't the best choice or the user preference. So, if you want those icons like "My Computer" and "My Network Places" back, just open Display Properties (right click Desktop Wallpaper, left click "Properties") and click the "Desktop" tab. Click the "Customize Desktop" button and on the "General" tab check the items you want. You can also change the icons used by these desktop items in the same screen. One final tip related to this screen is the "Clean Desktop Now" button, which notifies you of unused icons on the desktop and offers to remove them if you choose.

Give Me My ClearType Windows XP includes a great new visual technology, called "ClearType" which increases horizontal legibility by approximately 300% and it looks great. Go back into "Display Properties" [see tip: "Bring Back Those Desktop Icons" for instructions] and this time, go to the "Appearance" tab. Click "Effects" and for the second drop down box, labeled "Use the following method to smooth edges of screen fonts", select "ClearType". Click OK twice and you're all set.

Lock Computer vs. Welcome Login Screen You must go into Control Panel and open the "User Accounts" applet to change this setting. Click "Change the way users log on or off". For maximum security, uncheck the "Use the Welcome screen" option. This re-enables the use of the "Lock Computer" option from the ALT CTRL DELETE menu, but prevents multiple users from being logged on locally at a single time. This also returns to the Windows 2000 style login screen. If you'd rather have the ability to *not* be able to use "Lock Computer" and would rather allow multiple users to logon to the computer at a single time locally, leave this setting checked and also check "Use Fast User Switching".

www.icttutorials.vze.com

taxi from O'Hare Bismarck .. Lockport Chicago limo O’Hare
In The News:

Experts say hackers who used to focus on Windows operating systems are increasingly targeting Apple IDs as part of a new phishing campaign.
Unitree, a Chinese robotics company that developed a backflipping robot, has now introduced a humanoid robot capable of doing a side flip.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
According to the FBI, cybercriminals are sending extortion letters, threatening to release victims' sensitive information unless a ransom is paid.
FireSat is a satellite project designed to detect and track wildfires early, aiming to detect a fire that's the size of a classroom within 20 minutes.
Tech expert Kurt “CyberGuy" Knutsson reports that researchers have uncovered a Chrome vulnerability used in a cyber espionage campaign.
Preserving voicemails securely on Android: Tech expert Kurt “CyberGuy" Knutsson reveals easy methods to keep memories alive forever.
This phishing kit bypasses 2FA via session hijacking and real-time credential theft. Kurt “CyberGuy" Knutsson offers four ways to stay safe from Astaroth phishing attacks.
Tech expert Kurt “CyberGuy" Knutsson discusses Joby Aviation and Virgin Atlantic planning to launch 200-mph U.K. air taxis linking airports and cities.
Fake Apple virus warnings, security alerts and messages are tactics used to prompt you to call a number or click on a malicious link. The CyberGuy explains how to protect your devices.
The combination of artificial intelligence and neuroscience allows a paralyzed man to manipulate a robotic arm by using his brain to imagine movements.
With the help of artificial intelligence, sophisticated fraud techniques emerging today are virtually undetectable to the untrained eye.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
If you need to free up space on your Mac, consider deleting duplicate photos in your image library. Apple makes it easy to do, and the CyberGuy explains the process.
Microsoft is discontinuing Skype in May after 22 years of service. Kurt the CyberGuy addresses other options for internet-based phone and video service.
Tron 1, a Chinese company's two-legged robot, is versatile and can walk, roll and pivot, even on rough terrain. Tron 1 stands 33 inches tall and weighs 44 pounds.
Hackers are tricking people into installing password-stealing malware by making them press keyboard shortcuts under the pretense of proving they're not bots.
Saving the voices of loved ones can be a comforting way to keep alive memories. Kurt "the CyberGuy" Knutsson explains how to preserve voicemail messages.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI warns that some free online document converters load malware onto people's computers, making their private information vulnerable to attack.
Toyota's compact electric FT-Me is designed to tackle challenges of city living while offering an accessible and eco-friendly transportation solution.
Kurt “CyberGuy" Knutsson says 23andMe's bankruptcy raises data privacy fears: Opt out, download and delete data now.
UBTech and Zeekr unite with AI robot swarms to make car manufacturing faster and smarter. Tech expert Kurt “CyberGuy" Knutsson explains how the process works.
Tech expert Kurt “CyberGuy" Knutsson says Apple's Passwords app had a three-month phishing flaw from iOS 18 to 18.2 patch.
Tech expert Kurt “CyberGuy" Knutsson discusses how this super-small electric mini-truck takes a big step toward production.

RSS: Get Notified When Your Favorite Websites Are Updated

RSS (Really Simple Syndication) is a way for a site... Read More

Microsoft Great Plains Implementation: Verticals - Wholesale Order Entry center ? overview

Microsoft Business Solutions Great Plains has substantial market share and... Read More

Cisco CCNA Certification: Becoming A Truly Valuable CCNA.

I've been active in the Cisco Certification track for four... Read More

Microsoft Great Plains Multicurrency ? Overview For Implementation Consultant

When you first think about multicurrency ? you probably have... Read More

Microsoft Great Plains Nationwide Remote Support

ERP Consulting industry is on the way to serve clients... Read More

Microsoft Great Plains Middle East - Arabic Language Support

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

COSMIC: A Small Improvement on the Symons Method

The COSMIC FP (function point) software quality metric, is no... Read More

Reduce TCO: The Java Database Way

TCO (Total Cost Ownership) is the buzzword in... Read More

Groupware and Online Collaboration: Collaboration Series #4

This article is the fourth of a series of articles... Read More

Putting Screensavers Under Control

No matter how much you enjoy your favorite screensavers, sometimes... Read More

Programming Language Migration Path

While I was preparing some personal background information for a... Read More

Software Development in 2005 - Back to the Future

2005 ? Back to the Future.What does the future hold?... Read More

IT Strategy for Midsize Business: Microsoft vs. Java, Great Plains & CRM

Midsize business or non-profit organization should decide if one-vendor solution... Read More

Most Common Ways to Accumulate Spyware (where It is Downloaded to Your PC)

It is possible that if one avoided all sources of... Read More

The Bluebird Project

The objective for Zandi Digital is to make available clever... Read More

History of Java

The java programming language is becoming more and more popular... Read More

Microsoft Great Plains: Large Scale Implementation

Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More

Theres Gold in Your Websites Server Log

Many Webmasters have never bothered to view their website's server... Read More

Know-how in Microsoft Publisher

For those who still don't know, Microsoft Publisher helps computer... Read More

Intro to UNIX Shells

A UNIX Shell is in simplest terms, a command line... Read More

Microsoft CRM Integration with Microsoft Retail Management System (RMS) ? Overview

Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More

What is Shareware?

Shareware is software that you can try before you buy;... Read More

Screenshots Vista Windows

Features Additionally, Vista will include many other new features.Aero Vista... Read More

Performance Tuning of a Daffodil DB / One$DB -JDBC Application

This article illustrates the best practices to improve the performance... Read More

How To Identify, Cure and Prevent Spyware/Adware Infections

Just when you thought you were Web savvy, one more... Read More

Granger Lincoln Stretch limo rentals ..