Navigate to the following registry key :“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList”
Under ProfileList navigate to binary key’s like this: S-1-5-21-3656904587-1668747452-4095529-500
On the right side under ProfileImagePath you’ll see the username and profile path.
Chose the one with the desired user and delete the long registry key like: “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList”
To roll back your Windows 10, go to your PC Settings, by typing Settings in the taskbar search bar, next to the Windows icon, and clicking on Settings. It will open the PC Settings. Select ‘Update and Security’.
The Update and Security option opens. Here you will see options like Windows Update, Activation, Backup, Recovery and Windows Defender. Click on ‘Recovery‘.
This will open the Recovery settings window for your PC. You will see 3 options:
Reset this PC: Remove everything and reinstall Windows. This will take your PC to its original factory settings.
Go back to your previous version of Windows: This will just bring your previous Windows back on your PC without affecting your documents and files. Note that you have to carry out the rollback operation, within 30 days of upgrading to Windows 10
Advanced Startup: Here you can change your PC settings using a Windows image or a USB/DVD.
Click on ‘Go back to previous version of Windows’. In this case you see Go back to Windows 8.1.
Microsoft will then ask for your feedback and the reason to uninstall Windows 10.
Give your feedback and move ahead. Click on Next. You will see the following screen
.
Make sure your PC is plugged in as the rollback might get interrupted due to power off. Click on the Go back to Windows 8.1 button.
Make sure your PC is plugged in as the rollback might get interrupted due to power off. Click on the Go back to Windows 8.1 button.
Your system might take a while to process the roll back and read the settings of your previous Windows version. Sit back and enjoy a cup of coffee. Note the important warning – you need to know or remember your password you used to sign on into your previous Windows version.
FATstands for File Allocation Table and FAT32 is an extension which means that data is stored in chunks of 32 bits. These is an older type of file system that isn’t commonly used these days.
NTFSstands for New Technology File System and this took over from FAT as the primary file system being used in Windows
Description of Features
Fault Tolerance:NTFS maintains a log of disk changes and in case of power failure or abrupt errors it repairs the files and folders automatically without the user being notified anything. FAT32 maintains two different copies of the file allocation table and uses a back up mechanism if some damage occurs.
Security:In FAT32 you will have to depend on share permissions for security. This means that they are good in the Network but locally they are vulnerable. On the other hand NTFS allows you to set permissions on local files and folders as well.
Compression: FAT32 offers no compression feature whatsoever. While NTFS lets you compress files and folders individually so that you do not have to slow down the system by depending on partition compressions.
Conversion:You may easily convert a FAT32 system to NTFS. But the reverse is not true because NTFS follows a secure protocol. So, the only option here is to backup your data and format the disk.
Kodi is an award-winning free and open source (GPL) software media center for playing videos, music, pictures, games, and more. Kodi runs on Linux, OS X, Windows, iOS, and Android, featuring a 10-foot user interface for use with televisions and remote controls. It allows users to play and view most videos, music, podcasts, and other digital media files from local and network storage media and the internet.
K9 Web Protection is a free Internet filter and parental control software for your home Windows or Mac computer
Protect Yourself
K9 Web Protection is a free Internet filter and pornography blocker for personal use. K9 puts YOU in control of the Internet so you can protect yourself
Protect Your Computer
K9 Web Protection is a free Internet filtering and malware defense for your home computer. K9 puts YOU in control so you can protect your computer
Protect Your Organization
K9 Web Protection for Organizations is our Internet filtering and web security solution for your business or .........
Features :
Block web sites in more than 70 categories, including pornography, gambling, drugs, violence/hate/racism, malware/spyware, phishing
Force Safe Search on all major search engines
Set time restrictions to block web access during designated times
Configure custom lists for "always allow" and "always block"
Override a web page block with password
Trust the enhanced anti-tampering, even children can't break
View easy reports to monitor and control web activity
Real-time categorization of new adult and malicious sites
Best free parental controls software/internet filter available
RAID 0: This configuration has striping but no redundancy of data. It offers the best performance but no fault-tolerance
RAID 1: Also known as disk mirroring, this configuration consists of at least two drives that duplicate the storage of data. There is no striping. Read performance is improved since either disk can be read at the same time. Write performance is the same as for single disk storage.
RAID 2:This configuration uses striping across disks with some disks storing error checking and correcting (ECC) information. It has no advantage over RAID 3 and is no longer used.
RAID 3:This technique uses striping and dedicates one drive to storing parity information. The embedded ECC information is used to detect errors. Data recovery is accomplished by calculating the exclusive OR (XOR) of the information recorded on the other drives. Since an I/O operation addresses all drives at the same time, RAID 3 cannot overlap I/O. For this reason, RAID 3 is best for single-user systems with long record applications.
RAID 4:This level uses large stripes, which means you can read records from any single drive. This allows you to use overlapped I/O for read operations. Since all write operations have to update the parity drive, no I/O overlapping is possible. RAID 4 offers no advantage over RAID 5.
RAID 5:This level is based on block-level striping with parity. The parity information is striped across each drive, allowing the array to function even if one drive were to fail. The array’s architecture allows read and write operations to span multiple drives. This results in performance that is usually better than that of a single drive, but not as high as that of a RAID 0 array. RAID 5 requires at least three disks, but it is often recommended to use at least five disks for performance reasons.
RAID 5 arrays are generally considered to be a poor choice for use on write-intensive systems because of the performance impact associated with writing parity information. When a disk does fail, it can take a long time to rebuild a RAID 5 array. Performance is usually degraded during the rebuild time and the array is vulnerable to an additional disk failure until the rebuild is complete.
RAID 6:This technique is similar to RAID 5 but includes a second parity scheme that is distributed across the drives in the array. The use of additional parity allows the array to continue to function even if two disks fail simultaneously. However, this extra protection comes at a cost. RAID 6 arrays have a higher cost per gigabyte (GB) and often have slower write performance than RAID 5 arrays.
Nested RAID levels
Some RAID levels are referred to as nested RAID because they are based on a combination of RAID levels. Here are some examples of nested RAID levels
It's not like a computer. It is a computer. Same operating system, same high quality graphics, and same wireless connectivity as a full-sized computer. Totally different dimensions
Wi-Fi
OS: Windows 10
Super portable, Plugs into any display with an HDMI port, Runs full Windows 10 Home
2GB of RAM limits multitasking, 32GB of builtin storage, Can create a mess of wires
Super small fully functional PC, 802.11ac WiFi, USB 3.0 2 ports, Expandable storage, Affordable
Bad: Relatively low performance but within expectations
Four-bay small business Intel D525 Atom based NAS running on Windows Storage Server 2008 R2 Essentials
Pros
• Bundled bare-metal client backup • Handles up to 25 users • Provision for dual external power supplies (one supplied) • USB 3.0 ports
Cons
• No power save mode • Fan runs full blast when system is off • Extremely long RAID re-initialization times • No Apple Time Machine support • Limited backup options
Here's how to create another account on your PC for a child or someone else who doesn't have a Microsoft account.
Select the Start button, and then select Settings.
Select Accounts > Other users.
Under Other users, select Add someone else to this PC.
At the bottom of the page, select I don’t have this person’s sign-in information.
At the bottom of the next page, select Add a user without a Microsoft account.
Enter a name for the new account. If you want this person to sign in with a password, enter and verify the password, add a password hint, and then select Next.
Select Microsoft Office 2016 Professional Plus version and then download the correct bit (32 or 64) for your operating system.
Open the .iso file from your download location..
Then, click setup.exe from the mounted DVD location.
Accept the terms of the License Agreement by checking I accept the terms of this agreement. Click Continue.
Select Upgrade. You may click Customize to keep specific Office products from upgrading or to change the download location.
5. Microsoft Office 2016 will begin to install. After it has finished, it will display the message below. You can now open Office 2016 from your programs folder or Start menu.
هو مفهوم المنتجات و برامج السوفت وير الذي يكون الكود الخاص بها مفتوح ومتاح لجميع المطورين للاضافة و التعديل فيه دون قيود و ايضا اضافة مزايا جديدة لها كما يتيح لهم فرصة التعلم الجيد
المصدر المغلق:
و هي المنتجات التي تكون مغلقة الكود اى ان المطور او المبرمج لا يستطيع التعديل فيه
خصائص:
المصدر المفتوح :
يوفر حماية امنية عالية من حيث عدم قدرة اى فيروس من اصابة ملفاته او الضرر بها
ليس له حدود من حيث التطوير و الابداع
يحتوي على مركز برامج خاص
اي خطأ فنى يظهر تستطيع معالجته بنفسك ولا تحتاج للدعم الفنى من قبل الشركة
اذا حدث خطأ يمكن البحث عن الحلول في الويب
ليس له مقابل مادى فقط
المصدر المغلق :
كل منتج بثمنه ولا تستطيع الحصول عليه مجانا
الحفاظ على حقوق الملكية الفكرية فلن تستطيع الاستعانة بفكرة موجودة والتطوير بها نظرا لخفاء الكود الخاص بها
حدوث الكثير من الاخطاء نظرا لان عدد المطورين محدود على عكس المصدر المفتوح
كثيرا ما تغير نظام التشغيل المغلق لكثرة الاعطال به مما يضطرك الى بذل وقت وجهد
Junk data accumulates on a PC over time and causes performance to suffer, slowing down other programs and system services. Follow these steps to clean up junk data in Windows.
Press the Windows key and the R key at the same time to open the Run prompt.
Type into the Run prompt: cleanmgr.exe
Press Enter. A new window will open.
Select the drive that you want to clean from the drop down menu and click OK. The disk cleanup utility will scan for junk files. Note: Windows will only search for a limited selection
of junk files.
Select the categories that you wish to clean junk items for by ticking the box next to the category listing. You can see next to each category the sum amount of the size of the data.
Once you’ve finished making your selections, click OK to delete the files.
Note: This built-in Windows tool does a minimal job of cleaning junk data. Download SlimCleaner Plus to automatically remove gigabytes of junk data that could be on your PC.
The Microsoft Open Database Connectivity (ODBC) interface is a C programming language interface that makes it possible for applications to access data from a variety of database management systems (DBMSs). ODBC is a low-level, high-performance interface that is designed specifically for relational data stores. The ODBC interface allows maximum interoperability—an application can access data in diverse DBMSs through a single interface. Moreover, that application will be independent of any DBMS from which it accesses data. Users of the application can add software components called drivers, which interface between an application and a specific DBMS.
Open Database Connectivity (ODBC) is a standard application programming interface (API) for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating systems. An application written using ODBC can be ported to other platforms, both on the client and server side, with few changes to the data access code. ODBC accomplishes DBMS independence by using an ODBC driver as a translation layer between the application and the DBMS. The application uses ODBC functions through an ODBC driver manager with which it is linked, and the driver passes the query to the DBMS. An ODBC driver can be thought of as analogous to a printer driver or other driver, providing a standard set of functions for the application to use, and implementing DBMS-specific functionality. An application that can use ODBC is referred to as "ODBC-compliant". Any ODBC-compliant application can access any DBMS for which a driver is installed. Drivers exist for all major DBMSs, many other data sources like address book systems and Microsoft Excel, and even for text or comma-separated values (CSV) files.
Event Viewer is a tool that displays detailed information about significant events (for example, programs that don't start as expected or updates that are downloaded automatically) on your computer. Event Viewer can be helpful when troubleshooting problems and errors with Windows and other programs. For more information about Event Viewer
Open Event Viewer by clicking the Start button , clicking Control Panel, clicking System and Security, clicking Administrative Tools, and then double-clicking Event Viewer. If you're prompted for an administrator password or confirmation, type the password or provide confirmation
Bring your PC to its limits with the freeware stress test tool HeavyLoad. HeavyLoad puts your workstation or server PC under a heavy load and lets you test whether they will still run reliably
The individual test methods employed by HeavyLoad can be customized to fit your needs. On a system featuring multiple processor cores, for example, you can select how many of the available cores shall be used or set the speed in which the test file is to be written on your hard disk
The System Preparation (Sysprep) tool prepares an installation of Windows for duplication, auditing, and customer delivery. Duplication, also called imaging, enables you to capture a customized Windows image that you can reuse throughout an organization. Audit mode enables you to add additional device drivers or applications to a Windows installation. After you install the additional drivers and applications, you can test the integrity of the Windows installation. Sysprep also enables you to prepare an image to be delivered to a customer. When the customer boots Windows, Windows Welcome starts.
Sysprep must be used only to configure new installations of Windows. You can run Sysprep as many times as required to build and to configure your installation of Windows. However, you can reset Windows activation only up to three times. You must not use Sysprep to reconfigure an existing installation of Windows that has already been deployed. Use Sysprep only to configure new installations of Windows.
If you intend to transfer a Windows image to a different computer, you must run sysprep /generalize, even if the computer has the same hardware configuration. The sysprep /generalize command removes unique information from your Windows installation, which enables you to reuse that image on different computers. The next time you boot the Windows image, the specialize configuration pass runs. During this configuration pass, many components have actions that must be processed when you boot a Windows image on a new computer. Any method of moving a Windows image to a new computer, either through imaging, hard disk duplication, or other method, must be prepared with the sysprep /generalize command. Moving or copying a Windows image to a different computer without running sysprep /generalize is not supported.
A big difference between 32-bit processors and 64-bit processors is the number of calculations per second they can perform, which affects the speed at which they can complete tasks. 64-bit processors can come in dual core, quad core, six core, and eight core versions for home computing. Multiple cores allow for an increased number of calculations per second that can be performed, which can increase the processing power and help make a computer run faster. Software programs that require many calculations to function smoothly can operate faster and more efficiently on the multi-core 64-bit processors, for the most part.
Another big difference between 32-bit processors and 64-bit processors is the maximum amount of memory (RAM) that is supported. 32-bit computers support a maximum of 3-4GB of memory, whereas a 64-bit computer can support memory amounts over 4 GB. This feature is important for software programs used in graphic design, engineering, and video editing as these programs have to perform many calculations to render their images.
One thing to note is that 3D graphic programs and games do not benefit much, if at all, from switching to a 64-bit computer, unless the program is a 64-bit program. A 32-bit processor is adequate for any program written for a 32-bit processor. In the case of computer games, you'll get a lot more performance by upgrading the video card instead of getting a 64-bit processor.
In the end, 64-bit processors are becoming more and more commonplace in home computers. Most manufacturers build computers with 64-bit processors due to cheaper prices and because more users are now using 64-bit operating systems and programs. Computer parts retailers are offering fewer and fewer 32-bit processors and soon may not offer any at all.
A power plan is a collection of hardware and system settings that manages how your computer uses power. Power plans can help you save energy, maximize system performance, or achieve a balance between the two.
All users (standard and administrator) will be able to make changes to any power plan settings except for the grayed out options. The grayed out options (ex: "require password on wakeup") can only be changed by an administrator using the "Change settings that are currently unavailable" option.
Changes made to a power plan will affect all users that have chosen the same power plan as their default active power scheme.