Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed

Tag: Microsoft

  • Home
  • Microsoft
  • Page 9
Install MacOS Sierra 10.12 on VMware Player on Windows 1
Tech Tips Technology

Install MacOS Sierra 10.12 on VMware Player on Windows

Earlier today, I posted an article to show you how to Install MacOS Sierra 10.12 on VirtualBox on Windows. Some of the process is similar, but I’ll walk you through

October 1, 2016October 16, 2016
Continue Reading...
Install MacOS Sierra 10.12 on VirtualBox on Windows 2
Tech Tips Technology

Install MacOS Sierra 10.12 on VirtualBox on Windows

Last month, Apple released their final version of MacOS Sierra. If you have decent hardware with enough CPU, RAM, and storage space, you could create a MacOS Sierra virtual machine

October 1, 2016October 16, 2016
Continue Reading...
Fix For Windows 10 Freezes But Mouse Still Moves 3
Tech Tips Windows

Fix For Windows 10 Freezes But Mouse Still Moves

I recently installed an SSD into my laptop and did a clean install of Windows 10. Occasionally after some usage, Windows 10 would freeze but I could still move my

September 29, 2016October 16, 2016
Continue Reading...
Exchange Send On Behalf and Send As Permissions For Distribution Groups 4
Windows System Administration

Exchange Send On Behalf and Send As Permissions For Distribution Groups

If you’re a Microsoft Exchange administrator, you might have come across a request from a user wanting to either Send On Behalf of a Distribution Group they’re a member of,

September 19, 2016November 9, 2018
Continue Reading...
Remediation for Microsoft Windows Unquoted Service Path Enumeration Vulnerability 5
Security

Remediation for Microsoft Windows Unquoted Service Path Enumeration Vulnerability

If you’re using a vulnerability scanner on your PC or network, you’ve probably come across the Microsoft Windows Unquoted Service Path Enumeration vulnerability. The truth is, this vulnerability has been

September 18, 2016April 13, 2020
Continue Reading...
How To Enable Admin Shares For Local Accounts And Allow WMI Access 6
System Administration Windows

How To Enable Admin Shares For Local Accounts And Allow WMI Access

If you have a local computer that is not on a domain, since Windows XP, you cannot access the admin shares or have WMI access using a local account, even

August 11, 2016October 16, 2016
Continue Reading...
Windows Server Tip: Disable 8.3 Naming and Strip Existing Short Names 7
OS System Administration Tech Tips Windows

Windows Server Tip: Disable 8.3 Naming and Strip Existing Short Names

There are performance and security benefits to disabling short file names (or 8.3 file names) on a Windows Server. From the graph below, you can see the performance benefits of

August 4, 2016October 16, 2016
Continue Reading...
Windows 7 Stuck At Checking For Updates 8
OS

Windows 7 Stuck At Checking For Updates

I was recently working on an older computer that needed a fresh installation of Windows 7. I downloaded a fresh image of Windows 7 with SP1 and ran through the

May 23, 2016October 16, 2016
Continue Reading...
How To Remove Internet Explorer (IE) From Windows Server 9
Apps Internet Tech Tips

How To Remove Internet Explorer (IE) From Windows Server

If you run any Windows Servers, you may run into a scenario where you want to remove access to Internet Explorer. Usually, any administrators that log into servers won’t have

May 18, 2016October 16, 2016
Continue Reading...
How-To Write SQL Server Audit Events To Windows Security Log 10
System Administration Tech Tips Windows

How-To Write SQL Server Audit Events To Windows Security Log

There are a few options you have if you want to enable audit logging on Microsoft SQL Server. You can write the logs to a .sqlaudit file, but you cannot

February 17, 2016October 16, 2016
Continue Reading...

Posts pagination

Previous 1 … 8 9 10 … 13 Next
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}