SQL transaction log files should be maintained automatically by SQL Server, but sometimes grow too large when automatic maintenance is not being performed correctly. When this happens, transaction log files can grow unexpectedly large. It is important to take manual steps to shrink these files before they consume all available disk space.
Category Archive: Questions & Answers
Permanent link to this article: http://www.robertborges.us/2015/04/questions-answers/how-to-shrink-large-sql-transaction-log-files/
Your Windows PC or laptop may be configured to print to several printers. Some printers may be connected directly to your computer, while others are attached to the network. On each computer, one printer is defined as the default printer. The default printer is typically the printer to which all programs (Word, Excel, QuickBooks, etc.) print by default.
Permanent link to this article: http://www.robertborges.us/2014/08/questions-answers/how-to-set-your-pcs-default-printer/
When deleting user profiles, it is advisable to use the built-in GUI (graphical user interface) interface in Windows (Start >> System >> Advanced System Settings >> User Profile – Settings). This should delete all references in the registry, and the user’s profile folder (normally located in C:\Users). But what if this doesn’t work as it should?
Permanent link to this article: http://www.robertborges.us/2014/07/questions-answers/how-to-delete-a-user-profile-from-the-registry/
In previous posts, I have shown you how to export and import machines from one Hyper-V host to another (see post titled “Importing & Exporting Hyper-V VMs in Windows Server 2012 R2“). I have also talked about building new virtual machines from scratch. There are many scenarios where it makes a lot of sense to virtualize an existing system as is. In essence, you would convert a physical server to a VM (virtual machine). We call this a Physical-to-Virtual (P2V) migration.
Permanent link to this article: http://www.robertborges.us/2014/05/questions-answers/p2v-migration/
For a long time Windows has had power saving functionality of various types. In Windows XP and Windows Vista we had a standby mode which used minimal power and a hibernation mode which would use no power. In Windows 7 and Windows 8 the hibernation and standby modes become one single mode called Sleep mode. You can configure how long the computer will be idle before it goes to “sleep”.
Permanent link to this article: http://www.robertborges.us/2013/12/questions-answers/how-do-i-change-hibernation-settings-in-windows-8/
Permanent link to this article: http://www.robertborges.us/2013/07/questions-answers/how-to-split-an-internet-connection-between-two-or-more-computers/
Permanent link to this article: http://www.robertborges.us/2013/03/questions-answers/video-conferencing-whats-the-point/
Whether you are buying a new PC or thinking of upgrading an existing PC, the choice of Windows 7 or Windows 8 is not an easy one. To determine whether Windows 8 will work for you and your environment you first have to consider: application compatibility, added benefits, and usability. Once you have done that you can then determine which edition of Windows you should purchase (Windows 8 Core, Pro, Enterprise, or Windows RT).
Permanent link to this article: http://www.robertborges.us/2012/12/questions-answers/should-i-purchase-windows-7-or-windows-8/
Permanent link to this article: http://www.robertborges.us/2012/10/cloud-computing/the-difference-between-pop3-and-exchange/
We have become so dependent on this electronic world we have built. With such critical information as medical records and banking, it is imperative that we protect ourselves from the many cyber threats lurking at every turn.
Common variants of these cyber threats are pop-ups and fake security applications (ie. fake anti-virus, fake anti-spyware, and fake anti-malware). The best way to stop these threats is to prevent them from ever taking hold of your system in the first place.
Permanent link to this article: http://www.robertborges.us/2012/10/it-security/preventing-pop-ups-and-fake-security/
There are actually several ways to send email as another person, making it look like they actually sent the email. Most of these methods don’t actually require access to the users Email mailbox. This is what we refer to as spoofing. If you’ve ever received an Email from yourself, then you know what I’m talking about.
Permanent link to this article: http://www.robertborges.us/2012/07/it-security/people-keep-getting-spam-emails-from-my-email-address-what-do-you-suggest/
Permanent link to this article: http://www.robertborges.us/2012/06/windows/windows-7/5-ways-to-increase-your-computers-speedperformance/
Permanent link to this article: http://www.robertborges.us/2012/05/mobile-computing/how-to-remotely-access-you-home-or-office-pc-2/
In my previous post (Preventing Spyware or Virus Infections) I explained how to help protect yourself from virus and spyware infections. If you still do contract a spyware or virus infection, there are a few things you can do to clean up your PC or laptop.
Permanent link to this article: http://www.robertborges.us/2012/05/it-security/recovering-from-a-spyware-or-virus-infection/
Permanent link to this article: http://www.robertborges.us/2012/04/it-security/how-to-securely-dispose-of-your-old-hard-drives/