• WSlindacjones

    WSlindacjones

    @wslindacjones

    Viewing 6 replies - 1 through 6 (of 6 total)
    Author
    Replies
    • in reply to: What’s new — and expected — in Win10, build 9926 #1486936

      This tethering and automatic updating is probably a good idea for home users, but it is anathema to systems administrators who like to use a tool like WSUS to control when their users get updates. In a large network, updates are thoroughly tested in a test network first and deployed only when they have been demonstrated to be harmless in the firm’s environment. If this is forced down our throats, we’ll probably avoid Windows 10 as we have Windows 8/8.1.

    • in reply to: Reveton Ransomware – Computer Camera #1374698

      Sadly, av software fails to prevent some of these drive by attacks.

    • in reply to: The best of LangaList Plus — 2010 #1260531

      Sadly, Microsoft’s Page Defrag seems not to be intended for 64-bit systems. Or maybe not on Win7 at all? It will not run on Win7-64bit. It started ok on Win7-32bit, but got accessed denied and failed to defrag anything.

    • in reply to: Set-top boxes match up: Apple TV vs. Google TV #1257917

      Am I missing something? I just have a computer connected to my TV screen through a DVI cable. The audio is connected into my home entertainment system. I can play everything. No restrictions.

    • in reply to: Tuning Windows power settings boosts performance #1222224

      Downloaded and installed “What’s my computer doing.” First it asked if I wanted it to install a Softronix toolbar. I said NO.

      After it installed, i tried to run it. Got a DLL error.

      When I started my browser, I found that the toolbar had been installed and that my start page had been changed, despite my having said NO to that, too.

      Uninstalled the entire mess. Not recommended.

    • in reply to: Run your PC from afar — securely and easily #1218608

      We have recently started using GoToAssist as a tool for supporting all of our clients. It is not free.

      One of its powerful options is “unattended operation.” Once you set that up, you can log into the target machine anytime without any user intervention.

    Viewing 6 replies - 1 through 6 (of 6 total)