Windows Server 2012/2008/2003/2000/XP/NT Administrator Knowledge Base

Last Updated on 1 Nov. 2016, Total: 3132 Knowledge Base Tips

449 Windows 2000
280 Admin Tips
73 Registry Tips
96 User Tips
367 Windows 2003
361 Admin Tips
4 Registry Tips
2 User Tips
275 Windows 7
230 Admin Tips
21 Registry Tips
24 User Tips
75 Windows 8
71 Admin Tips
1 Registry Tips
3 User Tips
845 Windows NT
480 Admin Tips
296 Registry Tips
69 User Tips
304 Windows Server 2008
300 Admin Tips
3 Registry Tips
1 User Tips
219 Windows Server 2012
217 Admin Tips
153 Windows Vista
116 Admin Tips
3 Registry Tips
34 User Tips
444 Windows XP
233 Admin Tips
76 Registry Tips
135 User Tips
  1. How to break into registry to explore HKLM\\SAM and HKLM\\SECURITY keys?

    This article explains how you can use Psexec.exe to execute registry editor to explore SAM and SECURITY registry hives... Read More

  2. Specifying the target partition for unattended install of Vista

    Here is a tip on specifying the target partition when performing an unattended install of Windows Vista... Read More

  3. Administering the Windows Firewall with Windows Server 2008 Group Policy

    The windows firewall is now more manageable than ever with the group policy options available for it in Windows Server 2008. Here we discuss how to access these... Read More

  4. NAP Client state – Three ways to check the state.

    This article discusses the three ways to check the NAP state on a client computer running Windows Vista and Windows XP with SP3... Read More

  5. Moving user profile location in Windows Vista

    How to move the location where user profiles are stored in Windows Vista... Read More

  6. Checking the Location of Domain FSMO Roles

    Here is a quick tip to finding out where the FSMO roles for a domain are located... Read More

  7. How to tell if a computer has been sysprepped.

    Here’s an easy way how you can tell if a computer has been sysprepped... Read More

  8. Using WSUS on a Server with Limited Disk Space

    Most administrators are under the assumption that you need a great deal of free disk space to take advantage of WSUS. This isn’t always the case... Read More

  9. Removing the Hand from Icons of Shared Folders

    How to prevent the hand from appearing on the icons of shared resources... Read More

  10. Replacing the motherboard on a Vista computer that has BitLocker enabled.

    How to replace the motherboard on a Vista computer that has BitLocker enabled without losing access to your operating system and data... Read More