Desktop
Windows 8 : Managing authorization and access rights (part 4) - Run As,Using and managing certificates
Windows 8 : Managing authorization and access rights (part 4) - Run As,Using and managing certificatesWindows has supported the execution of applications or services using alternate credentials for many versions. With the introduction of UAC, the ability ...
-  Windows 8 : Managing authorization and access rights (part 3) - Running tasks as administrator and user account control
-  Windows 8 : Managing authorization and access rights (part 2) - Local Security Policy console
 
Website
Sharepoint 2013 : Farm Management - Display Available Timer Jobs on the Farm, Get a Specific Timer Job, Enable a Timer Job
Sharepoint 2013 : Farm Management - Display Available Timer Jobs on the Farm, Get a Specific Timer Job, Enable a Timer Job  To obtain a timer job reference object, you need to find the identity of the timer job. Using Get-SPTimerJob by itself (see Listing 1) displays all available ...
-  Sharepoint 2013 : Farm Management - Review Workflow Configuration Settings,Modify Workflow Configuration Settings
-  Sharepoint 2013 : Farm Management - Review SharePoint Designer Settings, Configure SharePoint Designer Settings
 
 
Windows Phone 8 : Microsoft Office Mobile - Accessing Microsoft Office (part 4) - Places Options,Office Mobile Settings
Windows Phone 8 : Microsoft Office Mobile - Accessing Microsoft Office (part 4) - Places Options,Office Mobile SettingsAs you’ve seen in the previous sections, the Places screen is designed to give you quick access to Microsoft Office documents stored in various locations.
-  Windows Phone 8 : Microsoft Office Mobile - Accessing Microsoft Office (part 3) - Adding a SharePoint Folder , Searching for a Document
-  Windows Phone 8 : Microsoft Office Mobile - Accessing Microsoft Office (part 2) - The Places Screen
-  Windows Phone 8 : Microsoft Office Mobile - Accessing Microsoft Office (part 1) - The Recent Screen
-  New Generation Lenovo VIBE Z Review
 
 
 
 
Vintage Hi-fi : B&O Beogram 4000 Turntable (Part 4)
Vintage Hi-fi : B&O Beogram 4000 Turntable (Part 4)The Beogram 4000 has a smooth, silky, luxurious sound that encourages long listening sessions. No matter how late it is, there always seems to be time for one more side of an LP.
-  Vintage Hi-fi : B&O Beogram 4000 Turntable (Part 2)
-  Vintage Hi-fi : B&O Beogram 4000 Turntable (Part 1)
-  Pre/Power Amplifier : Cambridge Audio 851E/W (Part 3)
-  Pre/Power Amplifier : Cambridge Audio 851E/W (Part 2)
 
 
 
 
 
SQL Server 2012 : Policy Based Management - Evaluating Policies
SQL Server 2012 : Policy Based Management - Evaluating PoliciesOf course, policies would be purely academic if they never actually executed and evaluated any objects. Policies may be set for On Schedule, On Demand, On Change, or Log Only. Policies must be enabled using their context menu. On demand policies may ...
-  SQL Server 2012 : Defining Policies (part 3) - Creating Policies
-  SQL Server 2012 : Defining Policies (part 2) - Conditions
-  SQL Server 2012 : Defining Policies (part 1) - Management Facets
-  SQL Server 2012 : Validating Server Configuration (part 2) - Evaluate the Policy, Using the Central Management Server
 
 
 
 
Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 4) - Preventing Internal Servers from Being Filtered
Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 4) - Preventing Internal Servers from Being Filtered Typically, you don't want Exchange to apply Sender ID or connection filters to servers on your organization's network or to internal SMTP servers deployed in a perimeter zone.
-  Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 3) - Defining Block List Exceptions and Global Allow/Block Lists
-  Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 2) - Filtering Connections with IP Block Lists
-  Microsoft Exchange Server 2010 : Configuring Anti-Spam and Message Filtering Options (part 1) - Filtering Spam and Other Unwanted E-Mail by Sender, Filtering Spam and Other Unwanted E-Mail by Recipien
-  Microsoft Exchange Server 2010 : Creating and Managing Remote Domains (part 3) - Configuring Messaging Options for Remote Domains , Removing Remote Domains
 
 
 
 
Windows 8 : Managing BitLocker and other policy-based mobility tools (part 5) - Configuring offline file synchronization, Configuring policy settings for device power
Windows 8 : Managing BitLocker and other policy-based mobility tools (part 5) - Configuring offline file synchronization, Configuring policy settings for device power When offline files are enabled, other settings also need to be configured to enable the files to synchronize. Because a number of services are available that Windows 8 can synchronize with, the settings have been placed in Control Panel under a Sync Options heading.
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 4) - Configuring policy settings for offline files
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 3) - Managing BitLocker at the command line
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 2) - Managing BitLocker at the command line
-  Windows 8 : Managing BitLocker and other policy-based mobility tools (part 1) - Configuring BitLocker policies
-  Connecting Us TP-LINK TL-PA6010 Test
-  Wireless Connections: What You Need To Know (Part 5)