Reset Windows Services to default

Have you ever wanted to reset Windows’ Services?  If you want to reset Windows services, you can consult the website BlackViper.   Having researched Microsoft’s Operating Systems, the author of BlackViper.com gives different configurations including the default services in Microsoft’s operating systems.

There is also a GitHub repository of a PowerShell script to reset the services in Windows 10 (Based on BlackViper).  Link

BatCMD.com has small batch files to help you reset services one by one.  Link

Advertisements
Posted in Microsoft Windows, Microsoft Windows 10, Technology, Windows 10, Windows 10 Quick Tips | Leave a comment

Optimizing your server with more than one network card

New IT professionals may think that adding a second network card will improve throughput.  While this can be true, IT personnel need to be aware of several rules behind configuring multiple network cards.

Assuming the server will be in the same subnet, once the network cards are installed, several decisions have to be made.  Will the cards be independent and have separate IP addresses or will the cards be bridged and have the same IP address?

Two IP addresses

If you plan on installing two nic cards in your server and you want to use two ip addresses-

  • Make sure that licensing of software is not based on the MAC address of one of the NIC cards
  • Do NOT enable NetBIOS over TCP/IP – This can cause the name of the server to appear on the network more than once and an error will occur (multiple NetBT Event ID 4319 Errors stating “A duplicate name has been detected on the TCP network)
  • Use an internal DNS server – Client computers will use a DNS round-robin and routing tables will be built

One IP Address, multiple NIC cards

If you plan on using aggregation or the bridging of your network cards-

  • USE HP, Intel, Broadcom or other NICs that support teaming (drivers) – this is important so that the cards will be used together

Note- (Our recommendations)

  • Connect each NIC to a separate switch to ensure switchport flooding does not occur.”  Use switches that support IEEE 802.3ad
  • USE RSS and modify the registry appropriately to use multiple CPUs
    In Windows Server 2008, administrators can set the maximum number of RSS CPUs with the MaxNumRssCpus registry keyword in HKEY_LOCAL_MACHINE\\SYSTEM\CurrentControlSet\Services\Ndis\Parameters. TheMaxNumRssCpus value is a DWORD type and, if it is not present, NDIS uses the default value of 4.
    More information:
    http://msdn.microsoft.com/en-us/library/windows/hardware/ff570795(v=vs.85).aspx
  • To enable RSS:
    1. Open a command prompt as an administrator
    2. Type the following command, and then press ENTER:
      netsh int tcp set global rss=enabled
  • You may want to also enable TCP Chimney if your NIC card supports it. http://support.microsoft.com/kb/951037

Is TCP Chimney working? Type netstat -t if you see Offloaded during a connection, this feature is working

An excellent article on the use of multiple NIC cards http://blogs.technet.com/b/josebda/archive/2010/09/03/using-the-multiple-nics-of-your-file-server-running-windows-server-2008-and-2008-r2.aspx

Posted in Technology | Leave a comment

NTLM Settings in Windows 7, 8 or 10

You may have devices (NASs) on your network that you can no longer can connect to or you may not be able to network to an older OS.  Actually this changes settings to accept NTLMv1 and NTLMv2 so that you can connect to Samba Servers, Snap Servers, Older Windows Computers or whatever….

1. Go to Run, Type Regedit and open this key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

2. If it doesn’t exist, create a DWORD value named
LmCompatibilityLevel

3. Set the value to 1

4. Reboot

Posted in Technology | Leave a comment

An attempt was made to reference a token that does not exist

When opening manage or the  “Microsoft Management Console (MMC)”  you recieve
An attempt was made to reference a token that does not exist”.

Solution:

Open a Command Prompt ( Search for CMD) (right click and run as administrator) and navigate to

c:\windows\System32

Re-register the required DLL files by using the following command:

For /F %s in (‘dir /b *.dll’) do regsvr32 /s %s

Note:  Copy and paste may not work for the above command. You may have to change the ‘ to an apostrophe due to web page formatting

Also run SFC /SCANNOW from the command prompt (Elevate permission) if the above does not work.

This fix may also help fix other issues after a software installation.

Posted in Technology | Leave a comment

SC Awards Finalist-Best Cybersecurity Higher Education Program 

finalist sc awards

The Tennessee College of Applied Technology today announced that the Information Technology and Infrastructure Management Program has been named a finalist in the SC Awards 2018 for exemplary professional leadership in cybersecurity. The Information Technology and Infrastructure Management Program was acknowledged as Best Cybersecurity Higher Education Program in the Professional Award category of the SC Awards. Winners will be announced at the SC Awards ceremony on April 17, 2018 in San Francisco.

 “In an age where threats are ever-evolving, it is reassuring to know that one true constant is the commitment of dedicated information security professionals, as best exemplified by our SC Media Awards finalists,” said Illena Armstrong, VP, editorial, SC Media. “These inspiring innovators have set a high bar for their industry peers, as they continue to protect the world from attacks and vulnerabilities that imperil our security, privacy, and digital infrastructure. The year 2017 brought us WannaCry ransomware infections, the rise of cryptominers, and bugs like Broadpwn and BlueBorne that affected billions of devices. Whatever threats rear their ugly heads in 2018 and beyond, our finalists will be ready to act.”

 Now in its 21st year, SC Awards is recognized as the industry gold standard of accomplishment for cybersecurity professionals, products and services. Winners in the Professional Award category are selected by an expert panel of judges and recognize the most talented cybersecurity professionals from end-user companies. Judges conducted in-depth analysis and considered many factors – such as applicable research, analyst reports and/or product reviews – to narrow down the field of hundreds of submissions to just the top finalists.

 “It’s an honor to be named as a finalist with SC Media.  With cyber security careers growing at over 18% and cyber crimes growing at an unprecedented rate, it is important to train IT professionals to be ready for tomorrow’s challenges today.”, Steve Mallard, lead ITIM instructor at TCAT Shelbyville.

 “Training the next generation of IT professionals with excellence and professionalism is the foundation of our Information Technology and Infrastructure Management program.  Being recognized as leaders in innovation in the information technology arena is a testament to the program’s quality.  We are honored to be nominated as a finalist.”,  Laura Monks, president TCAT SHelbyville

 “The SC Award’s Professional Award category represents the highest caliber of leadership in the cybersecurity industry,” added Illena Armstrong of SC Media. “As a finalist, the Information Technology and Infrastructure Management Program has shown unique creativity and passion in their approach to addressing and combating even the most challenging cybersecurity issues.”

 The SC Awards gala honoring the winners attracts top professionals in the cybersecurity community and provides an invaluable opportunity for networking. To register for the 2018 SC Awards gala, please visit http://www.scmagazine.com/awards/
.About SC Media

SC Media is cybersecurity. For over 25 years, they have armed information security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders, and independent product reviews in partnership with and for top-level information security executives and their technical teams.

In addition to their comprehensive website, SC Media offers magazines, eBooks, and newsletters. They also host digital and live events such as SC Awards and RiskSec NY to provide cybersecurity professionals all the information needed to safeguard their organizations and contribute to their longevity and success.

Posted in Technology | Leave a comment

Save the date for the 2018 Middle TN Cyber Security Conference.

Save the date for the Middle TN Cyber Security Conference.
Website and registration details will be posted soon.

2018 Cyber Conference

 

 

 

Posted in Computer Security, higher ed, higher education, internet security;, Technology, Windows Security | Tagged , , , | Leave a comment

Need to check your PC for Meltdown or Spectre?

Need to check your PC for Meltdown or Spectre?  Use  Steve Gibson’s free tool to check if you are vulnerable.

https://www.grc.com/inspectre.htm

Gibson

Posted in Computer Security, Computer Software, Free Software, freeware, help desk, higher ed, higher education, Information Technology, malware, Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1 | Tagged , , , , , , | Leave a comment

Is Your Windows PC Affected by Meltdown and Spectre? Use PowerShell to see if it is

Open PowerShell as an administrator

Copy each of these commands and enter each into PowerShell –

If you are prompted to continue, select Y

Install-Module SpeculationControl
Set-ExecutionPolicy Unrestricted
Import-Module SpeculationControl
Get-SpeculationControlSettings

If you receive a False, you are vulnerable.  Look for Bios and Windows Updates

Example of a System that is vulnerable
Speculation control settings for CVE-2017-5715 [branch target injection]

Hardware support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is enabled: False

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: False

Suggested actions

* Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.
* Install the latest available updates for Windows with support for speculation control mitigations.

 

BTIHardwarePresent : False
BTIWindowsSupportPresent : False
BTIWindowsSupportEnabled : False
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
KVAShadowRequired : False
KVAShadowWindowsSupportPresent : False
KVAShadowWindowsSupportEnabled : False
KVAShadowPcidEnabled : False

Posted in Technology | Leave a comment

Wi-Fi networks will emerge in 2018 as part of Wi-Fi CERTIFIED WPA3™

New Wi-Fi® security features available in 2018

Las Vegas, NV – January 8, 2018 – Wi-Fi Alliance® …Read more

Posted in Computer Security, Technology, Wireless | Tagged , , | Leave a comment

Tweak your wireless router

Many people who set up their wireless routers never optimize the channel to keep from ‘bumping’ into their neighbors.  Regardless if you are a Apple, Linux or Windows user, you should select a channel as far away from your neighbors devices as you can.   Use WiFi Analyzer for Android, (Apple), or InSSIDer for a PC to see what channels are being used around your home or business.

The second tip is involves fragmentation..   We don’t have one or two internet devices anymore, we have four or more.   Computers, laptops, netbooks, e-readers such as Kindles or Nooks, iPods, iPhones, Android tablets, iPads, Android, Windows Phones, Blurays, TVs and more.    So how can this be optimized?   These devices send packets of data in frames.

Imagine you talking.   Each word is a packet and the packets together are a sentence.   In a wireless environment, each device has to wait for the other to complete their sentence before it can talk.

Computer talking to router – ” I am going to WordPress to read a blog!”

Tablet waits on router and says – “I want to go to YouTube!”

Your router listens to the computer while the tablet is waiting.   The router processes the computer’s request and then listens to the tablet.   So how can this be optimized?

The default fragmentation for routers is 2346.  Many professionals recommend to set this at 800 or 1000 if there are many devices on your network.   So your router should work like this –

Computer and Tablet say – “I am going to – I want to go to – WordPress to read – YouTube! – a blog!”

See how each device gets a small piece of what it wants to say in to the router?  The router can process the information a little at a time keeping each devices wait time down.   This in  turn works with the RTS Threshold.

The RTS Threshold is  used as a trigger to engage the back and forth of RTS (Ready to Send – “I have something to say”) and CTS (Clear to Send – “I am listening”) messages between the wireless router  and  your device.  The trigger’s purpose is a type of “handshaking”.   The default value for RTS is 2347.   Try 2340 and lower as necessary. 

Note: Before changing these defaults, remember – you can reset these if you cannot connect.  Read your owner’s manual on how to reset your router in the event you have connectivity problems.  Every situation is different.  

Here’s my settings on Fragmentation and RTS Threshold.

wireless

The preamble should be set to short.   Long is for 802.11b  devices (old legacy laptops or devices).  Auto is just in case you have someone with old computers that are coming into your home.   Auto works for old and new.   Generally older devices today have 802.11g.   802.11g and 802.11n work with long.   So if you don’t anticipate someone visiting with older devices, move the preamble to short.

DTIM is a traffic indicator.  It basically says – “Yo, I got something for you” during the beacon.  Setting this 1 point higher can actually save power when devices are listening.   So the device will awaken only when DTIM tells it to.

These settings are for people who have several devices on their network and are true consumers of the internet.   They are by no means the settings for everyone.   You may have to play with the settings to get optimal throughput.  Remember, test your bandwidth with two devices side by side and simultaneously.   Have each device strain your network by testing their throughput by going to an ISP site that test download speeds or stream a video at the same time.  You’ll see a difference.   The default values very well may be what you need if you don’t have many users and devices.

Give it a try.  You can always go back to your routers default values.

Posted in Technology | Leave a comment

Wireless Dropping? Change your Scan Valid Interval

Is your Wireless dropping?  Update your driver of course and then try changing your Scan Valid Interval.   By default, most wireless cards are set to 60.   This is the amount of time before your wireless ‘looks’ for other access points (for roaming).   Try changing the interval to 120.

Open the device manager, double click on the wireless adapter, under advanced, click on Scan Valid Interval – change this to 120.   If you have a card that has roaming under advanced, select the lowest option.

1 Device Manager

 

2 Scan

Note:  If you have a laptop and are moving around in an area, you may need to lower this number.

Also, you may want to lower the Beacon Interval in your router if your signal is low or if you have drops.  This sends beacons more frequently and can help with your signal.   This may slightly decrease your bandwidth (wireless) and use a little extra battery on mobile devices.

While the default is 100, did you know if you increase this time (assuming you have a great signal in your home or business) that you can increase wireless bandwidth (slightly) and even increase your battery life of devices?

Got Atheros? Follow this link to drivers.

Also, do a quick survey of your entire home.  As you can see, one side of our house has interference on channel 11.   Because the ‘user’ of the other wireless is using Channel 6 + 10 (40 mhz ) spread, Channel 6 and 11 are NOT optimal.  Therefore, channel 1 is the optimal channel (you can see two devices – my AP and printer)

Left – host computer  Right – TightVNC into another computer in my home.

Avoid Wireless Interference

Remember, router position and direction matters.  As you can see below, repositioning the router got rid of “Saw Tooth” (signal that goes up and down).

Less Saw Tooth

Posted in Technology, Wireless | Leave a comment

AlphiMAX PTP Estimator provides an excellent way to align your wireless antennas

It is important to perform a wi-fi survey so that you can determine not only the perfect place to locate your access point or bridge but to gain an understanding of the channel co-existence challenge you may face.  With wireless access points in surrounding neighborhoods and businesses, you will need to  perform a survey by walking around and mapping out the BSAs (Basic Service Area) of wireless that surrounds you and your organization.

Below is an example of our school’s perimeter.  Matt, Chris and James, students in the Computer Information Technology, class performed a survey using a Microsoft GPS and Vistumbler.  This survey revealed access points and their channels of current wireless at our institution and  includes APs in surrounding businesses and neighborhoods.  These were mapped using Google Earth after exporting their KML file from Vistumbler.

This type of survey allows IT professionals to analyze data exported to ensure the correct channels can be used at their organization.

Miller Goodroe Felts

After exporting the wireless information, you can analyze each access point or wireless device by clicking on it.  Below is an example of the information exported into Google Earth.   Each device shows SSID, Network Type, Mac Address, Channel, Security, Encryption Type, Data Rates, Latitude, Longitude and Manufacturer information.   Analyst using this information can also determine the best placement of wireless devices along with channel information.

ESSID Expanded

Channel co-existence is when access points share channels that are very close to one another.

802.11 wireless on 2.4 Ghz has three non-overlapping channels.  These channels are 1, 6 and 11.  The closer channels are, the more likely interference will take place.  With the amount of wi-fi in use today, IT professionals have to chose between 2.4 Ghz and 5 Ghz and and try to select channels that are not in use if possible.   Professional access points and bridges can also adjust power as necessary.   A dense population can make this very challenging.

If you look at the students’ survey by zooming out to see how many access points can be seen, this is what you are looking at!  Now you can see why site surveys are important at your organization.

Exploded

In addition to this survey, a secondary survey using a spectrum analyzer is very important to search for interference from other sources.  (See our review of the Airview Spectrum Analyzer)

analyzer-software

Channel information (Chart from Wikipedia)

NonOverlappingChannels2.4GHzWLAN-en.svg

Here’s another look at a wireless survey showing vertical lines and signal strength.  (James M. KML survey)

Another view James Miller KML

Posted in Technology, Wireless | Leave a comment

AlphiMAX PTP Estimator provides an excellent way to align your wireless antennas

When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry.  Replace any hubs on your network as soon as you can.

With a hub, collisions can be >20% and utilization can stand at >50%.   By replacing a hub alone, you can reduce collisions to 5% on switches in rooms and <1% in the server room.  Switches help to isolate traffic, relieve congestion, separate collision domains (reduce collisions), segment and restart distance/repeater rules.

Daisy Chaining Switches -what not to do

Real world scenarios may require you to temporarily daisy chain switches.  If you do, test the network and run additional backbones or replace core switches to accommodate more nodes as soon as you can. (remember, replace any hubs in your network)

Daisy chaining

One of many solutions is to run independent lines to the core switch

alternative

Basic tips on optimization of your network –

  • Use stackable managed switches
  • Purchase switches that support
    IEEE 802.1D , IEEE 802.1p , IEEE 802.1Q , IEEE 802.1s , IEEE 802.1w , IEEE 802.1x , IEEE 802.3 , IEEE 802.3ab , IEEE 802.3ad (LACP) ,
    IEEE 802.3ae , IEEE 802.3u , IEEE 802.3x , IEEE 802.3z
  • Use a battery backup on the switches

This is the very basics behind network switch infrastructure.  Managing switches and using the IEEE standards above along with optimizing your network and managing the network infrastructure is important.

Excellent articles on Networking Infrastructure

http://www.lantronix.com/resources/net-tutor-switching.html

http://www.techrepublic.com/blog/it-consultant/only-novices-daisy-chain-switches/

Posted in Technology | Leave a comment

Extended attributes are inconsistent error on Windows

1. Right click the volume icon in the task bar and select sounds
2. Scroll down on the Program Events:
Look for and select the option that says Windows User Account Control
3. Change the Sounds, select option to (None) and then click on okay
Thanks Josh!
Posted in Computer hardware, computer troubleshooting, Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 8, Windows 8.1, Windows Server | Tagged , | Leave a comment

Optimize MySql with MySQL Workbench

Everyone needs to keep the integrity of their database and tables optimized.

How?

  • Start MySQL Workbench and connect the software to your MySQL server.
  • Right click on your database and select Schema InspectorInspector
  • Select all of the tables.
  • Check each box and run each check individually Full Maintenance
  • Visit the following link to learn more about optimization –
    https://dev.mysql.com/doc/refman/5.7/en/optimization.html
Posted in Business, Computer Software, Computers, Education, Free Software, freeware, higher ed, higher education, Information Technology, Linux, Microsoft, Microsoft Windows, mysql, Technology, Windows Server | Tagged , | Leave a comment

Need to optimize your network? Look at adjusting LocalPriority, HostPriority, DNSPriority or NetBTPriority. 

Need to optimize your network? Look at adjusting LocalPriority, HostPriority, DNSPriority or NetBTPriority.  (Host/DNS resolution)

The tweak works by increasing the priority of four processes.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider\
LocalPriority = 4 (DWORD, the default is 499, change to 4)
HostPriority = 5 (DWORD, the default is 500, change to 5)
DnsPriority = 6 (DWORD, the default is 2000, change to 6)
NetbtPriority = 7 (DWORD, the default is 2001, change to 7)

You can use this script at a command prompt (as Admin) or in PowerShell (as Admin)-

reg add HKLM\System\CurrentControlSet\Services\TcpIp\ServiceProvider /v “LocalPriority” /t REG_DWORD /D 4 /F

reg add HKLM\System\CurrentControlSet\Services\TcpIp\ServiceProvider /v “HostsPriority” /t REG_DWORD /D 5 /F

reg add HKLM\System\CurrentControlSet\Services\TcpIp\ServiceProvider /v “DnsPriority” /t REG_DWORD /D 6 /F

reg add HKLM\System\CurrentControlSet\Services\TcpIp\ServiceProvider /v “NetBtPriority” /t REG_DWORD /D 7 /F

taskkill /f /im explorer.exe

start explorer.exe

PowerShell Priorities

Posted in computer troubleshooting, Microsoft, Microsoft Office, Microsoft Windows, Microsoft Windows 10, network, Networking, Technology, Windows, Windows 10, Windows 10 Quick Tips | Tagged , , | Leave a comment

Need to optimize your network – Silly Window Syndrome could be happening

Need to speed your internet up or tweak your network out?  Here’s some things to take into consideration.  Something called Silly Window Syndrome can occur if a server or workstation that has a shared files has high latency.

You see, when there is no synchronization between the workstation and a server (or ws to ws) regarding the capacity of the flow of data being sent or the packet size, Silly Window Syndrome can occur.

Here’s where Nagle’s algorithm is used if the Silly Window Syndrome occurs from the sender.  You can make sure it is enabled by running the script below from a command line (as administrator). Nagle  will send the first segment even if it is tiny.  Then it’ll wait for the acknowledgement (known as an ACK) is received or a MSS is accumulated. (MSS – maximum sized segment)

You see, Nagle’s algorithm works by improving TCP efficiency.  This algorithm reduces the number of small packets  being sent over a network.

So what if the delays are caused by the receiver?  David D Clark’s solution can be and is used.  Clark’s solution closes the window until another segment of MSS can be received or if the buffer becomes half empty.

Now there something else – Delayed ACK tries to send more data over a segment if it can.   Here’s the problem.  the interaction of Delayed ACK with Nagle’s algorithm can create 200+ ms delays.

How do I?

Run this from a command line as an administrator to turn off Nagle’s algorithm  

REG ADD HKey_Local_Machine\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\ /v TcpAckFrequency /t REG_DWORD /d 0 /f

REG ADD HKey_Local_Machine\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\ /v TCPNoDelay /t REG_DWORD /d 0 /f

taskkill /f /im explorer.exe

start explorer.exe

pause

______________________________________________________

Run this from a command line as an administrator to turn on Nagle’s algorithm  

REG ADD HKey_Local_Machine\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\ /v TcpAckFrequency /t REG_DWORD /d 1 /f

REG ADD HKey_Local_Machine\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\ /v TCPNoDelay /t REG_DWORD /d 1 /f

taskkill /f /im explorer.exe

start explorer.exe

__________________________________________________________________________________________

There’s several other things you can do for latency –

  1. Check things like LLMNR.  You can get delays with SQL and you may need to disable it on work stations and the server.
  2.  Look at Nagle’s Algorithm and Delayed ACK.
    1. You can turn Nagle’s algorithm on or off as needed.   It’s not always the best choice in highly interactive networks but can help to speed up downloads and remote connectivity.   We’ve had several students in a jam that needed a file moved and high latency stopped them or the download failed.  So what did they do?  Adjusted Nagle’s Algorithm.
  3. Disable everything in the network card settings with the exception of flow control
  4. Manually adjust the connection speed – we’ve seen even with the correct network card drivers slow throughput on networks.  After adjusting to 1Gbps manually instead of auto, the computer speed up.
  5. Is everything a gigabit?  Switches, servers, workstation and other.  If so, enable jumbo frames.

Remember always optimize your network before you throw hardware at the problem.

Also, don’t worry, Karn’s algorithm will be working when computers are talking.  It basically measures time from point A and B and if there is a delay, it’ll say ‘hello’ again to try and get a response.

If you have an application you need to access that uses TCP across the network, you may be able to speed it up by enabling TcpAckFrequency and/or TcpNoDelay in the registry.  –

Open regedit and then find-

Registry Key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces

Make sure you find the correct interface for your active network connection.One way is to look at the IP Addresses listed until you find the correct interface.

On the right window, create a DWORD32 for-
TcpAckFrequency=1
TCPNoDelay=1

Reboot

Always make sure you measure your network speed before you make changes to set a baseline.  Measure the speed after you make changes.   How do you measure it?  Put the following software on the workstation and server.  Totusoft’s Lanspeed

http://www.totusoft.com/lanspeed

 

 

Posted in Technology | Leave a comment

View your GPU performance in the Task Manager

With Windows, you can now view the GPU and how it performs on your computer.  With computers that have integrated cards (video), you may not see graphs in the performance monitor or on the Process Tab even after following these steps.

Here’s how to see your GPU if it doesn’t appear.

  • Open the Task Manager
  • Right Click Name and select GPU and GPU Engine

The GPU will appear as a column on the processes tab and as a graph under the performance tab.

A Right Click on Name select GPU GP-Modul

If your computer  doesn’t support driver model WDDM 2.0, your driver is not compatible.  How can you find out?  Run dxdiag.exe at the run line and look for the Driver Model.

 

Posted in Computer hardware, Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows 10, Windows 10 Quick Tips | Tagged , , , , | Leave a comment

Distracted by the web? Snooze your Wi-Fi

Is the internet and all of the alerts you are getting from social media and email distracting you?  Hit the snooze on your Wi-Fi –

How?

  • Click your wi-fi/internet icon  Signal by the sound and time
  • Next Click the Wi-Fi button
    A Wifi
  • Next select how long you want to turn your wi-fi off
  • WiFi
Posted in Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips, Wireless | Tagged , , , | Leave a comment

Windows 10 Version 1709 – Settings Pictorial

Most people don’t know the number of settings you have over Windows 10.  With Version 1709, you have complete control and a ton of settings that makes Windows 10 a premiere operating system.  The settings area alone when used with the control panel makes Windows 10 one of the most customizable operating systems available.

System

  • Control Display including multiple displays and adapter settings
  • Notification and Actions including the notification center
  • Power and sleep
  • Battery
  • Storage – including seeing what is being used
  • Tablet mode for touch screens
  • Multitasking – snapping and Virtual desktops
  • Projecting to this PC – includes phone support
  • Shared experiences – App sharing to other devices
  • Remote Desktop -(above home edition) – allows remote sessions

This slideshow requires JavaScript.

Devices

  • Bluetooth info and connected/available devices
  • Printer and Scanner information including printer server
  • Mouse
  • Touchpad – sensitivity and control
  • Typing – control spacing, autocorrect, spelling and more
  • Pen and Windows Ink for touchscreens
  • Autoplay control
  • USB

This slideshow requires JavaScript.

Phone

  • Add phone information to play and work across devices

1

Network and Internet

  • Status of connection including changes and troubleshooting – Firewall, network and sharing center and more
  • Wi-Fi – connection, hardware, availability, hotspot and more info
  • Ethernet – connection, hardware and more
  • Dial-up
  • VPN – control VPN connectivity to other Windows computers (settings, etc.)
  • Airplane mode
  • Mobile hotspot
  • Data Usage
  • Proxy setup

This slideshow requires JavaScript.

Personalization

  • Color schemes
  • Background
  • Lock screen information
  • Themes
  • Start
  • Taskbar controls

This slideshow requires JavaScript.

Apps

  • Installation/Uninstall info
  • Default app handling
  • Offline maps for GPS and other programs
  • Apps for Websites
  • Video playback settings

This slideshow requires JavaScript.

Accounts

  • Local, Windows login or domain
  • Email settings
  • Sign-in Options (Biometric, password, picture, etc.)
  • Access work or school including provisioning of apps, etc.
  • Family settings
  • Sync with other devices

This slideshow requires JavaScript.

Time and Language

  • Date/Time
  • Region Language
  • Speech information (controlling windows)

This slideshow requires JavaScript.

Gaming

  • Game bar and keyboard shortcuts
  • Gaming DVR
  • Broadcasting (audio, etc.)
  • Game mode support
  • TruePlay
  • Xbox Networking

This slideshow requires JavaScript.

Ease of Access

  • Settings for Narrator
  • Magnifier
  • High contrast/Color
  • Closed captions handling
  • Keyboard
  • Mouse
  • Other such as animations, visual notifications, etc.

This slideshow requires JavaScript.

Privacy

Extensive set of privacy settings allowing total control of your privacy while using Windows

This slideshow requires JavaScript.

Update and Security

  • Controls updates and restarts
  • Windows Defender Control center for protection
  • Backups
  • Troubleshooting
  • Recover if you have issues
  • Activation of Windows
  • Find my Device
  • Developer information including the Windows Insider program

This slideshow requires JavaScript.

Search

This slideshow requires JavaScript.

Any information such as IP address, email and other settings are experimental and use in internal labs.  No information found herein refers to actual account of other information.

Posted in Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, windows 10 privacy, Windows 10 Quick Tips | Tagged , | Leave a comment