How to Clean Up and Compress the WinSxS Folder on Windows
In this article we will talk about the WinSxS folder in Windows, the reasons for its constant growth, and ways to clean up it. The C:\Windows\WinSxS directory is the repository…
In this article we will talk about the WinSxS folder in Windows, the reasons for its constant growth, and ways to clean up it. The C:\Windows\WinSxS directory is the repository…
If you are using mapped network drives, you probably noticed that they are not showing in the apps running with administrator privileges (including cmd and PowerShell). The default User Account…
File Explorer process always runs with minimal (non-elevated) privileges in Windows. Even if you click the C:\Windows\explorer.exe executable file and try to start it in the ‘Run as administrator’ mode,…
Windows automatically creates a hidden System Volume Information directory in the root of each connected NTFS drive (whether a local HDD/SSD drive or a removable USB drive). The size of…
The broadcast protocols NetBIOS over TCP/IP and LLMNR are used in most modern networks only for compatibility with legacy Windows versions. Both protocols are susceptible to spoofing and MITM attacks.…
Information security best practices require the computer screen to be locked when the user is inactive (idle) for some time. A Windows user can lock the computer screen themselves (using…
When you install an IIS (Internet Information Services) web server on Windows, an empty “Default Web Site” is created, listening on the default HTTP port 80. In this article, we…
The password policy in an Active Directory domain specifies basic security requirements for user account passwords, such as password complexity, length, frequency of password changes, and so on. A strong…
In this article, we’ll look at several common issues related to RDS licensing, when RDP clients cannot connect to Windows Server with the Remote Desktop Services Host role installed. Licensing…
A user must enter a password for a local or Microsoft (online) account each time they log on to Windows. This allows you to restrict access to your computer. In…