• How to Change the Icon for an Exe File

    How to Change the Icon for an Exe File
    this wikihow teaches you how to change an exe file's icon on a windows computer. while you can't normally change the icon of an exe file itself, you can create a shortcut for the
  • How to Use eXe

    How to Use eXe
    the exe project is developing a freely available open source authoring application to assist teachers and academics in the publishing of web content without the need to become
  • How to Make an Exe File

    How to Make an Exe File
    this wikihow will teach you you how to create a basic exe file on a windows computer, as well as how to create a container for that file that will install it on another computer.
  • How to Open EXE Files

    How to Open EXE Files
    computer files with an '.exe' extension are called executables, or exe files. this type of file is one of the most ubiquitous in the windows operating system, where it is used to
  • How to Install Windows Services

    How to Install Windows Services
    service applications on windows can run in the background and not interfere with the user interface, making them ideal for anyone who wants programs that work in the background.
  • How to Change Text on Windows XP Start Button

    How to Change Text on Windows XP Start Button
    bored of your start menu in windows xp? wish you could have it say and do something a little more interesting? follow these easy steps and you'll have a personalized start button
  • Managing Windows Networks with Scripts - Part 10: Tricks of remote control scripts

    Managing Windows Networks with Scripts - Part 10: Tricks of remote control scripts
    in the previous articles, we have been introduced to some concepts and issues around remote windows scripting. in this section, i will continue the discussion by showing you two
  • Warning of virus outbreak nontay.exe

    Warning of virus outbreak nontay.exe
    recently, many users' computers and virus-infected vietnamese businesses called nontay.exe have lost control of administrator rights in the computer system.
  • Configure file-level antivirus software in Exchange Server 2007

    Configure file-level antivirus software in Exchange Server 2007
    by definition, antivirus software checks files when the operating system performs operations on them, such activities as opening, creating, and closing a file. to create a secure
  • Binder and Malware (Part 2)

    Binder and Malware (Part 2)
    in part 1, we learned how to configure the optix pro server to be a piece of malware. this is the trojan server that we will join the official pong.exe game program using a binder
  • 'Treat' Yahoo Messenger virus

    'Treat' Yahoo Messenger virus
    in the meantime, many viruses via yahoo messenger messages have caused many people to be upset and frustrated. this article explores viruses through y's messages! and a few tips
  • PC worm 'touches the neck' President Bush

    PC worm 'touches the neck' President Bush
    us president bush and russian president putin have just become victims of an online scam by hackers to spread a new kind of computer worm.
  • 'Fight' with Vinatad

    'Fight' with Vinatad
    from yesterday (november 16) until now, despite being wary of the 'pandemic' virus spread through yahoo messenger, many people have been stuck with a temporary virus called
  • The locations of viruses and trojans hiding during the boot process.

    The locations of viruses and trojans hiding during the boot process.
    there are viruses and trojans that infiltrate your computer in a 'silently' way that you almost don't realize its change or harm. but then it will 'destroy' your system by
  • 2 viruses that destroy data

    2 viruses that destroy data
    the following 2 computer worms belong to cyclical, dispersal operations on a fixed day every month. they are extremely dangerous because when the data is destroyed by these two
  • AIM worm is more dangerous than anticipated

    AIM worm is more dangerous than anticipated
    facetime security firm warns that the w32 / sdbot-add type of worm is spreading rapidly among aol's im users and is far more dangerous than previous comments.
  • Continue warning of viruses: W32 / Bereb-B, Troj / Eyeveg-C, W32 / Netsky-M

    Continue warning of viruses: W32 / Bereb-B, Troj / Eyeveg-C, W32 / Netsky-M
    w32 / bereb-b is a deep computer cum function of trojan. w32 / bereb-b can listen to commands on special irc channels. w32 / netsky-m is a deep bomb, capable of self-replicating
  • Fix SVCHOST.EXE application with error 0x745f2780

    Fix SVCHOST.EXE application with error 0x745f2780
    suppose we have windows xp professional operating system with the password set for the administrator account. when we turn on the computer and enter the login screen. then the
  • Svchost Viewer: look exactly at svchost.exe processes

    Svchost Viewer: look exactly at svchost.exe processes
    svchost viewer is a small application that lists all running svchost.exe processes, how much memory each process is using ..
  • Learn about the jusched.exe process

    Learn about the jusched.exe process
    this process is actually a java update timetable, which actually consumes a lot of memory just to check once a month for java updates.