How to Disable Shadows Desktop Icons on Windows 10

Enabling and disabling shadow for desktop icons is very easy. Microsoft has added a huge shadow effect for desktop icons which may look good for some people and some people don’t like the shadow effect. With default settings, shadows appear under text on the desktop icons makes the operating system cool and make the text easier to use. In this Post we teach how to disable or drop shadow icons on desktop.

[Read more…]

How to Disable Windows Defender in Windows 10

Windows Defender is Microsoft’s free anti-spyware product, built into Windows 10. Windows Defender scans everything that enters your computer, whether through downloads, networks, messaging programs, flash drives, discs and incoming email for evil file attachments.

Windows Defender notices something evil trying to enter your computer; it lets you know with a message. Windows Defender automatically updates itself to recognize new viruses, and it constantly scans your PC for threats in the background.  The program is enabled by default; you can turnoff window defender whenever you want to better protect your Windows 10 PC using third-party antivirus software.

[Read more…]

Install Exchange Server 2013 on windows server 2012 R2

Installing Exchange Server 2013 is not a difficult operation if you do the necessary work to prepare for the task. When you install Exchange Server 2013, you install your exchange server within the organizational context of the domain in which the server is a member. Exchange 2013 organizations natively have only two server types: Client Access servers and Mailbox servers. In this new architecture, Client Access servers act as the front end for Exchange services, and Mailbox servers act as the back end.

When you install exchange 2013 or use Exchange Online, Exchange ActiveSync and Outlook Web App for Devices are automatically configured for use, which makes these features easy to manage.

Exchange 2013 does not have separate server roles for Hub Transport servers or Unified Messaging servers; instead, the related components are now part of the Mailbox server role.

[Read more…]

Configure Form based Authentication in exchange server 2010

Exchange 2010 OWA uses forms-based authentication by default. Outlook web access enables users to access their exchange 2010 mailbox using a web browser, such as Microsoft Internet explorer. Forms-based authentication creates a logon page for OWA. Forms-based authentication service uses cookies to store user logon credentials and password information in an encrypted state.

[Read more…]

How to Enable Classic Start Menu Windows 8.1

Windows start menu was clearly the most controversial. The classic start menu has been completely ripped out of Windows 8.1. Microsoft wanted to make sure the Start screen was the only native option users had, and it accomplished that goal. Thousands of PC fans would argue that the Start menu offers a more compact, concise, customize listing of programs and files.

In Windows 7, if you tapped the Windows key repeatedly, the start menu 8.1 would simply open and close repeatedly. But in Windows 8.1, tapping this key repeatedly will toggle between the current Metro-style app and the Start screen.

[Read more…]

How to save battery life in windows 10

Windows 10 brings back many of the familiar features to help users on earlier versions to get more productive quickly without a huge learning curve. Battery life is critical on laptops, and tablets. Windows makes it easy to keep an eye on your battery, Although many computer reviews and manufacturers now claim that some devices manage 8 hours of life on light use, which means not really using the machine the way you want to in an average day. Several tools you can use in the mobility center to optimize and save battery life.

[Read more…]

Install Certificate Authority on Windows Server 2012 R2  

Active Directory Certificate Services provides a customizable set of services that allows you to issue and manage public key infrastructure (PKI) certificates. Certificates are electronic representations of users, computers, network devices, or services, issued by a certification authority that is associated with a public and private key pair.

[Read more…]