• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation

Archives for October 2008

ThreatExpert

2008-10-27 by Jason

The ThreatExpert site has a few components that might be of some interest to those curious about malicious computer threats. Their blog is very good at explaining new forms of threats like click-jacking, flash exploits, and cracking attempts. Along with all the articles on their blog, they also host a "dictionary" of malicious threats so that you can look up everything from … [Read more...]

User Profile Hive Cleanup Service – Fixing log off problems

2008-10-24 by Jason

If you're frequently seeing a lot of warnings in your Application event log with this error message: "Windows saved user [user name] registry while an application or service was still using the registry during log off. The memory used by the user's registry has not been freed. The registry will be unloaded when it is no longer in use. This is often caused by services running as … [Read more...]

Unlocker – Trace ‘in use’ files to the process

2008-10-23 by Jason

If upon trying to delete, move, or open a file you get an error message about it being in use, you can try to close programs and kill processes that you think are using the file. "Cannot delete file: It is being used by another person or program. Close any programs that might be using the file and try again." You can use Process Explorer to track down the process, but an even … [Read more...]

Managing your Digital Identity

2008-10-22 by Jason

Few people will think about their digital identity when they consider their public exposure. The purpose of this post is not to make you paranoid, but to make you aware of the information that is out there. As we saw recently with Alaskan Governor Sarah Palin's Yahoo e-mail account getting broken into, one must fully understand and manage their digital identity for security … [Read more...]

Advanced Batch Scripting

2008-10-21 by Jason

I'd like to share four utilities that can improve your batch (DOS) scripting by making them more user-friendly, more versatile, and more dynamic. With these tools, you'll gain a variety of abilities that allows you to do more with batch scripting and make your utilities more polished/enjoyable to the end users. The four utilities are: Sleep, BATtoEXE, CHP (Create Hidden … [Read more...]

« Previous Page
Next Page »

Trending

  • AllRecipes.com announces potential breach
    In Security and Privacy
  • Google Takes Strides Against Insecure Javascript
    In Security and Privacy, Software
  • What I’m looking for in a Knowledge Base
    In Software, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in