IT

Anything related to information technologies and information systems


Change icon greyed out

The issue with the change icon greyed out, related to icons not displaying correctly, can be solved by simply clearing and regenerating the shell icon cache.

.


How to report and tax Google AdSense income

Reporting AdSense Google income on a tax return in easy and can be accomplished in a few quick and simple steps. This page provides information on how to approach determining tax on your AdSense Google income and how to report it on the federal tax return.

.


How to find out when a web page was created or updated

Have you ever wondered how to find out when a web page was created? There are many occasions when it is very useful to find out when a web page was created or last time updated. This can be handy for example when researching online history of something, perhaps a car or a house you want to buy. The script provided on this web page tells you about a web page history, it tells you when the web page was created.

.


The file or folder does not exist in Vista

The file or folder does not exist is a message that many users experience primarily with Windows Vista. One day a user starts up his or her computer, launches Windows Explorer, tries to rename a file or folder, and suddenly he or she is surprised by the following message: The file or folder does not exist

.


Disable fast user switching in Windows 7

Fast user switching is a functionality on modern multi-user operating systems which allows multiple user accounts to log on to a computer simultaneously and then quickly switch between them without quitting applications and logging out. Fast user switching is available on Windows XP, Windows Vista, and Windows 7 as well. This guide explains how to disable fast user switching in Windows 7.

.


Windows 7 welcome screen

The Windows 7 welcome screen follows pretty much the pattern introduced in Windows Vista. Many users still prefer the classic welcome screen from Windows XP. This guide explains how to change the Windows 7 default settings to customize the Windows 7 welcome screen to look more like the classic welcome screen.

.


Windows 7 Explorer default folder

The Windows 7 Explorer default folder setting is a way to bring Windows 7 one step back closer to the way Explorer used to work in Windows Vista and XP. This guide explains how to change the default folder setting for Windows 7 Explorer. When you open Explorer in Windows 7, the default folder view is set to user’s Desktop -> Libraries. If you do not like to use Windows 7 libraries and keep your files in "other" location on the local drive, you need to manually browse to that location every time you open Windows 7 Explorer. This can be quite annoying after a while; therefore, it may be a good idea to change the Windows 7 Explorer default folder setting to the folder of your preference.

.


Recovery policy configured for this system contains invalid recovery certificate

The Recovery policy configured for this system contains invalid recovery certificate message is known to appear when trying to encrypt a file or a folder using the Windows Encrypting File System. The File Recovery certificate being outdated or expired is the most frequent cause of this invalid recovery certificate message.

.


Typical IT Security Audit Findings

IT security is a longstanding concern for enterprises, especially those in highly regulated industries such as financial service providers governed by regulations from the Basel II Accords, the U.S. Gramm-Leach-Bliley (GLB) Act, the U.S. Securities and Exchange Commission (SEC), the U.S. Office of the Comptroller of the Currency, and some others. IT security has become concern of top managers especially with the introduction by the Sarbanes-Oxley separation-of-duties requirements and the U.S. Health Insurance Portability and Accountability Act (HIPAA).

.


Top 10 Risk and Security Audit Findings

IT security has become increasingly important and is today the inevitable part of our daily lives. Because of the importance and emphasis that is being placed on IT security today, we have decided to write a guide for IT security auditors. Throughout our professional conduct, we have identified 10 common risk and security audit findings that enterprises should avoid, and we bring our knowledge to you in this series of articles.

.
.