About HemantS@TWC

The author Hemant Saxena is a post-graduate in bio-technology and has an immense interest in following Windows, Office and other technology developments. Quiet by nature, he is an avid Lacrosse player. Creating a System Restore Point first before installing a new software, and being careful about any third-party offers while installing freeware is recommended.

Disable or Enable DHCP for Ethernet or Wi-Fi in Windows 10/8/7

Internet Protocol (IP) networks utilize Dynamic Host Configuration Protocol or DHCP as a standardized network protocol since it is a safe and reliable configuration. It enables users to dynamically and transparently assign reusable IP addresses. If you have a DHCP […]

How to test your Firewall software

The Windows 10 operating system offers a powerful built-in Windows Firewall that prevents hackers or malicious software from gaining access to your computer through a network or the Internet. Although the built-in firewall is good for most users, some users prefer […]

How to recover corrupted files from USB Drive

There are numerous occasions where users may find the data on their USB flash drive has become corrupted and that they are unable to access or recover it. In this post, we will see how you can attempt to recover […]

Firefox Containers aims to protect online identity

Firefox Containers is an experimental feature that lets you launch a website in containers so as to help you separate them from one another in various ways (assigning custom labels to each container or use color-coded tabs). If enabled, it […]

Backup VMware Virtual Machines with Azure Backup Server

Microsoft Azure Backup Server a.k.a. MABS is a cloud-first backup solution of Azure Backup designed to offer data protection across wide-ranging and diverse IT environments of enterprises to help maximize their backup efficiency. However, the principles used in a traditional […]

Enable Firefox Screenshots feature

How to enable the Screenshots feature in Firefox

Screenshots are one of the most overlook pieces of marketing. Knowingly or unknowingly, it immensely helps in influencing the decision of a person. For example, when you are downloading an app, you first check out its screenshots as it represents […]

Stop Tile Data Service

How to Turn Off Tile Data Model Server Service in Windows 10

The Tile Data Model Server service mainly runs as LocalSystem in a shared process of svchost.exe. If there’s any problem encountered during the process or Tile Data model server just refuses to start and the details are recorded in the […]

Blue Whale Challenge Dare Game

What you need to know about Blue Whale Challenge Dare Game

The virtual world and its exposure to young minds under little or no supervision are throwing new mental health and cyber-crime challenges for families and law enforcement agencies. The new Blue Whale Challenge Dare Game floating on the Internet is […]

Microsoft Workplace Analytics Productivity Tool

Productivity is a balanced combination of intelligent planning and focused efforts or in simple words, getting more things done in less time. Every workplace, howsoever large or small is largely driven by efficiency which manifests itself into productivity at a […]

Scr.im will convert your email address into a custom link

Online discussions arranged by forums, message boards, and more prompt users to engage in a discussion in meaningful ways, however, this engaging activity leaves your email as plain text in forums or on classified sites, making you susceptible to spam […]

Where to report Scams, Phishing and Spam?

Emails & SMSs asking us to pay a small handling fee to collect some fabulous prize have become the order of the day. Our email inbox is replete with such fraud emails. While most of us aware of these tricks, […]

How to find out or check where link or URL redirects to

.A website can lose not only visitors but search engine rankings as well if the search engine is not able to follow URLs to that site. It is therefore essential to get the redirects correctly in place. These tools can […]

norse cyber attacks tracker map

Malware Tracker Maps that let you view Cyber Attacks in real-time

Malware campaigns dominated the threat landscape last year. The trend seems to continue this year, although in a more virulent form. A common observation from multiple leading security researchers revealed that most malware authors relied on ransomware to make the […]

eBook

List of Free eBooks from Microsoft Press

Microsoft offers access to its various online resources to help users advance their skills with Microsoft products. Microsoft Virtual Academy is one such initiative. It lets you load your digital library with free eBooks from Microsoft Press Store. Most friendly […]

Using Windows Analytics Upgrade Readiness for upgrading devices

To efficiently manage any a successful deployment of Windows OS from end to end during an upgrade process in any organization, it is essential to provide required inputs to receiving equipment for monitoring. This helps in determining the company’s readiness […]