The Blog

Free Tips & Tricks
Cinch I.T. > The Blog (Page 19)

Step by Step - Exchange 2013 Email Message Size Restriction Detail Exchange Server 2013 email size restriction Email size in Exchange server plays an important role for the organization since it acts important factor for bandwidth, storage limit, email queue, CPU utilization and mailbox size. The below article provide deeper stuff on how email size restriction plays in the Exchange server 2013. The email message size value you...

Read More

Ransomware is a particularly nasty piece of malware that takes infected machines hostage. CryptoLocker was successful at garnering multi-millions in ransom payments the first two months of CryptoLocker’s distribution, according to a recent blog by FireEye regarding the takeover of CryptoLocker infrastructure – Operation Tovar. Operation Tovar helped tear down the infrastructure used by attackers, but there are still many instances where users are still being...

Read More

Click Start, click Run, type regedit, and then click OK. In Windows Vista/7, simply type regedit in Start Search and hit Enter. Navigate to the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Double-click the DefaultUserName entry, type the user name to log on with, and then click OK. If DefaultUserName registry value name is not found, create a new String Value (REG_SZ)with value name as DefaultUserName. Double-click the DefaultPassword entry, type the password for the user account under the value data box, and...

Read More

EXPAND It's been a little sad to watch Facebook devolve from being a squeaky clean site full of people you love to a spam-ridden wasteland. And with a fifth of the world's population using the site, you can be sure the spam is going to keep coming. So you need all the help you can get separating the good links from the bad. Bitdefender, an antivirus firm,...

Read More