Rossy Guide

Rossy Guide

back to homepage

Rossy Guide Free Articles

How to Restore Windows 7 Backups on Windows 8.1 or 10

Windows 8 comes with a feature that supports for restoring Windows 7 backups, but Microsoft removed this feature in Windows 8.1. But there is still a way is there to restore your files from Windows 7 backups on to Windows 8.1 or 10, but there are few things you need to do. Also Windows 8.1 supports restoring system image backups feature, but this too doesn’t help if you have used Windows backup on Windows 7.

Read More

Azure Multi-Factor Authentication

What is Azure Multi-Factor Authentication? Multi-factor authentication is a method of authentication that requires the use of more than one verification method and adds a critical second layer of security to user sign-ins and transactions. It works by requiring any two or more of the following verification methods:

Read More

How to Download and Upload Files Using FTP Command Line

The File Transfer Protocol (FTP) is the most popular protocol to transfer files (download and upload) from one system to other system. It provides the fastest way transfer files. There are many application available on Linux and windows to FTP services like vsftpd, proftpd for Linux, FileZilla Server for windows.

Read More

FTP Limiting Access on Folder

You are using a shared webserver on which you can manage FTP accounts. Then, how to set access restrictions a folder as follows:

Read More

Enable the Spartan Browser’s Speedy New Edge Engine in Windows 10

Windows 10 will feature a new browser with a minimalist interface and a new rendering engine, but there is one thing it very prominently lacks: the name Internet Explorer.

Read More

How to Download File from SFTP Server to Local Machine

File Transfer Protocol (FTP) is a popular method of transferring files between two remote systems. SFTP, which stands for Secure File Transfer Protocol, or SSH File Transfer Protocol, is a separate protocol packaged with SSH that works in a similar way over a secure connection.

Read More

Cryptocurrency Miners Explained: Why You Don’t Want This on Your PC

uTorrent recently made headlines for bundling cryptocurrency-mining junkware. Out of all the junkware programs bundled with installers, cryptocurrency-miners like Epic Scale are some of the worst.

Read More

How to Highlight and Drag-and-Drop Without Holding the Mouse Button Down in Windows

In most operating systems, you can 'drag and drop' files from one folder to another. This article will tell you how to highlight and Drag-and-Drop without holding the mouse button down in Windows.

Read More

How to Reload Windows 8.1 on Your Surface Pro Tablet

To reload Windows 8.1 on the Surface tablet, so we replaced Windows 8 entirely we’ll need to download the recovery USB.

Read More

A Hybrid Storage Array Comparison

Hybrid storage arrays aim to mitigate the ever increasing price-performance gap between HDDs and DRAM by adding a non-volatile flash level to the memory hierarchy. Here is to explain how to choose a storage system and provide a quick hybrid storage array comparison.

Read More

Windows Autoloading Programs

Most Windows PCs autoload a ridiculous number of programs every time you boot. Which autoloaders should you not disable? The easy answer is those that really do need to run all of the time to do their jobs. I can’t tell you exactly what they are, because I don’t know your work habits or your hardware. But I can give you a pretty good idea.

Read More

Why You Might Still Want an Optical Drive

An optical disc drive (ODD) is a disk drive that uses a laser light to read data from or write data to an optical disc. These include CDs, DVDs, and Blu-ray discs. It allows you to use CDs, DVDs, and Blu-ray discs to listen to music or watch a movie. Most drives also allow you to write data to a disc, so you can create your own music CDs or create of back-up copy of important data.

Read More

Virus Removal Softwares

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be “infected”.

Read More

Three Security-Boosting Steps to Perform on Every Router

A router is a device that forwards data packets along networks. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

Read More

Share a Network Folder From OS X to Windows

Sharing folders from Mac OS X with Windows computers and devices is a lot easier than it used to be. The OS X’s built-in support for the Microsoft Server Message Block (SMB) Protocol, allowing read/write access to Windows computers can be done with just a few tweaks in System Preferences.

Read More