How To See Who Logged Into a Computer and When


Have you ever wanted to monitor who’s logging into your computer and when? On Professional editions of Windows, you can enable logon auditing to have Windows track which user accounts log in and when.

The Audit logon events setting tracks both local logins and network logins. Each logon event specifies the user account that logged on and the time the login took place. You can also see when users logged off.

Enable Logon Auditing

First, open the local group policy editor – press the Windows key, type gpedit.msc in the Start menu, and press Enter. (You can also enable logon event auditing on a domain controller if you administer a network with centralized logins.)

Navigate to the following folder: Local Computer Policy –> Computer Configuration –> Windows Settings –> Security Settings –> Local Policies –> Audit Policy.

Double-click the Audit logon events policy setting in the right pane to adjust its options. In the properties window, enable the Success checkbox to log successful logons. You can also enable the Failure checkbox to log failed logins.

Viewing Logon Events

After enabling this setting, Windows will log logon events – including a username and time – to the system security log.

To view these events, open the Event Viewer – press the Windows key, type Event Viewer, and press Enter to open it.

Navigate to the Windows Logs –> Security category in the event viewer.

Look for events with event ID 4624 – these represent successful login events.

To see more information – such as the user account that logged into the computer – you can double-click the event and scroll down in the text box. (You can also scroll down in the text box underneath the list of events.)

If your security log is cluttered, you can click the Filter Current Log option in the sidebar and filter by event ID 4624. The Event Viewer will display only logon events.

Because this is just another event in the Windows event log with a specific event ID, you can also use the Task Scheduler to take action when a logon occurs. You can even have Windows email you when someone logs on.

Leave a comment

Posted by on December 27, 2013 in Uncategorized


Tags: , ,

How To Create a Shortcut That Lets a Standard User Run An Application as Administrator


Want to allow a standard user account to run an application as administrator without a UAC or password prompt? You can easily create a shortcut that uses the runas command with the /savecred switch, which saves the password.

Note that using /savecred could be considered a security hole – a standard user will be able to use the runas /savecred command to run any command as administrator without entering a password. However, it’s still useful for situations where this doesn’t matter much – perhaps you want to allow a child’s standard user account to run a game as Administrator without asking you.

We’ve also covered allowing a user to run an application as Administrator with no UAC prompts by creating a scheduled task.

Enabling the Administrator Account

First you’ll need to enable the built-in Administrator account, which is disabled by default.

To do so, search for Command Prompt in the Start menu, right-click the Command Prompt shortcut, and select Run as administrator.

Run the following command in the elevated Command Prompt window that appears:

net user administrator /active:yes

The Administrator user account is now enabled, although it has no password.

To set a password, open the Control Panel, select User Accounts and Family Safety, and select User Accounts. Click the Manage another account link in the User Accounts window.

Select the Administrator account, click Create a password, and create a password for the Administrator account.

Creating the Shortcut

Now we’ll create a new shortcut that launches the application with Administrator privileges.

Right-click the desktop (or elsewhere), point to New, and select Shortcut.

Enter a command based on the following one into the box that appears:

runas /user:ComputerName\Administrator /savecred “C:\Path\To\Program.exe

Replace ComputerName with the name of your computer and C:\Path\To\Program.exe with the full path of the program you want to run. For example, if your computer’s name was Laptop and you wanted to run CCleaner, you’d enter the following path:

runas /user:Laptop\Administrator /savecred “C:\Program Files\CCleaner\CCleaner.exe”

Enter a name for the shortcut.

To select an icon for your new shortcut, right-click it and select Properties.

Click the Change Icon button in the Properties window.

Select an icon for your shortcut. For example, you can browser to CCleaner.exe and choose an icon associated with it. If you’re using an other program, browse to its .exe file and select your preferred icon.

The first time you double-click your shortcut, you’ll be prompted to enter the Administrator account’s password, which you created earlier.

This password will be saved – the next time you double-click the shortcut, the application will launch as Administrator without asking you for a password.

As we mentioned above, the standard user account now has the ability to run any application as Administrator without entering a password (using the runas /savecred command to launch any .exe file), so bear that in mind.

The Administrator password is saved in the Windows Credential Manager – if you want to remove the saved password, you can do it from there.


Leave a comment

Posted by on December 27, 2013 in Uncategorized


Access My Computer Easily Without Forgotten Password

Way 1: Access Locked Computer by Another Administrator

This is another available administrator, which you can use to login Windows computer.

1. On Windows login screen, switch login user to another available administrator.

If your computer is installed with Windows 7, just press “Ctrl + Del + Alt” and click “Switch User” to switch to another user. If your computer is installed with Windows 8, on Windows login screen, just click the arrow on the left of user image, and there will list all users available on Windows 8. Choose one administrator you remember password.

2. Type password and press Enter to access computer.


Way 2: Access Computer with Password Reset

Step 1: Reset Forgotten User Password

There are several methods for forgotten password reset. The first one is to use administrator to change the forgotten user password. The second one is to reset the forgotten password with reset disk. The third one is to reset the forgotten password with Command Prompt.
1. Use the administrator to change the forgotten user password. Just sign into Windows computer with administrator like Way 1. And then navigate to Control Panel to change other users’ password. For example, on Windows 7 computer, go to Control Panel – User Accounts and Family Safety – User Accounts – Add or remove user accounts. Choose one account you want to change or remove its password. And then click “Change the password” or “Remove the password”. When you choose “Change the password”, type new password and confirm it. When you choose “Remove the password”, just click “Remove Password” again to make sure you want to remove it. And then you can set new password for this user account.

2. Reset forgotten password with reset disk. After you type the incorrect password to sign in to computer, a message link “Reset Password”will appear on the login screen after the password input box.

Click the link and follow the password reset wizard. Click “Next” and insert the password reset disk you have created. Choose the option’ password reset key disk ‘and click “Next”. Go on to follow and the type new password for this user and finish password reset.

3. Reset forgotten password with Command Prompt. When you are able sign in to Windows computer with another administrator, click Start, and run Command Prompt. For example, on Windows 8 computer, press Windows + X, and click on Command Prompt (Admin) and Yes. On the Command Prompt, type in: Net User <user name> <new password> and press Enter to reset a new password for Windows 8.

Step 2: Sign in to Windows Computer with new password

After you have changed or reset Windows password, restart computer. On Windows login screen, choose the user you have reset password to login.

Way 3: Access Computer without Password

This way is going to remove forgotten Windows password with password recovery tool when computer is locked. Afterwards, we can then access our computer without password.

Step 1: Get a Windows password recovery tool

Find Windows Password Genius on Internet and download trial one to have a try.

Step 2: Install and run Windows password recovery tool on another computer.

When your computer is locked, please find another available computer prepared for Windows password reset disk creation. Install and run it.

Step 3: Insert bootable USB or CD/DVD to create one reset disk.

After inserting bootable USB into computer, choose media type USB and choose password reset disk burning disk. Click “Begin burning” to start creating password reset disk into USB drive. When you see “Successfully burning” pops up, exit USB reset disk from available computer and plug it into locked computer.

Step 4: Set computer boot from USB

First, you have to enter BOOT Settings Option by pressing boot key when computer starting. Boot key is different for different computers. Second, choose Boot option and remove USB drive or “Removable Devices” to the first place of boot list. Third, save boot changes generally by F10.

Step 5: Remove Windows forgotten password

When computer boots from USB successfully, Windows password recovery tool runs too. Choose Windows and select a user you are going to remove password. And then click “Reset Password” button and Yes to make its password to be blank. The last step is to reboot computer and you can access computer without password. Remember eject USB from computer before it reboots.

Leave a comment

Posted by on December 20, 2013 in Uncategorized


Tags: , ,

Difference between Application Server and Web Server

Key difference: An application server is a software engine, which transfers an application from one device to another, whereas a web server is a computer running programs that accept the HTTP requests from the clients.


An application server functions the same as a computer that executes the commands requested by the Web server inorder to fetch the data from the databases. It transfers the applications from one device to another. It is a generalized software engine, which implements the execution of the application server in order to create the applications for different devices. The transferring function is not concerned with the type of application functions. The application server executes the assigned specific instances in the exact procedure and step wise approach of the programs, routines and scripts by supporting their applied applications.


An application server acts as a set or group of components that are accessed by the software developers through an API (Application Program Interface). Most Application Server Frameworks contain a comprehensive service layer model. There are basically the application providers which are serviced and accessed on the server side and then sent to the relevant demanded devices. Nowadays, many application servers target much more than a Web page generation. They implement the services like clustering, fail-over, and load-balancing; this enables the developers to focus on the implementation of the business logic.


The basic advantages of the Application servers are:

  • Data and Code Integrity: This is achieved by centralizing the business logic on an individual server, and the users here are guaranteed with the updates and upgrades of the application.
  • Centralized Configuration: It refers to the implementation changes of the application configuration.
  • Security: The security helps in the secured authentication of the applications.
  • Performance: It limits the network traffic of the client-server model, which helps in the improvement of performance of large applications.
  • Total Cost of Ownership:  All the above benefits, helps in the reduction of cost in an organization’s developing enterprise applications.
  • Transaction Support: It is a unit of activity, in which many updates to the resources are made as atomic.


A Web server can be a software (in the form of an application program) or hardware (in the form of a computer). Its basic function is to accept the HTTP (Hypertext Transfer Protocol) requests from the client side, then process and serve them back as the HTTP response along with the optional data content. The responses sent are in the form of HTML (Hypertext Markup Language) web pages or documents. The basic function of the Web server is to transfer the web content, which are accessed through the internet to the respective Clients.


The web servers are responsible to conduct the transactions between the client and server. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently HTML documents, which includes the images, style sheets and scripts along with the text content. The web browser or web crawlers are the user agents, which are wholly responsible for initiating the communication. These convert the HTTP requests in the form of HTML web pages (if not able to do the conversion they respond back into a error message). Many generic web servers also support server-side scripting using an Active Server Pages (ASP), PHP, or other scripting languages. The web servers are not always used to access the World Wide Web (WWW) but are also embedded in devices such as the printers, routers, web-cams and serving only a local network. The web server once installed in these systems, can be used as a part of monitoring or administering the device system. Web servers are also able to map the path component of a Uniform Resource Locator (URL).


The most commonly performed features of the Web Servers are:

  • Virtual Hosting: This function serves many web sites using one IP address.
  • Large File Support:  This system serves the files whose sizes are greater than 2 GB on 32 bit OS (Operating System).
  • Bandwidth Throttling: It limits the speed of the responses in order to control the saturation of networks, accordingly be able to serve more clients at a time.
  • Server-Side Scripting: These generate the dynamic web pages, by keeping the web server and website implementations separate from each other.


Comparison between Application Server and Web Server:



Application Server

Web Server

Short descriptions An application server is a software framework that provides an environment in which applications can run, no matter what the applications are. A web server can refer to either the hardware or the software that helps to deliver web content that can be accessed through the Internet.
Basically, they do It transfers the business logic to client applications through various protocols including HTTP. It only handles the HTTP protocol.
Functions Its function is to deliver various applications to another device; it allows everyone in the network to run software off of the same machine. Its function is to keep the HTML, PHP, and ASP, etc. files available for the web browsers to view when a user accesses the site on the web, handles HTTP requests from clients.
Other usage It is also used to serve the web based applications and enterprise based applications. Along with the hosting of the websites, the web servers are also used on other applications such as gaming, data storage or running enterprise applications.
Resource utilizations The resource utilization is low here. The resource utilization is more here as compared to the application servers.
Examples Sun Java Application server, Apache Geronimo, IBM WebSphere Application Server, Glass Fish Server, etc. Apache, Microsoft IIS, Tomcat, Jetty, etc.
Leave a comment

Posted by on December 20, 2013 in Uncategorized


Tags: ,

Difference between FAT32 and NTFS

Key difference:  FAT32 and NTFS are file systems and disk standards used for partitioning and formatting the hard drives. If compared, FAT32 is older and simpler version to that of NTFS, which is new and well-featured version of file system.


FAT32 is a version of the File Allocation Table which is available in the Windows 95 OSR 2 and Windows 98 operating systems. It is the common file system which is used in most the computers. The file system obtained its name from the fact that it uses a table of 32-bit storage. Its basic function is to record the disk addresses of each file during the partition. The file system can have up to 24 partitions, which may range from 32MB to 137GB. These partitions operates under the Windows 9x operating system, and they are responsible to available the space on the hard disk.  There are limitations of the Windows9x operating system, which are to be considered while making the partitions available. All the remaining operating systems use the FAT32 file system as per their accordance and capability. The FAT32 file system is typically used as a means of file storage in a Windows 9x computer, on a partition not exceeding 126GB.


The FAT32 provides the following improvements over the older FAT versions:

  • FAT32 supports drives up to 2 terabytes in size.
  • FAT32 uses space more efficiently.
  • FAT32 uses smaller clusters (that is, 4-KB clusters for drives up to 8 GB in size), resulting in 10 to 15 percent more efficient use of disk space relative to large FAT or FAT16 drives.
  • FAT32 is more robust compared to the older FAT versions.
  • FAT32 is more flexible, its root folder drives an ordinary cluster chain, which enables the file system to be available at any corner on the drive.


NTFS is an advanced and featured rich file systems. The acronym NTFS stands for, New Technology File System. This file system is the most advanced and latest file system, which has a highly advanced writing techniques, improved security and high capability of space utilization. The hard disk when formatted is divided into partitions or major divisions. Within every partition, the operating system keeps track of all the files, which are stored by that respective OS (Operating System). Hence, each file is now stored on a hard disk in one or more cluster or group format, which ranges from 512 byte to 64 bytes. The files are recorded into a special file format in NTFS, these file format are known as Master File Table (MFT). These records are further used to locate the files if scattered among the clusters. NTFS also tries to find the contiguous storage space, which holds the entire file along with its clusters.


Some the most important features of NFTS are:

  • NTFS uses a b-tree directory scheme, in order to keep the tracks of file clusters.
  • NTFS stores the information about any file cluster and other data.
  • NTFS supports the large files (ranging up to 2 to the 64th power or approximately 16 billion bytes in size).
  • NTFS consists of an Access Control List (ACL), which allows the server administrator to control the user, who accesses the specific files.
  • NTFS possesses the integrated file compression system.
  • NTFS supports the Unicode, which are based on name systems.
  • NTFS along with the longer file names also supports the “8 by 3” names.
  • It provides the data security on both, removable and fixed disks.


Comparison between FAT32 and NTFS:





Acronym File Allocation Table 32 New Technology File System.
Introduced It was introduced in 1977. It was introduced in 1993.
They are FAT32 is a standard system as it supports more versions of Windows. NTFS newer versions of windows such as Windows XP, Windows 2000 and higher.
Versions FAT32 is the older Microsoft file system. NTFS is the current file system used by Windows.
File size Maximum file size 4 GB. File size limited by size of volume.
Supporting and requirement of the OS It does not support the Windows 2000 or Windows 2003 Active Directory. It requires the use of Windows 2000 or Windows 2003 Active Directory or shared cluster drives.
Accessing Does not allow access to files on the hard disk with MS-DOS. Does not allow access to files on the hard disk with MS-DOS.
Recovery capability It does not have the capability to recover from some disk-related errors automatically. It has the capability to recover from some disk-related errors automatically.
File processing speed It is slow in the file transferring process. It is faster as compared to the file transferring process.
File compression method FAT32 does not support the file compression method. NTFS supports file compression.
Conversions FAT32 can be converted to NTFS. It is complex to convert NTFS back to FAT32.
Leave a comment

Posted by on December 20, 2013 in Uncategorized


Tags: , , ,

Difference between Workgroup and Domain

Key difference: A workgroup is a type of peer-to-peer network. It is essentially the name for a Windows based peer-to-peer computer network. Computers in this kind of network can allow each other access to their files, printers, or Internet connection. A domain, on the other hand, is a client/server network in which the security and resource management is centralized. This means that a singular administration has control over the domain and allows which users have access to which files.


Domains and workgroups are two different methods for organizing computers in a network. The main difference between the two is in the manner they operate, chiefly how the computers and other resources on the networks are managed.


A workgroup is a type of peer-to-peer network. It is essentially the name for a Windows based peer-to-peer computer network. Computers in this kind of network can allow each other access to their files, printers, or Internet connection. In order to do this, every user must have an account on each of the workgroup’s computers that they require access to. These settings and access are managed by each computer’s user.


A domain, on the other hand, is a client/server network in which the security and resource management is centralized. This means that a singular administration has control over the domain and allows which users have access to which files. In a domain, there is a one single database for domain users. A user can log on at any workstation via their account and access the files.


Advantages of Domain over workgroup:

  • Centralized administration
  • User can log on at any workstation and access domain resources.
  • Security of data, user and groups
  • Runs on Windows 2000 and 2003 Server or advance support for server configuration
  • File, folder & user and group permission can be assigned.


A side-to-side comparison of workgroup and domain:




Network type Peer-to-peer Windows computer network Client/server network
Log in User needs to have separate log in id and password at each workstation User can log on at any workstation via their account and access domain resources
Workstations Computers are limited to maximum 10 There can be up to 2000 computers
Administrator Each user controls the resources and security locally on their PC’s One administrator to administer the domain and its users and resources.
Location All computers must be on the same local network or subnet. The computers can be on different local networks, i.e. anywhere in the world.
Computer’s settings Each user controls the settings on their own computer. No central settings. One can make only limited changes to a computer’s settings because network administrators often want to ensure consistency among computers.
Changes Each computer must be changed manually or once changed must be transferred to each computer. Changes made to one are automatically made to all computers
Security User needs to have separate log in id and password at each workstation, but once logged in can access the computer. Domain users must provide a password or other credentials each time they access the domain.
Leave a comment

Posted by on December 20, 2013 in Uncategorized


How Do You Find Your Windows 7 Homegroup Password? [Answers]

So you’re about to setup your new Windows 7 PC into your Homegroup when you realized that you have no idea what the password is. How do you find it? It’s actually pretty simple, if you know where to look.


Finding Your Homegroup Password

Open up Windows Explorer, and then find the Homegroup option in the left-hand navigation pane. Right-click on Homegroup and choose “View the HomeGroup password”

And there you go, your password in nice bold text—and there’s even a print button.

Rather easy, wasn’t it?

Leave a comment

Posted by on April 25, 2012 in Information technology