DKIM (DomainKeys Identified Mail) – Explained

Forged email is a serious threat to all parties in an email exchange. DomainKeys Identified Mail (DKIM) is an authentication

Surface Pro

Surface Pro 3 – TypeCover Keyboard not working

If your Surface Pro 3 keyboard and trackpad does not work at all…follow the below steps, which works for me Shutdown the Surface Pro


Take screenshot of Mac login screen – El Capitan

Screen shot and also from a Login screen or locked screen? Possible Just press Command+Shift+3 Key. This image will appear


Google – discontinue Chrome support for OS X in April 2016

Google to discontinue Chrome support for OS X Snow Leopard, Lion & Mountain Lion in April 2016. Announced this on

Office 365

RMS Analyzer tool

RMS Analyzer tool to help you analyze the settings, configuration, and health of your Rights Management services (RMS) and the

Rights Management Service

RMS protected document…Can you open it?

Let’s see if you can open the RMS-protected document. Enter your work email address that you used to open the email message…To

According to the Wi-Fi Alliance, "Wi-Fi" is not an abbreviation. The confusion may arise from the fact that the Alliance briefly used "The standard for wireless fidelity" as a slogan for Wi-Fi.. The term Wi-Fi was created by Wi-Fi Alliance as "Hi-Fi," an abbreviation for "high fidelity," which referred to high-quality audio reproduction. Similarly, Wi-Fi is often thought to be short for wireless fidelity. A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter.

USB 3.0 is the third major version of the Universal Serial Bus (USB) standard for interfacing computers and electronic devices. Among other improvements, USB 3.0 adds the new transfer mode SuperSpeed (SS) that can transfer data at up to 5 Gbit/s (625 MB/s), which is more than ten times faster than the USB 2.0 standard. USB 3.0 connectors are usually distinguished from their USB 2.0 counterparts by blue color-coding of the receptacles and plugs, and the initials SS

Physically, the Type-C port and connector is about the same size as that of the Micro-B USB. Set to be widely available starting 2015, Type-C USB will support USB 3.1 with the top speed of 10Gbps and has much high power output of up to 20V(100W) and 5A. Type-C USB also allows for bi-directional power, so apart from charging the peripheral device, when applicable, a peripheral device could also charge a host device. All this means you can do away with an array of proprietary power adapters and USB cables, and move to a single robust and tiny solution that works for all devices. Type-C USB will significantly cut down the a amount of wires currently needed to make devices work.

The display resolution or display modes of a digital television, computer monitor or display device is the number of distinct pixels in each dimension that can be displayed. It can be an ambiguous term especially as the displayed resolution is controlled by different factors in cathode ray tube (CRT), flat-panel display which includes liquid-crystal displays, or projection displays using fixed picture-element (pixel) arrays. It is usually quoted as width × height, with the units in pixels: for example, "1024 × 768" means the width is 1024 pixels and the height is 768 pixels. This example would normally be spoken as "ten twenty-four by seven sixty-eight" or "ten twenty-four by seven six eight" More Info: click here 

Soft lifting is making illegal copies of software. Common reasons people give for soft lifting are to make extra copies to use on other machines in the office, to take home, or to give to another person. For most software licenses, one purchased license is required for each installed copy. Since software is protected under the Copyright Act of the US Code, unauthorized duplication of software is a Federal offence.

Exchange Server Blogs