From our Help Desk Channel

Cracking the Windows logon password can be done, and this demonstration will show you how. Be sure to check our video notes in the link below.

Video Notes in *.docx:

https://docs.google.com/document/d/1eq0Ch6RskxALFnBh3hPznwkblVnhxkvP/edit?usp=sharing&ouid=100614388512706620074&rtpof=true&sd=true

Video Notes in PDF:

https://drive.google.com/file/d/1bXWe48idQwY3ntAIaW6yG_ZDXJN0PnG3/view?usp=sharing

We will demonstrate how a non-technical person can determine if someone is accessing your computer. If you share a living space with others and are suspicious that your computer may be having unauthorized access, I will show you how to detect and then prevent unauthorized access. If you share a dorm, apartment, or home you can have someone accessing your computer, this is a serious security issue. How can you detect this? How to prevent future access? Protect yourself and learn how! If you feel someone is accessing your computer from the internet, please wipe your computer and start with a clean operating system.

How often has your printer worked just yesterday and today it will not print! Frustrated? I will help you follow printer manufacturers' and Microsoft's recommendations to solve those frustrating print issues. This is for non-technical users who with a bit of help-desk assistance can possibly fix their printing problems. See below our free video notes for additional help.

PowerPoints in *.pptx format:

https://docs.google.com/presentation/d/1nJ3QTcCdtlimvlADjjm8PPpQDBlv9C7B/edit?usp=sharing&ouid=100614388512706620074&rtpof=true&sd=true

Slide Deck in PDF:

https://drive.google.com/file/d/1dyb3PMQPl38PUkvq8-xpIf-PlEh1VTZy/view?usp=sharing

Video Notes in *.docx:

https://docs.google.com/document/d/1j7ZXjuONUSRaHZ15a44ObEpxbnG7KPhL/edit?usp=sharing&ouid=100614388512706620074&rtpof=true&sd=true

Video Notes in PDF:

https://drive.google.com/file/d/19RvoPNwxaZEHBRGrlL67zmvegME0RYS2/view?usp=sharing

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Recent Videos

I will demonstrate and give you control over your Start Icon, Taskbar and many features you may not be aware of that can be customized. We will demonstrate this control you have in both Windows 11 and Windows 10.

I will demonstrate two ways of freeing up disk space on both Windows 11 and Windows 10. Both are safe and recommended ways by Microsoft. Storage Sense is a new feature that allows you to “set and forget” cleaning up temporary files on your hard drive. Disk Cleanup is a more aggressive tool that can free up space.

I will demonstrate how to find your Recycle Bin on both Windows 10 and 11.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Videos

If you are an IT professional, and support business clients, you will be faced with “do I bypass the Windows 11 hardware lock for my customers?” Here are some perspectives on that technical and business question. Third-party tools for evaluating your devices for meeting the Windows 11 hardware requirements. Why did Microsoft move to Windows 11? Thoughts for your customers as they better understand this newer operating system. How to prevent the Windows 11 upgrade, will show in three ways. Remember you have only 10 days to return to Windows 10 prior to Windows 11 deleting critical files you need to restore.

Follow the steps for both Windows 10 and Windows 11 and find out if you are an administrator on your PC. How can you get those privileges? Can I hack my PC and get those credentials?

I will demonstrate some basic steps you can take to troubleshoot screen flicker in Windows 10 and 11.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Videos

Need to start your Windows 10 or 11 PC into Safe Mode or other startup settings. I will demonstrate a few ways of getting to safe mode.

Need more help? Check out our advanced video:

1. How to boot Windows into Safe Mode: Windows Startup Settings https://youtu.be/AD-RfObfRYU

2. Windows 10 startup problems: Fixing Boot Problems https://youtu.be/JdRPYjYKc9g

Microsoft has a way of blocking and helping you to remove unwanted applications from your Windows computer. I will demonstrate how to turn on this protection and potentially remove applications that are considered unwanted.

Want more advanced techniques? Check out our videos:

1. Privacy and Security on Windows 10: Deeper! https://youtu.be/IomYoFYdJ-0

2. Privacy and Security on Windows 10: A Comparison of Chrome, Firefox, Brave and Edge https://youtu.be/1IFcXx6D-cI

3. Ransomware: Protecting Yourself https://youtu.be/iVnq9AY7SrA

4. Ransomware: Protecting Yourself from online Criminals https://youtu.be/PLpp6LXYehI

A classroom lecture on routers and switches. CompTIA Network + lecture series. Understanding routers and subnets. Routers are often called gateways and this critical term for IT professionals. Inside of basic routers and their plug-ins or interfaces. Routers work all Layer 1-2-3. Routers make decisions for packet destination. Enterprise switches are very expensive and critical to LANs. Switches make decisions based on a MAC address. A look at Broadcom the major maker of ASIC chips for switches. A quick review of the firewall and the OSI model.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Videos

A classroom lecture. Understanding the technology of "fast-startup" introduced in Windows 8 and 8.1 and continued into Windows 10. How to reinitialize hardware with an operating systems that uses fast-startup. Understand how hibernation works in new operating systems. Why removing power from your PC is often a solution for many problems. Learn how to troubleshooting both startup and shutdown problems in Windows.

A classroom lecture. We will look at two fundamental Windows Services: Workstation and Server Services. Audio and Video are classroom quality please pardon. We will explore the SMB protocol and the reversed engineered SAMBA version running on Linux. If you are planning on a career in IT, I encourage you to look at this series of lectures on Windows networking. How do you see Windows PCs on the network? How do you share a folder to be seen on the network? How does the technology work that allows Linux to see Windows PCs and Linux devices to share folders that Windows devices can see? Understanding the basics of server services and workstation services. These are fundamental concepts for every IT professional.

A classroom lecture. User Mode in the Windows operating system depends on Windows Services. Using Process Explorer to better understand the Service Manager process, and services and their relationship to the operating system. Understand svchost.exe and why it launches services in Windows. Learning how the operating system controls the launching, behavior, and error mode of Windows services. Linux calls them "daemons".

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Videos

A classroom lecture. VPN site to site, VPN host to the site, VPN host to host. IPsec and GRE protocols are used in VPN. SSL is very popular for today's VPN. PPTP is an older layer 2 secure connection but is being replaced by RADIUS servers. A quick took at Cisco's TACACS. XML is both human and machine-readable which makes up Web Services. Unified Voice Services have taken on whole new importance during the COVID crisis. A look at Network + questions and answers.

A classroom coverage of Network + exam objectives

In this how-to video, Diego performs a tear-down and repair of a non-charging Kindle.

A classroom lecture. Access Points for home and business, symbols for APs, and a look at the OSI layers and where network equipment is found in the OSI model. Content Filters and Load Balancers for new IT students. Web Hosting by Amazon and Azure from Microsoft. These are classroom lectures on concepts covered in CompTIA Network +

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Recent Videos

 

A newer lecture has been done please take a look: https://youtu.be/GiUpvm23Y5M

A classroom lecture. Learn to automate so many jobs and functions in Windows when you use Task Scheduler. Learn how administrators use this automation tool to execute software with precision control. Task Scheduler has dashboards to view our configured tasks, edit tasks, and troubleshooting tasks. Microsoft heavily used Task Scheduler to automate the operating system. How to build a task, test the task and verify the task is working properly. Start automating Windows after this lecture!

A classroom lecture on why this tool is so critical for the IT student and IT professional. The SCF.exe tool allows the tech to validate that the operating system files. A great tool to determine if the operating system is a registry issue or a file issue. Why restore points are important to troubleshooting. You can run SCF offline. I will demo the tool. We will look at DART tools also. Understanding Windows Side by Side.

A classroom lecture for IT students and IT professionals allowing understanding WinRE.wim file. How to create a "startup recovery CD". Allows the tech to access Safe Mode, Safe Mode with Command Prompt, Enable boot logging, Last Known Good Configuration, and many more options for starting a faulty Windows. Automatically repairs missing and corrupt: system files, boot configuration settings, registry settings, and some disk metadata. Allows you to do memory checks, recovery Windows from backup, and much more.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team
 
 

Recent Videos

 

A classroom lecture. Beginning with an understanding of Registry files, and their location on the hard drive. A demonstration of how important the registry is to the operating system. The value of restore points for the technician. Where are restore points saved? How to configure and use restore points in troubleshooting. What is saved when you perform a restore point.

This covers the printer subsystems for IT professionals. Printer Server properties, we will look at the printer spooler and service. We can modify where our printer spooler file location is assigned on the hard disk, this can be critical for a printer server that handles massive printing for users. You can control notifications to your users on their print jobs. We will look at the application rendering of our printer job. We will look at temp files created by the print jobs. How to clean your spooler from corrupted files. We will look at the print spooler service and how to troubleshooting printer problems. How to troubleshoot printer problems from simple to more complex problems.

Understanding Network Address Translation (NAT) and Port Address Translation (PAT). All homes and business networks use private IP addresses all home and business routers have NAT built-in. Tables inside the software of routers maintain IP traffic internally and externally as it transverse the router. NAT or PAT tables allow the use of one usable IP address on your router to be "used by all hosts" inside your LAN. NAT saved IPv4 from quick extinction and was developed in 1990. Not all applications can use NAT such as VoIP so various type fixes have been designed. NAT transversal or Application Level Gateways can be used by some applications. PAT is very popular and uses port numbers to allow and NAT functions.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team
 
 

Recent Videos

A classroom lecture. Introduction to Network Attached Storage, with RAID and redundant power supplies. What are the advantages and disadvantages of NAS vs Windows storage? Why Windows licensing "CALs" make NAS so attractive to the enterprise. What is SMB protocol vs Samba daemon? Looking at enterprise and SOHO NAS solutions.

A classroom lecture. Home and business routers provide DHCP services. DHCP allows an easy way of deploying the necessary IP address, subnet mask, and gateway type information to all hosts. This is a client/server protocol/software used by all local area networks. DHPC is managed by administrators. DHCP allows a variety of IP information to be deployed depending on the administrator of the network. IP addresses are rented! DHCP protocol supports both IPv4 and IPv6. How IP addresses are typically given in a home and small business network.

Retail routers are shown as multi-function network devices. Breaking down what network devices and services are in a typical retail router. Understanding the embedded Linux operating system that provides, a router, firewall, DHCP server, SMB server, and much more. Built-in access point and how it is placed in the home network. Critical network fundamentals for the IT student and IT professional.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Recent Videos

A classroom lecture. An overview of the NTFS file system, how it works, and critical structures that makeup NTFS. We will look at NTFS encryption and compression. NTFS has a $LogFile to record metadata change. Scalable and has Journaling for recovery. Supports Hard Links, Alternate data streams, sparse points, and volume shadow copy. Quotas and resizing are some of the features of NTFS. NTFS has strong permissions for both files and folders.

A classroom lecture. We will explore the Windows registry and file structure. The registry is loaded in RAM when the operating system loads. We will look at registry hives, keys, and values. Registry keys are container objects, registry objects are like files. Know where your registry is located on the hard disk. We will look at the critical keys of the registry: SAM, HKey_Local_Machine, and more. We discuss restore points and other techniques of registry backup and recovery. This video has been updated on our channel!

Our newest video on the Windows registry: https://youtu.be/-bsLmDfvF1Y

A classroom lecture. I will cover boot sectors, MBR sectors on your hard disk so we understand the disk structures. Although it is using the older style BIOS and MBR partition types it is worth watching for new IT students and many IT professionals. The video covers some critical concepts. This covers Win7-Windows 10.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Recent Videos

 

Demonstration of how to effectively use VirtualBox’s snapshot technology, how it works, and explore the technology that allows capturing the “state” of an operating system. We will look at differencing disks and how they build a chain of dependency from the parent disk to the special UUID.vdi snapshots. Learn the purpose of files like *.nvram, *.sav, and UUID.vdi. Some advice on deleting snapshots and effective use of cloning to obtain the VM you desire every time. Snapshots provide excellent training, development, and testing environment for IT professionals and students. Come join us as we explore this professional type-2 hypervisor.

Demonstration of how to install Oracle VirtualBox and create a virtual machine for installing Server 2022. We will demonstrate step by step the process and show the tricks and tips for the effective use of type-2 hypervisors. Oracle VirtualBox is a powerful and professional hypervisor rich with features for IT professionals and students. We will show how to install and create a virtual machine the right way. IT professionals can use virtualization to advance their skills and knowledge and a must for every IT student.

Demonstration of how to install Oracle VirtualBox and create a virtual machine for installing Server 2022. We will demonstrate step by step the process and show the tricks and tips for the effective use of type-2 hypervisors. Oracle VirtualBox is a powerful and professional hypervisor rich with features for IT professionals and students. We will show how to install and create a virtual machine the right way. IT professionals can use virtualization to advance their skills and knowledge and a must for every IT student.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team
 
 

Recent Videos

 

A technical comparison between Windows 11 and Server 2022. A look at over 200 services on Windows 11 and why server has so few. A review of Server Core and the importance of server hardware. Why Windows Server operating systems are stable and reliable compared to laptops and desktops running Windows clients? Why Azure makes sense for many companies looking to expand their Windows environment. What are server roles and features?

Windows Services are critical software carefully designed to provide the functionality to applications, network services, and the operating system. Windows Services are *.dll files often executed in a “service host” process called svchost.exe Windows services are vectors of attack by malicious actors attempting to gain privilege elevation on the operating system. We will look at how services are authenticated; privileges are restricted and run in a unique session environment. A review of the tools to interact with services, including GUI, command-line, and PowerShell. We will focus on security in part 1 and part 2 practical concepts and troubleshooting.

Windows Services are critical software carefully designed to provide the functionality to applications, network services, and the operating system. Newer versions of Windows 10 bring significant changes to services! An overview of dependencies and their complex nature. A look at startup types and recovery options for services. Can I turn any application into a service? A review of some services on Windows 11. Troubleshooting services using event viewer and utilities to restore missing or corrupted *.dll files that might impact a service.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team
 
 

Recent Videos

We are working on subtitles for each video in the following languages: Arabic, Chinese (Simplified), Chinese (Traditional), Dutch, French, German, Hindi, Indonesian, Japanese, Korean, Polish, Portuguese, Russian, and Spanish

 

This video series is a comprehensive study using powerful tools to lift the hood of the Windows Operating System and allow the tech to understand and troubleshoot applications and services.

We will cover how to use Process Explorer, Process Hacker and many other Sysinternal tools but most importantly we will discover how Windows really works and how we can understand our applications and effectively troubleshoot problems. From your PC/laptop to servers this understanding is critical to every IT professional.

Day 2: Troubleshooting Windows Applications. Types of Applications and Processes.

This video series is a comprehensive study using powerful tools to lift the hood of the Windows Operating System and allow the tech to understand and troubleshoot applications and services. We will dive into process types and how our tools categorize processes.

We will cover how to use Process Explorer, Process Hacker, and many other Sysinternal tools but most importantly we will discover how Windows really works and how we can understand our applications and effectively troubleshoot problems. From your PC/laptop to servers this understanding is critical to every IT professional.

Day 3: Troubleshooting Windows Applications: Process States

This video series is a comprehensive study using powerful tools to lift the hood of the Windows Operating System and allow the tech to understand and troubleshoot applications and services. Keep a good attitude! We will dive into powerful features of Process Explorer and in doing so learn more about processes, process states and a better understanding of how programs run in RAM and the page file.

We will cover how to use Process Explorer, Process Hacker and many other Sysinternal tools but most importantly we will discover how Windows really works and how we can understand our applications and effectively troubleshoot problems. From your PC/laptop to servers this understanding is critical to every IT professional.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Day 4: Process Explorer Metrics and Troubleshooting Windows Applications

We will look at Process Explorer Metrics, understanding these values, and how to apply them to analyzing and troubleshooting applications. Why context delta is such an important metric to use in analyzing processes. This video series is a comprehensive study using powerful tools to lift the hood of the Windows Operating System and allow the tech to understand and troubleshoot applications and services. We will dive into powerful features of Process Explorer and in doing so learn more about processes, process states, and a better understanding of how programs run in RAM and the page file.

We will cover how to use Process Explorer, Process Hacker, and many other Sysinternal tools but most importantly we will discover how Windows really works and how we can understand our applications and effectively troubleshoot problems. From your PC/laptop to servers this understanding is critical to every IT professional.

Day 5: A Look at Microsoft Store Apps and Why we don’t Troubleshoot them!

A quick look at the Windows 11 Microsoft store and the promises of Microsoft. Why do Windows Apps have such tight security? How to identify Windows Apps in Process Explorer. How do we run 32-bit apps in an x64 operating system? A look at the framework for Windows Apps. Android apps and how they will work in Windows 11. A peek at Windows 11 and ARM. This video series is a comprehensive study using powerful tools to lift the hood of the Windows Operating System and allow the tech to understand and troubleshoot applications and services. We will dive into powerful features of Process Explorer and in doing so learn more about processes, process states, and a better understanding of how programs run in RAM and the page file.

We will cover how to use Process Explorer, Process Hacker, and many other Sysinternal tools but most importantly we will discover how Windows really works and how we can understand our applications and effectively troubleshoot problems. From your PC/laptop to servers this understanding is critical to every IT professional.

Day 6: Linux GUI Applications are coming to Windows

How Microsoft is developing frameworks allowing Linux GUI applications to run with the Windows Subsystem for Linux. My favorite 3rd party Windows application support tools. Understanding the importance of processes and why all operating systems use them. How all processes use IPC or Interprocess communication protocols to share and communicate with each other. What are handles? This video series is a comprehensive study using powerful tools to lift the hood of the Windows Operating System and allow the tech to understand and troubleshoot applications and services. Keep a good attitude! We will dive into powerful features of Process Explorer and in doing so learn more about processes, process states, and a better understanding of how programs run in RAM and the page file.

We will cover how to use Process Explorer, Process Hacker, and many other Sysinternal tools but most importantly we will discover how Windows really works and how we can understand our applications and effectively troubleshoot problems. From your PC/laptop to servers this understanding is critical to every IT professional.

 

Videos: Subjects in-depth

 

Day 7: Understanding Application *.DLL files

What are Dynamic Link Libraries or *.dll files. Why are they so critical to Windows and Windows Applications? Learn who can execute *.dll files. Why is ntdll.dll one of the most critical DLL files in Windows? A look at application memory, private bytes, working set and page faults. The basics of application troubleshooting. This video series is a comprehensive study using powerful tools to lift the hood of the Windows Operating System and allow the tech to understand and troubleshoot applications and services. Keep a good attitude! We will dive into powerful features of Process Explorer and in doing so learn more about processes, process states and a better understanding of how programs run in RAM and the page file.

We will cover how to use Process Explorer, Process Hacker and many other Sysinternal tools but most importantly we will discover how Windows really works and how we can understand our applications and effectively troubleshoot problems. From your PC/laptop to servers this understanding is critical to every IT professional.

Playlist: Windows Advanced Tools and Technologies

Playlist: Wireless Setup and Troubleshooting

Recent Videos

We are working on subtitles for each video in the following languages: Arabic, Chinese (Simplified), Chinese (Traditional), Dutch, French, German, Hindi, Indonesian, Japanese, Korean, Polish, Portuguese, Russian, and Spanish

 

Learn how to download, install, and use Windbg, Microsoft debugging tool. We will explore Windows Error Reporting and Nirsoft’s AppCrashView tool. WhatisHang is another tool we will explore in solving application hangs. We will set memory dump types and examine them using Windbg.exe and Nirsoft’s BlueScreenView tools. We will analyze both crash dumps and minidump files. We will learn how to use dumpchk.exe to validate that our memory dump files are valid prior to upload to Microsoft’s technical support. A great way to explore these deeper dives into advanced troubleshooting.

Enterprise servers, desktops, laptops will at some time freeze or lockup. Applications can also freeze and lockup. These can be complex problems for the IT professional, but there are best practices and steps you can take to carefully investigate the problem and resolve both physical and virtual servers, desktops, and laptops. Home users can download our video notes for helpful suggestions they can take to resolve this frustrating problem. We will cover how to potentially access a locked-up computer, using event viewer and 3rd party tools uncover potential problems. We will use performance monitor to build special data collector sets just for lockup analysis.

Rufus is a powerful feature-rich tool for the IT professional. Learn its features and functions that are built-in in this handy tool. Rufus has a HASH value calculator for MD5, SHA1, SHA256, and SHA512. Rufus has a built-in Flash memory cell testing algorithm for SLC, MLC, and TLC memory. Pete Batard, the developer has added my helpful pop-up and notifications that lead to the more successful creation of Flash Drives tools. You can download both Windows 10 and 8.1 including many versions for both Pro/Home/Educational. The utility supports many languages for international use. We will look at FreeDOS, SysLinux, GRUB, and ReactOS.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

classroom lecture. We will look at two fundamental Windows Services: Workstation and Server Services. Audio and Video are classroom quality please pardon. We will explore the SMB protocol and the reversed engineered SAMBA version running on Linux. If you are planning on a career in IT, I encourage you to look at this series of lectures on Windows networking. How do you see Windows PCs on the network? How do you share a folder to be seen on the network? How does the technology work that allows Linux to see Windows PCs and Linux devices to share folders that Windows devices can see? Understanding the basics of server services and workstation services. These are fundamental concepts for every IT professional.

A classroom lectures. We will look at two fundamental Windows Services: Workstation and Server Services. Audio and Video are classroom quality please pardon. We will explore the SMB protocol and the reversed engineered SAMBA version running on Linux. If you are planning on a career in IT, I encourage you to look at this series of lectures on Windows networking. How do you see Windows PCs on the network? How do you share a folder to be seen on the network? How does the technology work that allows Linux to see Windows PCs and Linux devices to share folders that Windows devices can see? Understanding the basics of server services and workstation services. This is a fundamental concept for every IT professional.

A classroom lecture. We will look at two fundamental Windows Services: Workstation and Server Services. Audio and Video are classroom quality please pardon. We will explore the SMB protocol and the reversed engineered SAMBA version running on Linux. If you are planning on a career in IT, I encourage you to look at this series of lectures on Windows networking. How do you see Windows PCs on the network? How do you share a folder to be seen on the network? How does the technology work that allows Linux to see Windows PCs and Linux devices to share folders that Windows devices can see? Understanding the basics of server services and workstation services. These are fundamental concepts for every IT professional.

 

Playlists: Subjects in-depth

 

Technology: In 5 Minutes

Windows Advanced Tools and Technologies

Wireless Setup and Troubleshooting

Videos that Build Skills

We are working on subtitles for each video in the following languages: Arabic, Chinese (Simplified), Chinese (Traditional), Dutch, French, German, Hindi, Indonesian, Japanese, Korean, Polish, Portuguese, Russian, and Spanish

 

Getting data off a Laptop or PC when Windows fails to boot properly is critical. A mistake often made is to attempt to repair … DON’T. Get the data or a copy of, off the device prior to working on the boot problem. We will walk you step by step on getting your data off safely using two well tested methods.

We will use a Windows 10 installation flash drive or a Linux bootable flash drive. You can also download our video notes and check out many other options to getting your data safe.

Learn how Traceroute works and better understand how to interpret the results. If you want a more technical explanation, please see our video called Traceroute: More Complex Than You Think

PoE is the shorten version of Power Over Ethernet. It is gaining popularity in many areas, such as Smart Building design and an indispensable technology for IT professionals. VoIP phones, Wireless Access Points, cameras, and much more. How does it work? Watch and learn about Power over Ethernet and the standards and technology that make it a growing enterprise feature.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

PoE is the shorten version of Power Over Ethernet. It is gaining popularity in many areas, such as Smart Building design and an indispensable technology for IT professionals. VoIP phones, Wireless Access Points, cameras, and much more. How does it work? How does a switch know if the AP needs 30 watts or 71 watts and what happens if it can not supply the power to the device? Watch and learn about Power over Ethernet and the standards and technology that make it a growing enterprise feature.

Learn how Traceroute works and why the results are more complex to interpret than you might think. Learn the tricks of analyzing traceroute results. You will learn the importance of router DNS names, router types, router locations, and why they are keys to better understanding traceroute results. Why would you use TCP protocol to use in your Traceroute vs. ICMP? Understand the importance of network boundaries, MPLS networks, and how load balancers impact your Traceroute results. I will show what to focus on and what is not essential in your Traceroute results. Finally, I will introduce MTR as an alternative to Traceroute.

The Run Command unlike the search bar on your Taskbar is an execution environment with powerful shortcuts for the IT professional. It has a “shellexecute” API underneath the dialog box which allows over 150 shell commands to be run. It provides both a history of executed commands and an autocomplete feature that make it a powerful tool. We will also look at two powerful RUN command alternatives that IT professionals can use in their quest for efficiency and power.

 

Playlists: Subjects in-depth

 

Technology: In 5 Minutes

Windows Advanced Tools and Technologies

Wireless Setup and Troubleshooting

Videos that Build Skills

We are working on subtitles for each video in the following languages: Arabic, Chinese (Simplified), Chinese (Traditional), Dutch, Filipino, French, German, Hindi, Indonesian, Japanese, Korean, Polish, Portuguese, Romanian, Spanish, and Swahili

 

How to measure fiber light loss across a fiber link, cable, or end-to-end connections. A look at affordable testing devices for fiber optics: Fiber visual locators, Fiber light sources, Fiber Optic Power Meters, and Fiber inspection tools. Understand the considerations when choosing fiber adapters.

Fiber optics in the LAN, server room, and Data Center. We will explore single-mode and multimode

fiber cables and their types. A look at the revolution with MPO/MTP cables, connectors, and transceivers.

We’ll look at this set of powerful, customizable utilities designed for Windows 10 power users. Fine-tune and personalize your Windows 10 environment. Create custom windows for snapping applications, resize pictures on the fly, enhanced search, and more.

 
In our video descriptions are found links to download video notes and slides
— Techsavvyproductions team

Out of Band Server Management used by HP, Dell, Lenovo, and Open Compute Project. We will explore Baseband Management controllers and their firmware stacks. A critical feature of any management of remote IT devices and resources.

RAID migration, learn about RAID stripe size and RAID spare disks. Understand RAID rebuild time and priority settings in controller firmware. How to measure IOPS, disk latency, sequential access, random access, and queue depth.

What are containers? How does Windows host these amazing applications and their required libraries and binaries? We will explore the isolation done by the Windows components called “Job Objects” and “Server silo”.

 

Playlists: Subjects indepth

 

Advanced Network Topics

Windows Advanced Tools and Technologies

Wireless Setup and Troubleshooting

Videos that Build Skills

 

Understanding Server RAID requires a deep dive into concepts and terms. IOPS,

latency, queuing, queue depth, kernel or controller-based RAID are some of the concepts to be mastered.

Learn how to configure software, use proper cables and connect to just about any enterprise network equipment. Learn Putty and how to configure to connect via console ports and via a network.

ArubaOS Explore switches hardware and firmware via command line and configures critical switch functions. Learn how to use Putty to configure NTP time and SSH. A demonstration of how to set up and configure a typical Enterprise switch using a console port using ArubaOS.

 

We show how to use the Microsoft Media Creation Tool to create your own Windows 10 ISO with all of the latest updates ready for deployment. A must-have tool in the IT Professional's toolkit. Don't leave home without it!

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team

VLANs, uplinks, and why "trunking" is so important. VLAN tagging and how it works. A practice look at various LAN designs. A look at "white-box switches" and "bare-metal" switch market. We will look at ArubaOS both its basic web interface and its more traditional GUI interface.

We will look at Enterprise Network Switch technology, why MAC addresses are so important, the role of ASIC chips in designing switches. How switches are critical to extending your LAN, front panel, and LEDs, accessing the switch operating system via the console port and Putty. Future switch designs. Extended Star topology is critical in today's LAN.

 

Playlists: Subjects in-depth

 

Advanced Windows 10 Concepts

Hardware and Security

OSI and TCP/IP Model Series

Videos that build Skills!

 

Compression algorithms of Microsoft NTFS compression, Xpress4K, Xpress8K, Xpress16, LZX, LZXD, and advantages of each. We'll look at Microsoft’s MS-ZIP utility based on DEFLATE data format found in RFC 1951. How Microsoft compresses *.WIM files for installation of Windows and Server.

WMI (Windows Management Infrastructure) is a critical, standards-based component of the Windows Operating System. WMI repository, WMI providers, and WMI Infrastructure make up core components of WMI. We'll look at the architecture of WMI, database, and protocols used to communicate with WMI. We'll also take a look at the GUI and command-line interfaces.

Storage Spaces Explained. Microsoft's new file system ReFS leverages Storage Spaces to provide resiliency and data protection.

Uses the B+ trees, integrity-streams, and 64-bit checksums. Compared to ZFS, BtrFS for Linux. We will look at the advantages and disadvantages of ReFS. Learn how to use Storage Spaces and create inexpensive backup or storage arrays using USB, Thunderbolt, or Firewire DAS enclosures. I will demo how to set up and configure Storage Spaces using Disk arrays, used Enterprise SATA drives.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

A look at Bitcoin and other protocols at the top layer of the OSI. Is there a 7.5 OSI layer? Docker and containers are declaring layer 7.5! Learn how Browsers running in user mode access the protocols they need in the network stack.

Why *.dll files are critical to networking. How Windows 10 leverages layer 7. Peer into Outlook at layer 7 and see how services play a key role in layer 7. Over four hundred protocols exist at layer 7 of the OSI model.

How to choose a used server, vendors, tips for purchasing, cleaning CPUs, cleaning critical contacts in a used server platform. Learning your hardware, LEDs, documentation, chips, jumpers, and maintenance procedures. Avoid overheating servers, running diagnostics, learning offline management via iLO, and exploring this incredible server system.

Evaluate the hardware subsystems, determine how to overcome old hardware performance, configure disk arrays, test performance, and prepare the server for an operating system. How to download and properly set up firmware updates, drivers, and operating system services to run on vendors' hardware.

 

Videos that build Skills

 

We will look at the relational database, hidden system files that makeup NTFS. Use Active Disk Editor to view, disks, partitions, and file systems. A look at ReFS, using B+tree data structures and tips on how to properly set up Storage Spaces on PCs and 2016 Server. Explore the fundamentals of Windows’ NTFS files system,

Users, Applications, Named Pipes, Files, Folders, Printers, and much more in Windows User Mode must have security. These objects are controlled by ACLs and Security Principal listed in the ACLs. NTFS security and Share permissions are just some of the access controls built into Windows. Inheritance, ownership, and access tokens are critical in understanding Windows security. Processes, threads, and users depend on access tokens to obtain proper security, rights, and privileges.

The presentation layer is about HTTP compression using gzip, deflate, br, and TLS for creating secure connections between two hosts. Layer 6 is loaded with encoders/decoders, byte order format tools, data standard systems allowing communication across disparate operating systems, hardware architectures, developer languages, and syntax methodologies. We have MIME/SMIME, the amazing encoders for email. Layer 6 is often described in vague terms that aren't helpful for IT students or IT professionals to understand what takes place at Layer 6.

Videos that build Skills!

 

A technical look at the OSI layer 3 and IPv6. We will explore IPv6 Link-local addresses and their structure, why you may have two global unicast IPv6 addresses (stable and temporary). Understand unique-local addresses and anycast and how it works. Fire up PowerShell and see what it does for IPv6!

Begin to learn IPv6 concepts like Unspecified, Loopback, Multicast, Link-Local unicast, and Global Unicast. IPv4 mapped to IPv6, using an IPv6 address in a browser, using nslookup for IPv6, and much more in this presentation.

A technical look at the OSI layer 3 and will focus on IPv6. We will be looking at packet sniffers, Android apps that help us discover IPv6 traffic. Why is IANA so important to IT professionals? How is IPv6 allocation going to work? Understanding IPv6 prefix concepts. What role does ARIN play in IPv6, IANA and its role, the massive address space of IPv6, and how much is already allocated, and looking at Global unicast concepts? Learn how to simplify the IPv6 address and understand the IPv6 address prefix.

Learn how to protect against SIM swap fraud, your Google account from successful online hacking, encrypt your data, use the strongest security for authentication. Twenty-nine security settings and ten privacy settings for protecting your phone from improper access.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

Understanding the complex hierarchical database used by Windows for system, software, and user configurations. Learn about the kernel-based configuration manager responsible for the registry. How has Microsoft improved the registry’s stability with the Kernel Transaction Manager? Learn how to locate and edit all your registry hives.

Practical steps for troubleshooting Windows 10 network connectivity for local and remote users. We'll also look at effective troubleshooting for wired and wireless users. From PowerShell to portable apps, we'll look at tools that can help IT professionals do their work.

A technical look at the transport layer, both UDP, TCP, and the new kid at layer 4 called QUIC. A look at the advantages of Google QUIC protocol and the adoption of QUIC with HTTP3. The importance of port numbers that connect applications to applications across the network.

 

Videos that build Skills

 

Troubleshooting non-booting PCs/Laptops, how to test quickly for HD failures. Troubleshooting flash drives and external hard drives. Understanding SMART data and how to use Seagate and Western Digital hard drive diagnostics.

A technical look at IPv6 Multicasting. Assigned and “well-known” multicasting addressing to Solicited Node and how it plays an important subnet role for Neighbor Discovery protocol and many ICMPv6 functions.

How local node multicasting plays a role in Windows and Linux inter-process communications (IPCs). How the IPv4 ARP protocol is replaced in IPv6. How routers inform all hosts of their gateway address.

Laptop teardown of a Dell M6700, upgrading disk to a RAID 0 M.2 SATA SSD array, replacing thermal grease on both processor and GPU. Sharing my steps, tricks, and tips. Software I use to test hard drives, data recovery from a corrupted 2.5 spindle drive. Flashing BIOS and moving to UEFI native mode and installing Windows 10 enterprise.

Videos that build Skills!

 

OSI layer 5 is a complex but very interesting layer where protocols like RPC, Winsocks and many more exist and run. Layer 5 is about synchronization of data, establishing, maintaining and ending communications. You will learn about H.245, iSNS, SMB, RTCP, and another layer 5 protocols. We will explore how Windows 10 implements layer 5. We will use tools to view and expose protocols operating at Layer 5.

We will use TCPview and Process Explorer to compare the privacy and security of Brave, Firefox, Edge, and Chrome running on Windows 10 Enterprise. I look at invasive tools used to collect private data on you as your browse. We will compare page file size, RAM size, and endpoints of each browser as we go to a major news site. We will look at privacy improvements when using the extension called Privacy Badger. Finally, we will run a virtual browser and compare it with Brave, Firefox, Edge, and Chrome.

Privacy impacts security not only as another vector for a security attack but also exposure of your personal information to companies seeking to exploit your personal data. A technical look at improving Windows 10 in terms of privacy and security. LTSC version of Windows 10 is reviewed and compared technically to Windows 10 Enterprise. A look at your removing your ISP as your DNS resolver for your mobile and home network. Third-party tools to improve privacy and security on Windows 10. Some PowerShell commandlets for services.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

We analyze the components of Task Scheduler, using process explorer view the svchost.exe process that runs the Task Scheduler service and the process mmc.exe that runs the console. We will explore the registry and see how tasks are configured in subkeys. We will show how to run utilities using the system account and troubleshooting tips for tasks, scheduler service, and the console. We will analyze the creation of a task and the running of a task in the process monitor. I will debunk some of the myths on the internet on how to solve Task Scheduler services.

Practical steps for troubleshooting Windows 10 network connectivity for local and remote users. We'll also look at effective troubleshooting for wired and wireless users. From PowerShell to portable apps, we'll look at tools that can help IT professionals do their work.

We will cover OM1-OM4 multimode cables, introduce the new OM5 cable for 100-400G. Understand cable connectors used in LAN and today's Data Centers. Build a modern transceiver, learn about SerDez and the critical ASIC chips that drive higher speeds in the Data Center.

A critical view of the cost/benefits of transceiver options. Look at the MPO/MTP connectors and how they transform fiber density.

 

Videos that build Skills

 

We'll take a look at SONET/SDH and its equipment, OTN Optical Transport Network, and its technology and equipment. We'll cover WDM wavelength division multiplexing, its two versions CWDM and DWDM, and compare SONET and OTN. Understanding Data Link Services, WAN technologies over time, Enterprise-Carrier-IPS at Layer 2, self-healing fiber links, and more.

We'll review DOCSIS and how cable operators deliver ethernet via RF and take a peek at DSL and its technology. Ethernet in the WAN, take a look!

The OSI layer 2 or Data Link Layer provides a host of services to both the Network Layer and Layer 1. Error detection, Flow control, data organization into frame structures, synchronization, and reliability are the complex features of Layer 2. We will look at ethernet, DSL, PPP, DOCSIS 3, SONET, and more.

Transfers data between adjacent network nodes! The principal service is transferring data from the network layer of the source to the network layer of the destination node. The importance of flags in the frame. We will explore frame check sequence (FCS) and Forward Error Correction (FEC). Automatic repeat Request or (ARQ) and its role in the standard ITU G.hm standard.

OSI Layer 1 made up of three sublayers: encoding, parallel to serial and amplifiers, LEDs, and lasers. Layer 1 pushes data to mind-blowing speeds of 20Tbps across the ocean floors via fiber cables. New server NICs are pumping data at 200Gbps in data centers.

Layer 1 is where signals are impacted by NEXT (Near End Crosstalk) FEXT (Far End Crosstalk), reflection, refraction, dispersion, absorption, and attenuation just to name a few! More money is spent at Layer 1 than all other layers combined!

Videos that build Skills!

 

This video presents an introduction to two critical models used in internetworking: the OSI 7 layer model and the 4 layers TCP/IP or internet model. We will compare the two models and why both are vital for the IT pro.

The history of open internetworking is complex and took over 20 years. Why layers in our network stack?

Capture, filter, and find your application issues and operating system issues. Process Monitor a powerful tool for help desk and admins. Sysinternals tool for troubleshooting both Windows and applications. Capture events and use them to find issues, save your data as a file for future reference, capture register, file system, network, or process-thread events. Common error messages and their explanation. We will review the value of the Process Tree!

Windows is building in isolation via Hyper-V, isolation via the operating system, isolation via the restrictive processes, and much more. This is leveraging what is known as "Sandboxing". We will demonstrate Windows Desktop Sandbox, a super cool concept for anyone who wants to play with this isolated version of Windows 10. A demonstration and lecture on Windows 10 sandbox, how Chrome protects your Windows PC when using Chrome, how Edge is protected against malicious code, and a brief introduction to Windows Docker Containers. Process Isolation and Hyper-V isolation techniques.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

Learn the technology behind PXE, proxyDHPC, TFTP servers, and see how to deploy operating systems quickly on a LAN. Learn the purpose of PXE and how it can be implemented. It is often integrated with Wake-on-LAN. How does DHCP get your client to a PXE server and what is an NBP file and why is it critical to PXE? We will use Serva's Windows PXE server in our demo.

Serva's homepage: https://www.vercot.com/~serva/

Final of a series of 4 videos on Process Explorer and other SysInternals tools. Demos of memory leakage, Immersive apps, process security, and use of VirusTotal.com. Understanding page files and "swapfiles. sys". Learn how to set better security on your memory.

Physical memory limits for Windows 10 and Server. What counts to the commit limit? Troubleshooting memory exhaustion. Setting the correct crash dump file size. Analyzing the Chrome browser vs Edge. Understanding how to troubleshoot CPU impact from any application. How to quickly find malware and remove it from your operating system.

This lecture covers new processes with Windows 10, pseudo-processes in Process Explorer, the critical process in the Windows operating system. We'll cover memory concepts and show how to use Process Explorer to analyze memory. Compare processes vs threads and see the importance and roles each play in the operating system.

We will look at virtualization security in Windows. Why Microsoft has a new process for memory compression and the registry. We will look at Process Monitor in analyzing Windows behavior. We will look at IPCs and their role in allowing data sharing between applications. A look at Windows page files and how to properly set the limits. Understanding Windows virtual memory. More tools to view and understand Windows memory.

 

Videos that build Skills

 

Deeper Dive into Windows on ARM, exploring more of the tools in Process Explorer. Troubleshooting drivers and gaining a better understanding of Hyper-V. How to choose the proper scheduler for Windows. Learn how to use Process Explorer to solve problems with hardware or drivers.

Learn how to use Process Explorer to set Affinity for a misbehaving application. How to suspend processes to troubleshoot applications. Looking at process *.dll files. Why is application handles important to monitor? Note: The ARM emulation only supports x86 applications, it does not support x64 applications at this point in time.

Learning architecture and technical fundamentals of Windows as a beginning for troubleshooting Windows 10 and Server and applications. A deeper look into User and Kernel-mode understanding where most troubleshooting happens.

Understanding of how Windows uses memory separation and protection to keep the OS stable. How Windows protects Kernel mode. Understanding Rings of privilege in Intel and AMD processors. The migration of Windows 10 code to ARM. Introduction to Process Explorer, a Sysinternals tool for troubleshooting Windows and applications. What files start a process and what is a process? Understanding what preemptive multitasking is and how Windows leverages this feature.

Understanding the Windows 10 "Windows As A Service" and its dependence on the Windows 10 update system. Learn the difference between "upgrade" and "clean install", what are cumulative updates, feature and quality updates. Why application compatibility is so critical to Microsoft? How big are updates? Learn how this complex technology works and how to troubleshoot a failed update.

Videos that build Skills!

 

Troubleshooting steps and procedures for solving most of the Windows 10 update issues. Understanding the Windows 10 "Windows As A Service" and its dependence on the Windows 10 update system. Learn the difference between "upgrade" and "clean install", what are cumulative updates, feature and quality updates. Why application compatibility is so critical to Microsoft? How big are updates? Learn how this complex technology works and how to troubleshoot a failed update.

Beamforming, Wider Channels, Speed, and MIMO are bundled in this new wireless standard that pushes wireless to a new level. Learn why efficiency is the one word to describe 802.11ax. Understanding the technologies that allowed RF engineers to use the 5Ghz spectrum for these new wireless standards.

Part 3 in a series on setup and configuring your wireless systems. Understanding poor wireless performance in homes. Learn about power output, RF frequency and RF loss and why these are so important. How to do a wireless survey yourself. What are good signal levels? How to properly place your wireless device in our home.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

Part 1 in a series: Home Wireless: How to properly set up, configure, troubleshoot and establish strong security to your home wireless. A review of wireless standards. Understanding wireless spectrum. Learn how to properly place your wireless device for maximum effect. Wireless heat maps. How to properly purchase a wireless router for different types of homes.

Part 2 in a series teaching proper setup, configuration and troubleshooting wireless devices. We look at "mesh wireless routers", more troubleshooting, items in your home that impact wireless and adjacent channel interference. We also look at wireless items in your home that slow down everyone.

Part 1 in a series on how to protect yourself and your business online. Who is at risk? Use of iPad or Chromebooks as an safe way of moving you and your online work to a safer platform. Why TPM for my PC? Learn to update everything! Do not trust a popup. Password managers are important. Ransomware and online criminals are threats online but with some education, time, and effort you can improve your online safety.

 

Videos that build Skills

 

Part 2 of a series on protecting yourself and your online business. This second session shows the improvements in security available in Windows 10. FIDO2 security keys and Two-factor authentication and why it is so important. Lock down your email, we will show you how. Windows 7 backup on Windows 10!

How secure boot works in Windows 10. Secure boot allows protection from "root-kit" attacks on both clients and servers. Secure provide a trusted path to boot devices. An in-depth look at the technology that allows a validated boot process. Learn about ELAM. A quick look at how Hyper-V supports secure boot.

How Microsoft is implementing TPM technology into Windows security features. Windows Hello for Business, BitLocker, Measured Boot, Virtual Smart Cards and Health Attestation are a few of the technologies that are dependent on TPM.

Videos that build Skills!

 

PM enabled on your motherboard will help against "bootkits", "rootkits", "keystroke harvesting", and many more online attacks against your operating system. We take a deep dive into Trusted Platform Module and explore this secure crypto-processor. TPM 2.0 is the lowest version that you want if you plan to set up TPM. We will look at virtual TPM, Intel's PTT, and how ARM is implementing TPM. We will look at TPM's secure storage, random number generator, cryptographic keys, that make up the components of TPM. Google Chromebooks use this technology to make their operating system much safer to use online.

Beamforming, Wider Channels, Speed, and MIMO are bundled in this new wireless standard that pushes wireless to a new level. Learn why efficiency is the one word to describe 802.11ax. Understanding the technologies that allowed RF engineers to use the 5Ghz spectrum for these new wireless standards.

Part 3 in a series on setup and configuring your wireless systems. Understanding poor wireless performance in homes. Learn about power output, RF frequency and RF loss and why these are so important. How to do a wireless survey yourself. What are good signal levels? How to properly place your wireless device in our home.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

Part 1 in a series: Home Wireless: How to properly set up, configure, troubleshoot and establish strong security to your home wireless. A review of wireless standards. Understanding wireless spectrum. Learn how to properly place your wireless device for maximum effect. Wireless heat maps. How to properly purchase a wireless router for different types of homes.

Part 2 in a series teaching proper setup, configuration and troubleshooting wireless devices. We look at "mesh wireless routers", more troubleshooting, items in your home that impact wireless and adjacent channel interference. We also look at wireless items in your home that slow down everyone.

Part 1 in a series on how to protect yourself and your business online. Who is at risk? Use of iPad or Chromebooks as an safe way of moving you and your online work to a safer platform. Why TPM for my PC? Learn to update everything! Do not trust a popup. Password managers are important. Ransomware and online criminals are threats online but with some education, time, and effort you can improve your online safety.

 

Videos that build Skills

 

Part 2 of a series on protecting yourself and your online business. This second session shows the improvements in security available in Windows 10. FIDO2 security keys and Two-factor authentication and why it is so important. Lock down your email, we will show you how. Windows 7 backup on Windows 10!

How secure boot works in Windows 10. Secure boot allows protection from "root-kit" attacks on both clients and servers. Secure provide a trusted path to boot devices. An in-depth look at the technology that allows a validated boot process. Learn about ELAM. A quick look at how Hyper-V supports secure boot.

How Microsoft is implementing TPM technology into Windows security features. Windows Hello for Business, BitLocker, Measured Boot, Virtual Smart Cards and Health Attestation are a few of the technologies that are dependent on TPM.

Videos that build Skills!

 

TPM enabled on your motherboard will help against "bootkits", "rootkits", "keystroke harvesting", and many more online attacks against your operating system. We take a deep dive into Trusted Platform Module and explore this secure crypto-processor. TPM 2.0 is the lowest version that you want if you plan to set up TPM. We will look at virtual TPM, Intel's PTT, and how ARM is implementing TPM. We will look at TPM's secure storage, random number generator, cryptographic keys, that make up the components of TPM. Google Chromebooks use this technology to make their operating system much safer to use online.

We explore root servers, TLD servers and authoritative servers in the DNS system. We will focus on how resolving name servers work with authoritative name servers. Understanding DNS resolvers, recursive query and iterative query. The role of IANA and ICANN play in maintaining the DNS system. Explore DNS root server operators and how they monitor the health of DNS. What is a zone file and much more.

Cloudflare's DNS IP is: 1.1.1.1 Quad9 https://www.quad9.net/ owns 9.9.9.9

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

Moving from BIOS to new the UEFI is a major technical transition for motherboards. Think of UEFI as a small operating system. We will explore how Windows 10 changes to incorporate UEFI into the operating system boot structure. Why GPT is critical to UEFI and how Microsoft provides the utility to upgrade your disks for UEFI. What is the difference between UEFI and UEFI and CSM enabled? We will look at partitions and how they change moving from CSM to UEFI native mode.

Steps to solve difficult Windows 10 boot and startup failure. We will explore from POST to how Windows boot the operating system. How to solve the different problems that cause boot and startup failure. Understand screen error messages and learn how to use them to point you to the problem. How to use "Startup Repair", "System Restore" and other boot failure tools. Understanding the files critical to boot and where the files can be found on the hard disk.

How to fix many Windows 10 boot failures. How to access advanced Windows 10 troubleshooting tools options "Startup Settings". How to access Windows Recovery, understanding the startup settings, and how to troubleshoot using them. What is a recovery partition and how to use it? How to use the command line or PowerShell to help you get your PC working. Fixing the BCD registry key. The power of Safe Mode.

 

Videos that build Skills

 

A tutorial on how to boot Windows 10 into "startup settings". These menu options are advanced and we show how to navigate them. Safe mode is a critical option allowing you to better understand problems during the startup of your PC and boot problems. We will look at all of the advanced settings for boot your Windows 10 PC

Learn the steps to using Windows Recovery, how to boot a PC/laptop using a DVD or flash drive. Learn how to change the boot order. How to enter the BIOS of your PC to control what boots the device giving you control and allowing a recovery CD or flash drive to help you.

A classroom lecture on understanding concepts of RF signals. Most techs do not realize the incredible small signals that wireless and cell phones use to communicate. Understand the DB measurement that is used by all signal measurements. A look at interference and the number one interference devices in your home. A review of home and business devices that cause interference with both wireless and cell phones. What is RFI? I think you will learn some new concepts!

Classroom Videos that build Skills!

audio and video are less than studio quality

 

A classroom lecture. Understanding the technology of "fast-startup" introduced in Windows 8 and 8.1 and continued into Windows 10. How to reinitialize hardware with an operating systems that uses fast-startup. Understand how hibernation works in new operating systems. Why removing power from your PC is often a solution for many problems. Learn how to troubleshooting both startup and shutdown problems in Windows.

In this how-to video, Diego performs a tear-down and repair of a non-charging Kindle.

In our video descriptions are found links to download video notes and slides
— Techsavvyproductions Team
 

A classroom lecture series. Taking you under the hood of Windows and understanding processes, scheduler, preemptive multitasking, threads, IPC and more. This is critical knowledge you need to understand applications and how to effectively troubleshoot Windows. Jump on board this 5 day series of lectures and learn Windows at a whole new level.

IT professionals must understand Processes, their states, how the scheduler works in a preemptive multitasking OS. This lays the foundation for understanding how to troubleshoot.

2016 lecture series. How do Windows processes impact hardware subsystems? It is key to how many of our tools allow us to analyze problems. We must understand processes and how they affect hardware.

 

Classroom Videos that build Skills

 

What are inside processes? Threads run predominately by application and Windows' DLLs. Virtual memory and the impact of memory starved devices.

Understanding Threads and Handles inside Processes. Using Process Explorer to open and understand the basics of how applications work inside Windows. Threads do the work, handles are resources used by Windows: files, folders, registry keys and graphical objects.

Understanding DLLs in Windows and how they relate to processes.