How to configure system restore point

Most Relevant Content

  • Create System Restore Point in Windows OS

    System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect his/her system from fully dead. But you have to configure system restore in windows operating system before getting this advantage. So, if you are a windows user and you do not configure system restore in your operating system yet, keep reading the rest of this article where I will show you how to configure and create system restore point in windows 7, windows 8 and windows 10 properly. How to Configure System Restore Point in Windows OS By default System Restore is not configured in windows operating system at first installation. But intelligently windows can configure and start system restore in C drive or system drive later if you not configure it manually. So, it is better to configure and [...]

    READ MORE »

  • More Similar Content

  • »

    System Restore in Windows 10 |   August 30, 2015

    Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik RADIUS Server (User Manager) Installation |   October 28, 2017

    RADIUS Server is a centralized user authentication, authorization and accounting application. RADIUS authentication gives the ISP or network administrator ability to manage PPP users, login users and Hotspot users from one server throughout a large network. MikroTik RouterOS has a RADIUS client that is able to authenticate login users, Hotspot users and PPP users through a RADIUS server. MikroTik team also developed a totally separate RADIUS server package named User Manager that can be used to authenticate MikroTik users smoothly. [...]

    READ MORE »

  • »

    How to Mount USB Device in CentOS 7 (NTFS and Linux FS) |   February 18, 2019

    USB Hard Disk Drive or USB Flash Drive (Pen drive) is a popular external device that can be used to backup data or transfer data from one device to other device. In GUI (Graphical User Interface) Operating System such as Window or GNOME Desktop in Linux can automatically mount USB device and can show data in it if the File System of that device is supported. But all users do not like or always do not have GUI mode of [...]

    READ MORE »

  • »

    Web Server Configuration in Linux with Apache, MariaDB and PHP |   January 2, 2018

    Web Server is one of the most important and most used servers today. Without web server internet cannot imagine. Even, the article you are reading is also served by a web server. So, having web server configuration knowledge is beneficial for you, I think. A web server is responsible to serve HTTP (Hypertext Transfer Protocol) contents such as text, image, audio, video etc. to its clients. A lot of web servers are present today such as Apache, IIS, Nginx and [...]

    READ MORE »

  • »

    How to Install Extra Packages in MikroTik RouterOS |   October 10, 2019

    MikroTik RouterOS does not always include all the packages those are developed by MikroTik team. So, sometimes you may find that some packages are missing in your RouterOS such as NTP package, DUDE package, Wireless package, CAPsMAN package and so on. Specially, user manager package which is totally a separate MikroTik RADIUS package used to manage user authentication, authorization and accounting is always missing. Also upgrading RouterOS or downgrading RouterOS you may find that some packages are missing there. So, [...]

    READ MORE »

  • »

    MikroTik Router Static DHCP Server Configuration |   October 25, 2015

    DHCP Server assigns IP address and other related IP information (Subnet mask, Gateway and DNS) automatically to network devices. But automatic DHCP Server has some disadvantages too. If any IP device connects to any automatic DHCP network, the device will get an IP address and related IP information automatically by the DHCP Server and the device will start to use resources of this network. In this situation, the network administrator cannot know who is being connected to the network and [...]

    READ MORE »

  • »

    MikroTik EoIP Tunnel for Bridging LANs over the Internet |   April 22, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]

    READ MORE »

  • »

    Restrict Internet Access Based on MAC Address in MikroTik |   February 4, 2017

    MikroTik router has a lot of features by which a network administrator can design his network as he likes. As a network administrator, sometimes you may need to allow internet access some specific devices. If other devices try to access internet, they will be rejected by your router. For example, say, you have configured a simple network like below diagram. In this network, you have configured WAN, LAN, Gateway, DNS and NAT. Also you have created queue rules for limiting [...]

    READ MORE »

  • »

    MikroTik HotSpot One to One NAT/Universal HotSpot NAT |   September 27, 2020

    MikroTik Hotspot is an awesome service that can be customized widely. When MikroTik Hotspot is enabled on an interface, it adds dynamic destination NAT rules which will redirect all HTTP and HTTPS requests from unauthorized users to the Hotspot authentication proxy. So, no user can get internet access in Hotspot network without authentication. MikroTik Hotspot also uses one to one NAT providing an IP address from selected IP Pool and this IP address handles user’s data and limitation. Sometimes we [...]

    READ MORE »