Windows system restore tutorial

Most Relevant Content

  • Create System Restore Point in Windows OS

    System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect his/her system from fully dead. But you have to configure system restore in windows operating system before getting this advantage. So, if you are a windows user and you do not configure system restore in your operating system yet, keep reading the rest of this article where I will show you how to configure and create system restore point in windows 7, windows 8 and windows 10 properly. How to Configure System Restore Point in Windows OS By default System Restore is not configured in windows operating system at first installation. But intelligently windows can configure and start system restore in C drive or system drive later if you not configure it manually. So, it is better to configure and [...]

    READ MORE »

  • More Similar Content

  • »

    System Restore in Windows 10 |   August 30, 2015

    Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]

    READ MORE »

  • You May Also Like

  • »

    How to Bind Hotspot User to MAC and Static IP in MikroTik |   November 6, 2020

    MikroTik Hotspot is usually a user based Hotspot access controlling system. Internet access and bandwidth can easily be maintained with Hotspot user based system. But sometimes we may require more control on Hotspot system which is not possible only username based system. So, we may need to bind hotspot user to MAC and static IP address. If we can bind hotspot user to static IP address, it is easy to control Hotspot users with MikroTik Router and Firewall. So, in [...]

    READ MORE »

  • »

    How to Recover MikroTik User Password |   August 9, 2018

    MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]

    READ MORE »

  • »

    MikroTik OpenVPN Setup with Windows Client |   April 2, 2018

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. MikroTik OpenVPN Server provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. OpenVPN uses SSL Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across [...]

    READ MORE »

  • »

    MikroTik EoIP Tunnel for Bridging LANs over the Internet |   April 22, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]

    READ MORE »

  • »

    MikroTik Dual WAN Load Balancing with Failover using PCC |   May 27, 2018

    Hi geek, going through this article means you are finding Load Balancing as well as Link Redundancy solution for your MikroTik network because you already have multiple WAN connections or you are planning to lease multiple WAN connections. MikroTik has various Load Balancing and Link Redundancy methods such as ECMP, PCC and so on. ECMP method provides an easy configurable load balancing with failover solution but it has some known issues too in a large network. On the hand, PCC [...]

    READ MORE »

  • »

    ISP Bandwidth Management with MikroTik PCQ |   June 25, 2016

    MikroTik is an excellent router for managing ISP Bandwidth. For this, most of the ISPs are now using MikroTik Router for managing client bandwidth. The service used to manage bandwidth in MikroTik RouterOS is QUEUE. There are various types of queue services in MikroTik Router for managing internet bandwidth. Among these, PCQ can specially be used for maintaining ISP bandwidth. In this article, we will see how to manage ISP Bandwidth with MikroTik PCQ. MikroTik PCQ Service PCQ stands for [...]

    READ MORE »

  • »

    MikroTik Site to Site SSTP VPN Setup with RouterOS Client |   May 14, 2020

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]

    READ MORE »

  • »

    Securing MikroTik Router with Port Knocking |   March 21, 2021

    MikroTik Port Knocking strategy helps to protect MikroTik Router from hackers and unauthorized access as well as enhances MikroTik RouterOS security.

    READ MORE »