That will wipe everything, and when you restart Firefox, it’ll create a new Mozilla folder.

If you aren’t able to find the Application Data folder, it is probably because it is hidden. To make it visible, open up a folder and go to Tools->Folder Options->View.

Click on Show hidden files and folders and click OK. Then go back to step 1 and complete the process.

This method is only effective against casual privacy intrusions by nosey friends or parents. The data can still be retrieved through more sophisticated methods. More »

Windows Management Instrumentation (WMI) is a key part of the Windows 7 operating system. It is used to gather system statistics, monitor system health, and manage system components. To work properly, WMI relies on the WMI service. This service must be running and properly configured for your environment.

You control the configuration of the WMI service through WMI Control, which can be accessed on a local or remote system by using the following steps:

1. Click Start, type administrative tools, and hit Enter.

2. Then click Computer Management.

3. To connect to a remote computer, right-click Computer Management in the console tree and then select Connect To Another Computer. You can now choose the system that has the services you want to manage, provided you have the proper administrative privileges. More »

Whether you’re dealing with users in your work environment or kids at home, being able to control what applications a user can use can prevent a lot of hassle and headaches. Windows 7 includes a new tool, called AppLocker, that lets you do just this by creating a policy to specify exactly what applications a user is allowed to run.

To access this feature, click start and enter Gpedit.msc. Then navigate to Computer Configuration | Windows Settings | Security Settings | Application Control Policies. Expand the Application Control Policies node and highlight AppLocker.

Here you can configure Executable Rules, Windows Installer Rules, and Script Rules. For example, highlight the Executable Rules node and right-click to select Create New Rule. You can then create a rule allowing or denying access to an executable based on such criteria as the file path or publisher.

And in case you’re in a hurry, AppLocker will let you apply default or automatic rules. There are a lot of options exposed in AppLocker—too many to cover in a short tip—so you’ll have to play around with it some to get a better idea of just how much this tool can do. More »

It’s time once again for another episode of our Windows XP optimization series. In the past few months, you’ve seen tweaks that helped you change the Start Menu, Desktop, Display Properties, Control Panel, Folder Options, and so on. Most optimizations could not be made the old-fashioned way (from the Control Panel or any other native Windows configuration utility). As you might have guessed already from the title, this article isn’t any different: today, you’ll find out how you can easily customize the way your Internet Options window looks. So, if, for one reason or another, you need to remove a few tabs from Internet Options and have no idea how to go about in order to accomplish this, you’ve come to the right place.

If this is your first encounter with the Microsoft Windows XP registry tweaks saga, here’s a quick tour on all the highlights: we provide an absolutely free, easy tutorial on how to activate hidden tweaks inside your XP operating system, just by using good-old Notepad. You can start by reading the first article that not only provides a full insight into the highlights, but clearly specifies the few steps that must be taken before heading on. More »

The Security Compliance Management Toolkit series builds on previous Solution Accelerators to provide you with expanded best practices and additional automation tools to help configure and deploy security settings for the following operating systems and applications: Windows Server 2008, Windows Server 2003 Service Pack 2 (SP2), Windows Vista SP1, Windows XP Professional SP3, and 2007 Microsoft Office SP1.

After deploying the security settings, you can verify the accuracy of the setting policies and monitor policy changes by applying one or more of 26 Configuration Packs using the desired configuration management (DCM) feature of Microsoft System Center Configuration Manager 2007 SP1. This series includes the following toolkits:

  • Windows Server 2008 Security Compliance Management Toolkit
  • Windows Server 2003 Security Compliance Management Toolkit
  • Windows Vista Security Compliance Management Toolkit
  • Windows XP Security Compliance Management Toolkit
  • 2007 Microsoft Office Security Compliance Management Toolkit More »