Protect your Lenovo Server
Search Results – Bison Knowledgebase

🔍 Results for “disable snipping tool”

How to Use the Snipping Tool in Windows

Introduction The Snipping Tool is a built-in utility in Windows that allows users to take screenshots of their screen. Whether you want to capture the entire screen, a specific win…

Disable Snipping Tool & Screen Capture Features in Windows (Technical Guide)

This Knowledge Base article provides a technical, administrator-focused guide for disabling the Snipping Tool and Windows screen capture mechanisms across Windows environments.It c…

GST Offline Tool White Screen Error – Step-by-Step Solution (2025)

If your GST Offline Tool shows a white screen after the "Starting App…" message, and nothing loads, you’re not alone. This guide walks you through a guaranteed solution that works …

Windows 11 Inbuilt Hidden Apps – Useful Tools & Their Usage

Windows 11 comes with many built-in tools that most users never notice. These apps are already installed and can help you fix problems, monitor performance, and manage your PC.No d…

Remote Support Tools Comparison (TeamViewer, AnyDesk, UltraViewer & Alternatives): Pricing, Features, Performance, Pros/Cons, and Security Risks

Remote support tools let an IT technician view/control a user’s computer over the internet to troubleshoot issues, install software, transfer files, and provide real-time assistanc…

Windows Paint (MS Paint): History, Technology, Features, and Modern Alternatives

Windows Paint, commonly known as MS Paint, is a basic raster graphics editor that has been bundled with Microsoft Windows for decades. Despite its simplicity, Paint has played a si…

How to Use Google Admin Toolbox Dig Tool to Verify MX Records and other Records like A Record, NS Record, TXT Record etc.

When configuring Google Workspace email or troubleshooting delivery issues, verifying that your MX records are correctly set up in DNS is essential. Google provides an official and…

How to Permanently Disable Windows Firewall When It Re-Enables Automatically

In some environments, Windows Firewall turns itself back ON automatically even after being manually disabled. This behavior is intentional and driven by Windows security services, …

Windows 11 Keyboard Shortcuts

Introduction Keyboard shortcuts in Windows 11 can greatly enhance your productivity by allowing you to perform tasks quickly without navigating through menus. This guide provides a…

Google Chrome Background Processes and High RAM Usage

This knowledge base article explains how Google Chrome spawns background processes, why they consume excessive RAM and CPU, and how IT administrators can control, restrict, or full…

How to Secure Office Computers – A Practical IT Security Guide

Office computers store sensitive business data such as customer information, financial records, emails, credentials, and intellectual property. A single compromised system can lead…

Digital Marketing in India: Tools & Agencies — Operating Landscape, Registration Norms, Procurement, Compliance, and Claim Guide

Digital marketing has become a core function of modern business strategy, leveraging tools and agencies to drive visibility, leads, conversions, and analytics. This Knowledge Base …

AI Tools in 2026: Types, Benefits, Top Tools by Segment, Key Players, and How to Spot Fraud

AI tools are now a broad market of products that use machine learning (ML) and large language models (LLMs) to generate content, automate workflows, analyze data, and assist decisi…

Windows Server 2019 Security Hardening & Post-RDP Intrusion Remediation

This Knowledge Base article documents a real-world Windows Server 2019 security hardening and incident remediation scenario involving: An attempted RDP intrusion Partial Hy…

How to Disable NVIDIA Photo Mode (Alt+F2) Shortcut and Use It for Tally Prime

If you are a Tally Prime user and find that pressing Alt + F2 opens Photo Mode instead of changing the period in Tally, you are not alone. This issue is caused by NVIDIA GeForce Ex…

Windows Key Mapping & Remapping Apps (Windows 10/11): Tools, Use Cases, and Safe Implementation

Key mapping (also called key remapping) is the process of changing what a key (or key combination) does in Windows. Typical scenarios include replacing a faulty key, swapping commo…

Automated Software Installation Control on Windows Server 2019 Using AppLocker, SRP, and PowerShell

In production server environments—especially accounting, ERP, database, and application servers—unauthorized software installation is one of the leading causes of malware infection…

Cyber Security in India: Compliance & Threat-Defense Tools, Key Vendors, Registration Norms, and GST/Procurement Claim Process

Cyber security tooling for businesses in India generally falls into two buckets: Threat-defense tools (prevent/detect/respond): EDR/XDR, SIEM/SOAR, IAM/PAM, WAF, email security,…

How to Install Windows 11 Using a USB Drive or ISO File – Complete Step-By-Step Guide

Installing Windows 11 is easier than ever, whether you choose a bootable USB drive or install directly from an ISO file. This guide will walk you through both methods with the syst…

Lightshot: What It Is, Its Features, How to Use It & Why It’s Useful

Lightshot is a lightweight, efficient screen-capture tool available for Windows, macOS and as browser extensions (Chrome, Firefox, etc.).  It allows users to select an area o…

How to Change or Remove Microsoft 365 Multi-Factor Authentication (MFA) / Authenticator Settings for Any User from Admin Center

Multi-Factor Authentication (MFA), also known as 2-Step Verification or Two-Factor Authentication (2FA), is an important security layer in Microsoft 365 (Office 365). However, sit…

Create One Ultimate Windows Bootable USB in 2026 to Fix Almost Any PC Issue Using WinPE 10/11 Sergei Strelec – All-in-One Rescue Environment

In modern IT support and system administration, having a single, reliable bootable USB that can troubleshoot, repair, recover, and maintain Windows systems is essential. Hardware f…

Google Meet: What It Is, Its Benefits, Techniques & How to Use It Effectively

Google Meet is a video-conferencing and communication platform developed by Google that enables individuals and organisations to hold virtual meetings, share screens, collaborate i…

How to Completely Uninstall Microsoft OneDrive When Standard Methods Fail (Windows)

In some Windows environments, Microsoft OneDrive fails to uninstall using standard methods such as Apps & Features, Control Panel, or command-line tools. This commonly happens …

High CPU/GPU Usage and Fan Noise When Using ChatGPT in Google Chrome on Gaming Laptops (Windows 10/11)

This Knowledge Base article explains the root causes, behavior, and remediation steps for excessive CPU/GPU usage, high fan speed, thermal spikes, and system sluggishness observed …

NIC Speed Lock & Continuous Monitoring on Windows Server (PowerShell Guide)

Network performance issues such as unexpected NIC speed fallback (1 Gbps → 100 Mbps) are common in enterprise and SMB environments. These issues often arise from cabling problems, …

5 Key Tips to Make Your Cell Phone Battery Last Longer – A Practical Technical Guide

Smartphone battery life directly impacts productivity, communication, and reliability—especially for users who depend on their phones for work, navigation, payments, and authentica…

Windows 11 Running Slow? Safe Windows Services You Can Stop Without Breaking Your System

Windows 11 comes with a wide range of background services designed to support system features, hardware compatibility, security, and user experience. However, many systems—especial…

BlueScreenView by NirSoft — Windows BSOD Crash Analysis Utility (Professional Knowledge Base Article)

BlueScreenView is a free, lightweight diagnostic utility developed by NirSoft for Windows systems. It scans and displays detailed information from minidump crash files created when…

Google Chat: What It Is, Its Benefits, Techniques & How To Use It Effectively

Google Chat is a cloud-based messaging and collaboration platform developed by Google that enables teams and individuals to communicate, share files, coordinate projects and collab…

How to Sync Google Workspace CardDAV Contacts with Microsoft Outlook (Address Book)

Microsoft Outlook is a powerful email and calendar application used by millions, but it lacks built-in support for CardDAV—the standard protocol used to sync contact data from serv…

Send Anywhere and Similar File-Sharing Apps/Websites: Features, Benefits, Pros & Cons (Knowledge Base)

File sharing tools like Send Anywhere solve a common IT problem: moving files quickly between devices and people—often across different platforms (Windows/macOS/Android/iOS)—withou…

Computer Keyboard Technologies, Features, and Shortcut Commands for Daily Productivity and Gaming

The computer keyboard is a primary input device for text entry, navigation, and command execution. Modern keyboards integrate advanced switch technologies, layouts, connectivity op…

How to Fix "Windows cannot find. Make sure you typed the name correctly" Error on Windows 11

The "Windows cannot find. Make sure you typed the name correctly" error can occur in Windows 11 for various reasons, such as corrupted system files, incorrect file paths, or missin…

Google Chrome Not Showing Latest Website Content – Cache, DNS, and Browser Behavior Explained

This Knowledge Base article explains why Google Chrome displays outdated or old versions of a website instead of the latest deployed content. It covers browser caching, DNS resolu…

Tally Slow or Not Responding Due to Network Card Not Negotiating Gigabit Speed (10/100 Mbps Issue)

In multi-user Tally Prime / Tally ERP environments where both Tally License and Data reside on a central server, network performance plays a critical role. A very common yet often …

How to Safely Remove the Hyper-V Folder from C:\Program Files on Windows

After disabling or uninstalling Hyper-V on Windows, administrators often discover that the folder C:\Program Files\Hyper-V cannot be deleted, even with administrative privileges. …

Website Downloaders (Offline Website Makers): Complete Technical Guide

Website downloaders, also known as offline website makers, are tools that copy web content (HTML, CSS, JavaScript, images, media, and sometimes server-rendered pages) from a live w…

CAD/CAM Software Systems: History, Architecture, Key Platforms, and Future Direction

CAD/CAM software forms the digital backbone of modern engineering, manufacturing, and product development. CAD (Computer-Aided Design) focuses on creating precise digital models, w…

Google Gemini: What It Is, Benefits, Techniques & How to Use It Effectively

Google Gemini is a powerful generative-AI assistant from Google (via Google DeepMind) designed to help with writing, planning, creative work, research, coding, and much more. …

Google Calendar: What It Is, Its Benefits, Techniques & How to Use It to Organize Your Time

Google Calendar is a time-management and scheduling service developed by Google that allows users to create, manage and share events and appointments through a web interface and mo…

How to Register Your DSC: Step-by-Step Guide

Digital Signature Certificates (DSC) play a crucial role in ensuring secure online transactions and e-filing, especially for GST compliance in India. This guide outlines the steps …

MX Lookup

Introduction MX Lookup is a tool used to query and retrieve Mail Exchange (MX) records associated with a domain. MX records are DNS records that specify the mail servers responsibl…

How to Create a Windows 11 Bootable USB Drive (Step-by-Step Guide)

To create a Windows 11 bootable USB drive, follow these steps: Step 1: Download the Windows 11 ISO Go to the Microsoft website. Scroll down to Download Windows 11 Disk Image (ISO)…

TallyPrime Developer – Comprehensive Development Suite for TDL Customization

TallyPrime Developer is a comprehensive development suite designed to enable TDL (Tally Definition Language) programmers to develop, customize, test, and deploy solutions for Tally…

Information Technology Data Security: Implementing a Defense-in-Depth Strategy to Protect Enterprise Systems

Data security is a core responsibility of modern Information Technology teams. With increasing cloud adoption, remote work, and regulatory pressure, organizations must protect sens…

How to Stop the Cost Allocation Screen for Round Off Entries in Tally Prime

Sometimes in Tally Prime, you may see a screen asking you to allocate a small amount like ₹0.45 to a cost centre.If you do not use Cost Centres for Round Off values, this screen ca…

Windows System Freezes with Sudden Fan Spike on NVMe SSD Systems (CPU Thermal Throttling Diagnosis & Fix)

This Knowledge Base article addresses a common but often misdiagnosed issue on modern Windows systems with NVMe SSDs, where the system temporarily hangs or becomes unresponsive, th…

PHP-Based Sitemap.xml Implementation for SEO-Optimized Websites

A sitemap is a critical component of modern website SEO. It provides search engines with a structured list of URLs that should be crawled and indexed. While static sitemap.xml file…

Enforcing Email-Client-Only Access in Google Workspace Using App Passwords (No User Passwords)

Some organizations want to strictly prevent users from accessing Google Workspace accounts via browsers (Gmail web, Google login, Drive, etc.) and force email usage only through de…