A. With Windows XP Remote Assistance, there was an unsupported method where some files in the PC Health folder were replaced that allowed an unsolicited Remote Assist to be performed without the user being prompted (and, therefore, was not aware of it). This isn't possible with Windows 7 and an alternate method would be required based on the exact requirements.

A: No manual changes are required when installing to an SSD. The OS will detect the presence of the SSD and automatically make changes, such as disabling automatic defragmentation jobs. You can make some tweaks for maximum performance:

A: The Microsoft Outlook implementations of IMAP have always seemed to have some imperfections that are cause for annoyance. The latest problem has been the lack of a new mail envelope in the system tray when new messages arrive in IMAP accounts.

A: If you navigate to c:\Users\<your user>, you'll see several folders that have shortcut icons on them, such as Start menu. If you try to access it, you'll get an Access Denied message. The problem is that you're accessing it the wrong way. Instead, go to C:\Users\<your username>\AppData\Roaming\Microsoft\Windows, where you'll find the real Start menu and several other shortcut folders that you also couldn't access the other way.

A. Even if your DCs are running Windows Server 2003, you can still access all the Group Policy functionality available for Windows 7 clients by making sure to edit the Group Policy objects from a Windows 7 or Server 2008 R2 machine.

A. RSAT for Windows 7 SP1 is available from Microsoft's site . It adds support for management of the new features in Windows Server 2008 R2, including Hyper-V dynamic memory and RemoteFX.

Microsoft introduced User Account Control (UAC) in Windows Server 2008 and Windows Vista to prevent unauthorized computer changes. As a result, application developers need to include a manifest that identifies the privilege level that an application needs to run under. When that application runs, UAC displays a dialog box either asking for consent to continue (if the user has the necessary privileges) or for elevated credentials (if the user doesn’t have the necessary privileges).