Most operating systems can be grouped into two different families. Aside from Microsoft’s Windows NT-based operating systems, nearly everything else traces its heritage back to Unix.
HTTPS, which uses SSL, provides identity verification and security, so you know you’re connected to the correct website and no one can eavesdrop on you. That’s the theory, anyway. In practice, SSL on the web is kind of a mess.
Microsoft has been called late to the party for not offering Microsoft Office for the iPad, other tablets, and smartphones. The truth is, Microsoft does make quite a few different versions of Office for mobile devices, although they aren’t full versions of Office.
There are two types of mixed content — one is worse than the other, but neither is good. Mixed content warnings are in indication that something is wrong with a web page you’re visiting.
HTTPS, the lock icon in the address bar, an encrypted website connection — it’s known as many things. Knowing what it means is important, as it has serious implications banking online, shopping, and avoiding phishing.
Have you ever noticed that it’s C:\Windows\ in Windows, http://howtogeek.com/ on the web, and /home/user/ on Linux, OS X, and Android? Windows uses backslashes for paths, while everything else seems to use forward slashes.
Many people say they use Hibernate instead of Sleep mode because Hibernate draws no power. Unfortunately, when it comes to desktop PCs, they’re wrong. Desktop PCs still use some power even while they’re shut down.
You’re playing a game and you Alt+Tab to use another program, but there’s a problem. The Alt+Tab process may be extremely slow, the game may crash or freeze, or you may see graphical corruption.
Can you not see your laptop’s screen in a bright room, or do you think the colors on your desktop computer’s display look dull and lifeless? Maybe you chose the wrong type of display coating.
Windows has quite a few features for automatically arranging windows, placing them side by side or tiling them on your screen. These features are a bit hidden, so you may not have noticed them.
When you don’t have unlimited mobile data on your Android or iPhone, every megabyte counts. Mobile browsers like Google Chrome and Opera offer a built in data compression feature, allowing you to browse with less data.
There is a huge number of antivirus programs to choose from, so how do you find the best one? Do you use what came with your computer or what your friend recommended? How do you know if it’s any good?
Many computer users were trained never to turn their PCs off by pressing the power button on their desktop PC’s case. This used to cause problems in the previous millennium, but it’s now perfectly safe to shut down with the power button.
Apple sells Apple Remote Desktop on the Mac App Store for $80, but you don’t have to spend any money to remotely connect to your Mac. There are free solutions — including one built into your Mac.
Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of the document.
Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed.
The Mission Control feature in Mac OS X allows you to arrange windows into several different screens you can quickly switch between. This feature was formerly known as Spaces, and is called virtual desktops or workspaces on Linux.
Not all Wi-Fi networks are created equal. Wi-Fi access points can function in either “ad-hoc” or “infrastructure” mode, and many WI-Fi-enabled devices can only connect to infrastructure-mode networks, not ad-hoc ones.
A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
Windows 8′s desktop hasn’t seen many improvements for touch use, but even 8-inch Windows tablets have a desktop. If you have to use the desktop with your finger, these tips will help you avoid frustration.
Spam seems to arrive in every single email account we use, no matter how careful we are. How are spammers getting all our email addresses? And can we do anything to hide our email address from spammers?