If you haven’t upgraded to a new wireless router in a few years, you might want to seriously consider it. That old router may still be working, but newer ones will give you better Wi-Fi.
Most cell phones sold in North America — especially on contract — are “locked” to a particular cellular carrier. They can only be used on that carrier’s network, so you can’t switch to another carrier without “unlocking” it first.
Crouton is the best way to run Linux alongside Chrome OS on your Chromebook. Now it’s even better — you can run that Linux desktop in a browser tab.
For additional security, you can require a time-based authentication token as well as a password to log into your Linux PC. This solution uses Google Authenticator and other TOTP apps.
AirDrop allows you to quickly and easily send links, photos, files, and more content between nearby iPhones, iPads, and Macs. Just open up the Share panel and tap a nearby device.
There’s a dedicated community of browser users who consider a vertical tab bar, or tree-style tabs, to be an essential feature. If you use a large number of browser tabs, this can be a lifesaver.
NAS stands for “Network-Attached Storage.” Basically, it’s a way to attach a hard drive to your network and make it accessible to all your devices for centralized file-sharing and backups.
Linux newbies have probably heard a lot about Ubuntu, but it isn’t the only Linux distribution. In fact, Ubuntu’s standard Unity desktop is still controversial among long-time Linux users today.
We’ve been banging on about the horrific and broken Windows software ecosystem for a long time now. Rather than installing applications from Download.com and every other freeware site, you should just switch to Linux if you want to download freeware safely.
iPhones come with a cable that can connect your phone to your PC or Mac, but you don’t actually have to use it for that. You don’t even have to use the cable for charging if you buy into wireless charging (or just get a dock).
We were supposed to be living in a wireless future, but we’re not quite there yet. Still, many things we do with cables don’t actually require cables anymore — you can go wire-free with just a few tweaks.
Windows, Mac OS X, and most Linux desktops have built-in tools for quickly renaming multiple files. Use a batch-rename tool rather than fixing them one by one.
Mirroring your laptop or desktop PC’s display on your TV is actually pretty simple, assuming you know what you’re doing. There are several ways to do this, both wired and wirelessly.
The big push for consumer 3D TVs is mostly over, and most manufacturers are pushing other technologies like 4K, quantum dot, and even questionable curved displays. But 3D TV could yet make a comeback — maybe.
Well, it’s noon and your phone’s battery is already at 37 percent. There are ways to avert this disaster, adding more battery capacity to your favorite smartphone.
Point-and-shoot cameras have gone the way of the dodo. Sure, expert photographers may turn to DSLR cameras, but most of us are just getting by with the camera on our smartphone.
To make things even more confusing, manufacturers often don’t call this feature “HDMI-CEC”. Like with Miracast, every manufacturer wants to call it their own branded name, even though it’s an interoperable standard.
Wearables were everywhere at CES 2015, which is no surprise — even “normal people” are already walking around with activity-tracking bands. An avalanche of wearable products is coming your way.
CES 2015 was packed with different virtual reality headsets, and it feels like we’ve been on the cusp of consumer VR for years. Oculus Rift hasn’t released their consumer version yet, and other companies are trying to beat them to market.
Curved TVs were everywhere at CES 2015. We’re not exaggerating: Almost all the TVs being shown off were curved instead of flat! But what’s the advantage of a curved TV, anyway?
You’re guaranteed to stumble into an occasional error page while browsing the web. This guide will help you understand exactly what each error page means and what to do when you see them.
DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.