Have you ever noticed that it’s C:\Windows\ in Windows, http://howtogeek.com/ on the web, and /home/user/ on Linux, OS X, and Android? Windows uses backslashes for paths, while everything else seems to use forward slashes.
Many people say they use Hibernate instead of Sleep mode because Hibernate draws no power. Unfortunately, when it comes to desktop PCs, they’re wrong. Desktop PCs still use some power even while they’re shut down.
You’re playing a game and you Alt+Tab to use another program, but there’s a problem. The Alt+Tab process may be extremely slow, the game may crash or freeze, or you may see graphical corruption.
Can you not see your laptop’s screen in a bright room, or do you think the colors on your desktop computer’s display look dull and lifeless? Maybe you chose the wrong type of display coating.
Windows has quite a few features for automatically arranging windows, placing them side by side or tiling them on your screen. These features are a bit hidden, so you may not have noticed them.
When you don’t have unlimited mobile data on your Android or iPhone, every megabyte counts. Mobile browsers like Google Chrome and Opera offer a built in data compression feature, allowing you to browse with less data.
There is a huge number of antivirus programs to choose from, so how do you find the best one? Do you use what came with your computer or what your friend recommended? How do you know if it’s any good?
Many computer users were trained never to turn their PCs off by pressing the power button on their desktop PC’s case. This used to cause problems in the previous millennium, but it’s now perfectly safe to shut down with the power button.
Apple sells Apple Remote Desktop on the Mac App Store for $80, but you don’t have to spend any money to remotely connect to your Mac. There are free solutions — including one built into your Mac.
Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of the document.
Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed.
The Mission Control feature in Mac OS X allows you to arrange windows into several different screens you can quickly switch between. This feature was formerly known as Spaces, and is called virtual desktops or workspaces on Linux.
Not all Wi-Fi networks are created equal. Wi-Fi access points can function in either “ad-hoc” or “infrastructure” mode, and many WI-Fi-enabled devices can only connect to infrastructure-mode networks, not ad-hoc ones.
A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
Windows 8’s desktop hasn’t seen many improvements for touch use, but even 8-inch Windows tablets have a desktop. If you have to use the desktop with your finger, these tips will help you avoid frustration.
Spam seems to arrive in every single email account we use, no matter how careful we are. How are spammers getting all our email addresses? And can we do anything to hide our email address from spammers?
Many laptops now include a combined headphone and microphone jack instead of two separate audio jacks. This trend started with smartphones and tablets, but has spread to MacBooks, ultrabooks, and convertibles like Microsoft’s Surface Pro.
Intel x86 or x64 processors have traditionally been found in laptops and desktops, while ARM processors have been found in lower-power embedded devices, smartphones, and tablets. But you can now buy laptops with ARM chips and smartphones with Intel chips.
Are you having a problem with your Internet connection or Wi-Fi? Whatever the problem — from a flaky connection to Wi-Fi troubles or even no access to the Internet at all — some router troubleshooting could fix things.
Malware isn’t the only online threat to worry about. Social engineering is a huge threat, and it can hit you on any operating system. In fact, social engineering can also occur over the phone and in face-to-face situations.
A false positive is a mistake that happens occasionally — the antivirus thinks a download is harmful when it’s actually safe. But malicious people may try to trick you into downloading malware with this assurance.