Keyboard shortcuts are essential on any device with a hardware keyboard, whether you’re using a Windows PC, Linux system, Mac, or even a Chromebook. Chrome OS and other operating systems share quite a few shortcuts, but many are unique to Chrome OS.
QWERTY — so-called because the letters at the top-left corner of the keyboard begin with QWERTY — is the most common keyboard layout. But some people think alternative keyboard layouts like Dvorak and Colemak are faster and more efficient.
Boot Camp can be annoying. Both Windows and Mac OS X can see each other’s files, but they can’t write to the other operating system’s partition.
This is Microsoft’s attempt to give Windows 8 and 8.1 the “always-on” state people get from iPads, Android tablets, and smartphones. A PC with Connected Standby can’t use other power-management states like Sleep and Hibernate.
Windows software downloads are a mess. Many programs try to drag adware and other malicious junk onto your computer. Even safe programs we test sometimes turn to the dark side and start bundling junk later.
Troubleshooting a Mac is different from troubleshooting a PC, but not all that different. Use your Mac’s built-in startup options to test your hardware, boot in safe mode, reinstall Mac OS X, and perform other system tasks.
Routers are basically little computers. By default, they run a manufacture-provided operating system, or firmware, to route network traffic and provide you with various settings and features. But you can often replace this firmware.
Android may be based on Linux, but it’s not based on the type of Linux system you may have used on your PC. You can’t run Android apps on typical Linux distributions and you can’t run the Linux programs you’re familiar with on Android.
Chrome is gradually becoming more of a platform, and some of the best features of Android are making their way to Windows. With voice search and Google Now support, Google beat Microsoft’s own Cortana service to Windows.
Consumer PCs didn’t always run Windows. Before Windows arrived, PCs came with Microsoft’s MS-DOS operating system. Here’s what the command-line environment was actually like to use.
Have you heard? Antivirus software is dead — at least according to Symantec, maker of Norton Antivirus. But they’re still making Norton Antivirus and want to sell it to you, so what does this statement even mean?
Keyboard shortcuts are essential for being productive on any device with a keyboard, whether it’s a Windows PC or a Mac. Use these keyboard shortcuts to get around your Mac more quickly.
Yes, some Android apps can be malicious — Apple, Microsoft, and the media seem happy to remind us about this. Take a few basic precautions and you can avoid these potentially dangerous apps.
Browser extensions are pieces of code that run in your web browser. They can do malicious things like display ads, track your browsing, and capture your passwords and private data. A safe extension could automatically update and become malware.
Windows 8.1 and 8 brought big changes to Windows. Even the process of logging in and setting up user accounts is extremely different, with new types of user accounts and login options.
Web browsers are gaining more and more features websites can use, and with them come permission options. Your web browser has a variety of permissions you can apply to individual websites, restricting them in various ways.
Remote desktop software allows you to access your computer from another room or halfway around the world. You can also share your desktop with someone temporarily — ideal for remote tech support.
Portable applications allow you to move between computers, taking your applications and their settings with you on a USB stick. Portable VirtualBox allows you to create portable operating systems and run them on any PC.
Some Windows tablets have as little as 32 GB of internal storage, and future ones may only have 16 GB! This is extremely cramped for a large Windows system, so you’ll want to make the most of the little space available to you.
With so much concern about government surveillance, corporate espionage, and everyday identity theft, it may seem surprising that so few people use encrypted email messages. Try using encrypted email and you’ll find it to be difficult and complicated to use.
Some Internet service providers have harsh restrictions on the amount of bandwidth you can use in a month, charging you extra if you go over your bandwidth cap. Other ISPs restrict traffic at certain hours — for example, offering unlimited bandwidth only at night.
Building your own computer is actually pretty simple. Don’t be afraid to dive right in — all you’ll need is a screwdriver, patience, and the ability to follow simple instructions.
Most computers ship with a single operating system, but you can have multiple operating systems installed on a single PC. Having two operating systems installed — and choosing between them at boot time — is known as “dual-booting.”