Laptop manufacturers have a choice – they can include onboard graphics for better battery life or discrete graphics hardware for better gaming performance. But wouldn’t it be great if a laptop could have both and intelligently switch between them?
Most of our browser data isn’t too important – cookies expire and histories are cleared. However, bookmarks are different, which is why browsers allow you to import and export your bookmarks – ideal for creating backups and migrating between browsers.
Windows has the built-in ability to function as VPN server, although this option is hidden. This trick works on both Windows 7 and Windows 8. The server uses the point-to-point tunneling protocol (PPTP.)
Windows 8 shows desktop application shortcuts on its Start screen, but these shortcuts look out of place in the new, tile-based interface. However, there is a way to spruce up your Start screen with detailed tile icons for your desktop applications.
A graphics driver is the software that allow your operating system and programs to use your computer’s graphics hardware. If you play PC games, you should keep your computer’s graphics drivers updated to get the best performance out of your hardware.
Compared to a PC, phones and tablets are fairly locked-down devices. Jailbreaking, rooting, and unlocking are all ways of bypassing their limitations, and doing things that manufacturers and carriers don’t want you to do.
Email viruses are real, but computers aren’t infected just by opening emails anymore. Just opening an email to view it is safe – although attachments can still be dangerous to open.
Believe it or not, there are antivirus programs targeted at desktop Linux users. If you have just switched to Linux and started looking for an antivirus solution, don’t bother – you do not need an antivirus program on Linux.
If you are regularly seeing the “Whoa! Google Chrome has crashed” message, there is likely a problem on your system. An occasional crash can happen, but regular crashes are probably caused by something you can fix.
Windows 8’s lock screen is very at home on a tablet, but it can also be used on laptops and desktops. The lock screen is not just a background image – it contains widgets that display quick notifications.
Hard drives use S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) to gauge their own reliability and determine if they’re failing. You can view your hard drive’s S.M.A.R.T. data and see if it has started to develop problems.
If Windows won’t boot, recovering your files can be a headache. You do not have to pull the hard drive or use a Linux live CD – you can use a Windows installer disc to quickly back up your files.
Windows Live Messenger – formerly MSN Messenger – is set to shut down on March 15, 2013. Microsoft is replacing it with Skype and migrating Windows Live IDs (now known as Microsoft accounts) to Skype.
Windows 8’s lock screen is at home on a tablet, but it just adds an additional key press to the login process on a desktop or laptop. You can disable the lock screen with a quick registry hack.
For years, Java has been the top source of browser exploits. Even after a recent emergency patch, Java is still vulnerable. To protect ourselves, we should assume that Java is always going to be vulnerable.
Windows 8 encourages you to set up a separate user account for everyone who uses the computer. However, you might want to buy an app – such as Angry Birds – and allow other people to use it.
Google’s Chrome Web Store offers a variety of themes for Chrome, which include background images for your new tab page and custom colors. Even better — you can create your own theme in just a few minutes.
Traceroute is a command-line tool included with Windows and other operating systems. Along with the ping command, it’s an important tool for understanding Internet connection problems, including packet loss and high latency.
Modern-style apps in Windows 8 need a screen resolution of at least 1024×768. Unfortunately, many netbooks have a 1024×600 resolution. If you have a netbook, there’s a chance you can bypass this limitation and run modern apps anyway.
You should only run a single antivirus application at a time, but none of them are perfect. Some antiviruses may catch malware that other antiviruses miss. Luckily, you don’t just have to rely on a single antivirus program.
A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.
If you’ve heard anything at all about Linux, you’ve probably heard of Linux distributions – often shortened to “Linux distros.” When deciding to use Linux – on a desktop computer or server – you’ll first need to choose a distro.