So you’ve set a password on your Windows laptop or desktop, and you always sign out or lock the screen when you leave it alone. This still won’t protect your data if your computer is ever stolen.
Google provides a primary app store for Android, known as Google Play. However, Android isn’t like iOS. Google Play isn’t the only game in town, and there are other ways to install apps on Android.
Windows allows desktop apps to remain running whether they’re visible or not, while Apple’s iOS only allows apps to perform a few limited tasks in the background. Android sits somewhere in between — apps running in the foreground are prioritized, but apps have much more freedom to run in the background than they do on iOS.
The Digital Millennium Contract is a US law passed in 1998 in an attempt to modernize copyright law to deal with the Internet. The DMCA has a number of provisions, but we’ll be focusing on the ones that have most affected the web we have today.
One of the many ways you can customize your Android home screen is by replacing it entirely. Android developers can create their own software to replace your home screen — Facebook Home is just one of many options.
Cloud gaming has much in common with streaming videos. Essentially, the cloud-gaming server runs a game and streams a video of the gameplay to you. Your keyboard, mouse, and controller input actions are sent over the network to the cloud gaming server.
Hackers aren’t inherently bad — the word “hacker” doesn’t mean “criminal” or “bad guy.” Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. These terms define different groups of hackers based on their behavior.
Do you regularly open your antivirus program and run scans? Microsoft Security Essentials and other antivirus programs think you need to, warning you that your computer may be at risk if you haven’t done so in a while.
iTunes can’t sync your music library to an Android device, and Google doesn’t offer an iTunes-style desktop app. However, there are several ways you can easily transfer your music collection to your Android smartphone or tablet.
The last few years have seen the rise of closed platforms — operating systems that only allow you to install software approved by the operating system’s developer. However, many popular platforms — even mobile ones — are still open platforms.
If you’re like most people, your Internet service provider hands you a single Internet Protocol address and your router shares it amongst all the connected devices in your home.
The XPS format is Microsoft’s alternative to PDF. It was introduced in Windows Vista, but never gained much traction. However, modern versions of Windows continue to include better support for XPS files than PDF files.
Microsoft will be ending support for Windows XP on April 8, 2014 after 12 and a half years of supporting it. Microsoft has gone out of their way to extend support on several occasions, but the 2014 deadline looks like the final one.
Phones have improved dramatically in the last ten years. Modern smartphones seem like a technology from an alien civilization when placed next to the original cell phones. But battery life hasn’t improved. In fact, battery life feels like it’s getting worse.
Have you upgraded to Windows 8 yet? We’ve published a lot of Windows 8 articles here at How-To Geek, and I’ve written many of them, but I haven’t. I still use Windows 7 on my PC.
You’ve probably heard that firewalls are an important security protection, but do you know why that is? Many people don’t, if references to firewalls in TV shows, movies, and other forms of popular media are any indication.
Most Linux distributions come without support for MP3 audio, H.264 video, Flash content, and even commercial video DVDs. Patents, closed-source software, and even laws that make certain types of software illegal restrict what can be included in a Linux distribution.
So you have an antivirus guarding your system, your firewall is up, your browser plug-ins are all up-to-date, and you’re not missing any security patches. But how can be sure your defenses are actually working as well as you think they are?
If you’re new to the world of PC gaming, it can all seem a bit complicated. Consoles don’t have upgradable hardware, desktop software running in the background, or graphics settings that must be tweaked for ideal performance.
More than $5000. That’s how much one man’s child ran up on his credit card by playing “free” games on his iPad. Many games may be advertised as free, but they actually try to push expensive “in-app purchases.”
The news is full of reports of “spear-phishing attacks” being used against governments, large corporations, and political activists. Spear-phishing attacks are now the most common way corporate networks are compromised, according to many reports.
On Linux, you install software from package management applications like the Ubuntu Software Center. But not every piece of software is available in your Linux distribution’s software repositories.
Whether you’re installing the latest version of Windows or upgrading your Linux distribution, most geeks agree that you should probably perform a clean installation rather than try your luck with an upgrade.
Android geeks often unlock their bootloaders to root their devices and install custom ROMs. But there’s a reason devices come with locked bootloaders – unlocking your bootloader creates security risks.
Multiple user accounts were once impractical to use on Windows, but they aren’t anymore. If multiple people use your computer – particularly children or guests – you should give each person a separate user account.