Have you ever wondered how much time is added to the boot process by your anti-virus solution? This handy chart from the folks over at Soluto shows you the answer, with some surprising results.
Deleting the cache is definitely something you’ll want to do if you are worried about your privacy. Just keep in mind that deleting the cache will only sorta delete those files — unless you overwrite the free space, you aren’t really deleting anything permanently. All you have to do is run a few utilities, and those deleted files are most likely going to be recovered.
Have you ever wanted to convert a video to play on your phone or tablet? Need to convert from one video format to another? HD Video Converter Deluxe can do all of that for you, and we have an exclusive, unlimited giveaway for all HTG readers… but it’s time sensitive, so get it now.
When it comes to hidden gems in Windows, nothing beats the Reliability monitor tool, hidden behind a link inside of another tool that you don’t use either. Why Microsoft doesn’t shine more light on this really useful troubleshooting tool, we’ll never know.
Windows users have been able to minimize every window on their desktop ever since keyboards with the Win key started showing up — just tap WIN + M on your keyboard, and every window is minimized. For Mac OS X, it’s not quite as simple.
After switching to OS X when I got a new MacBook Air, one of the first things I needed to duplicate was my extremely customized AutoHotkey setup — the most important of which is using the J and K keys to navigate throughout tabbed windows easily. Yeah, I’m a Vim user.
Microsoft released a preview of their update to Windows 8 today, and we’ve got all the details, starting with how to get your hands on it.
This guide explains how to configure a Windows Server 2008 machine to push out a static Ubuntu image that can be picked up by diskless terminals, so that you can have any number of machines running a fully-functional instance of Ubuntu without having a hard drive, as long as they are capable of PXE booting.
Are you one of those people that loves to see the screensaver come on when you get up from your computer? Here’s an easy way to make the screensaver show up as soon as you lock your PC.
The All Apps view in Windows 8 is quite useful, considering many of the applications a geek might want to use won’t be pinned to the Start Screen – but it is a pain to get there. We set out to find a better solution.
We are switching to Discourse, the new discussion platform that is built for the modern age. But it’s more than just a forum switch. Join us for a look back at discussion on How-To Geek.
Here’s a fun little tip for you: did you know that you can run commands from the address bar in Windows Explorer? It’s true — any app that you could run on the command line can be run from the address bar, including opening a new command prompt.
It was only a matter of time before somebody figured out how to use Metro / Modern apps in a regular desktop window, and naturally it was Stardock who came up with the solution. It’ll cost you a couple of bucks, but you can use the trial mode for free.
Internet Explorer 10, the same version that comes with Windows 8, is now available for Windows 7 users as well. Even if you aren’t an Internet Explorer user, you should still think about upgrading IE to the latest version for security reasons.
If you want to squeeze every last drop of performance out of your PC, you might consider disabling some of the built-in Windows services. But which ones should you disable? And which ones can you safely disable?
Most people don’t realize this, but Amazon allows you to get a refund for a Kindle book that you purchased, but wish you hadn’t. Instead of wasting time leaving a nasty review, why don’t you just get your money back?
If you managed to get infected with the absolutely terrible Ask Toolbar on your computer, don’t be ashamed – it could happen to anybody. Especially considering that is bundled with the equally awful Java runtime. Those people should be ashamed of themselves.
Everything is going high-tech these days, including your wallet. Why, you ask? What you might not realize is that new credit cards have RFID chips built into them – so this new wallet blocks RFID signals to prevent anybody from accessing your data.
We’ve put together a quick poll that you can answer, but you are more than welcome (and encouraged) to also leave an answer in the Other slot, or even as an anonymous comment to this article. (Note that comments might not show up on the site right away, but rest assured that we’ll see them).
There’s some 81 million unique IP addresses that expose UPnP functionality from the internet, and more than 6900 different devices are potentially vulnerable, at least, to being hacked from the outside. This means, theoretically, that your router could end up being hacked to forward ports from the outside world, which leaves you open to more hacking.
If you aren’t a programmer you might have never thought about all that stuff in the URL when you visit Gmail, but after years of noticing this, I finally decided to look it up. Turns out it actually does stand for something.
Facebook, Twitter, Google, Dropbox, and all the other web services out there can be accessed by various applications and other services. Here’s a couple of links that you can use to quickly remove anything that has access.