We’re going to assume that most How-To Geek writers know how to delete the history, cookies, and cache in Mobile Safari, but just in case you don’t know, here is how to do it.
One of the great things about Linux is that you can do the same thing hundreds of different ways—even something as simple as generating a random password can be accomplished with dozens of different commands. Here’s 10 ways you can do it.
Clearing the cache on your iPhone or iPad is really easy, but that will log you out of every single website that you were previously logged into, and wipe any other cookie-based preferences. So what if you want to just wipe cookies or cache for a single site?
If you’ve got loads of icons cluttering up your desktop, you might want a quick way to turn them off without using the context menu; here’s a quick and easy way to make a shortcut key to turn them on or off.
Drivers aren’t something that you need to be terribly worried about anymore unless you’re a gamer, but when you are troubleshooting a problem it can be useful to see what you have installed. But who wants to click through every item in Device Manager?
If somebody keeps spamming your phone with unwanted texts, or calling you when you don’t want it, you might be interested to know that you can easily block contacts from texting, calling, or even trying to FaceTime you in iOS even if they aren’t actually a contact.
Mobile Safari is a really great browser — it’s fast, easy to use, and has most of the features you might want. What it doesn’t have, however, is a good way to view the source code of a page.
Ever since I’ve been using my new MacBook Air, I’ve been befuddled by how to do some of the simplest tasks in Mac OS X that I would normally do from my Windows laptop—like show the connection speed for the current Wi-Fi network. So am I using 802.11ac or not?
There’s nothing more tedious as a system administrator than running security updates on a dozen servers every single day. Luckily Ubuntu will let you automate stable security updates so you’re never at risk.
If you have a computer at home and there’s nobody else around, there really isn’t any reason to login every single time you need to use it. Luckily you can easily set OS X to login automatically.
In today’s edition of Stupid Geek Tricks (where we show off little-known tricks to impress your non-geek friends), we’ll learn how to hide data in a text file that can’t be seen by anybody else unless they know the name of the secret compartment.
Whenever an application wants to make itself accessible over the network, it claims a TCP/IP port, which means that port can’t be used by anything else. So if you need to use an in-use port, how do you tell what application is holding it?
We’re always on the lookout for the simplest and easiest solution to perform a task, preferably while using the least amount of system resources. Here’s how to minimize to the system tray with a tiny little application helper.
It’s common knowledge that almost every single geek hates Internet Explorer with a passion, but have you ever wondered why? Let’s take a fair look at the history and where it all began… for posterity, if nothing else.
If you’ve completely forgotten the Wi-Fi password, you can usually just read it from the sticker on the router provided by your ISP — but what if that isn’t the right one? You can also recover your Wi-Fi password from your Mac.
The built-in Windows firewall is an important part of your system security, but over time, more and more applications end up being allowed through the firewall. Luckily there’s an easy way to reset all the settings to default again.
You would think that Microsoft would have learned from their Windows 8 mistakes of forcing terrible features down people’s throats, but it looks like they’ve integrated a positively awful Search button / panel into the Taskbar. Here’s how to hide it using a registry hack.
The Disk Management tool in Windows gives you an easy-to-use graphical interface to dealing with partitions and drive letters, but what if you want to just quickly change a drive letter on the command prompt? The diskpart utility makes it easy.
Ever since the first person wrote out 5318008 on a calculator, nerds have been hiding secret numbers inside of your PC, and using them to negotiate secret handshakes between applications and files. Today we take a quick look at some of the more entertaining examples.
When you hover your mouse pointer over a button in the taskbar, Windows shows you a preview of that window by default, but that preview is usually really small. Luckily with a quick registry hack, we can make those thumbnails bigger.
Microsoft just released a new version of Outlook for Mac, although this one is only available to Office 365 customers. Since the first thing most geeks will want to do is add their Gmail account, here are the quick instructions on how to do that.
If your computer has been hijacked with an obnoxious malware that won’t let you change your home page, there’s a strong chance you’ve been infected with the Trovi Search Protect malware, which used to be known as Conduit. Here’s how to remove it.
Over the years, we’ve created many Registry hacks to customize and tweak your Windows computer. Today we’re going to give you the keys to making your own registry hack files that you can use on any computer.
We warned you at the beginning of the year that many of your browser extensions are spying on you, tracking what you are visiting, and even inserting ads into pages. These aren’t just no-name developers either: even Avast, one of the most trusted antivirus vendors was in on the game.
If you don’t like the new transparent window effects in OS X Yosemite, you can easily disable them… or at least tone them down quite a bit.