SEARCH

PAGE 12

Google made 64-bit builds of Chrome available in the Dev and Canary channels during the early part of June, but as of this week, those 64-bit builds have graduated to the Beta channel. So if you were waiting for a more stable version to try, then now is the time to grab a copy of the new 64-bit build for your system!

about 27 days ago - by  |  1 Reply

An “ATM skimmer” is a malicious device criminals attach to an ATM. When you use an ATM that’s been compromised in such a way, the skimmer will create a copy of your card and capture your PIN.

about 27 days ago - by  |  6 Replies

Have you ever noticed that little blinking line at the end of whatever you are typing? Of course you have! But did you know that you can make the line darker if you want to? It also makes a fun prank setting to mess with your friends.

about 28 days ago - by  |  1 Reply

Think you know the answer? Click through to see if you're right!

about 28 days ago - by  |  5 Replies

Working to keep your system free of malware is a full-time job, but what do you do when your system gets taken over by malware? What are the best anti-virus tools to clean up an infected system? AV-Test.org decided to find out by putting seventeen anti-virus apps to the test over a ten month period.

about 28 days ago - by  |  1 Reply

Nautilus contains some pre-defined bookmarks that provide quick and easy access to some common folders, such as Music and Pictures, as well as devices such as USB flash drives and network locations. You can add custom bookmarks to quickly access folders you use often.

about 28 days ago - by  |  1 Reply

Adobe is no longer developing the Flash for Firefox on Linux. You’re still getting security updates, but that’s it — your Flash Player plug-in is already several major versions out-of-date.

about 28 days ago - by  |  14 Replies

Windows is packed full of system tools, and many of them are in the Administrative Tools folder. The tools here are more powerful and complex, so they’re hidden where most Windows users won’t stumble across them.

about 29 days ago - by  |  1 Reply

No matter how hard you try to keep your kids safe from undesirable websites on the Internet, it seems like there is always some method of circumventing any protection you set up. Today’s SuperUser Q&A post discusses the possibility of using a virtual OS to access websites blocked in the host OS’s hosts file.

about 29 days ago - by  |  2 Replies

Think you know the answer? Click through to see if you're right!

about 29 days ago - by  |  1 Reply