PAGE 3

Think you know the answer? Click through to see if you're right!

about 6 days ago - by  |  4 Replies

Windows uses a paging file, also known as a page file, as additional virtual memory when your RAM fills up. Windows can clear your page file every time you shut down, ensuring no sensitive data is left in the page file on the drive.

about 6 days ago - by  |  Comments (0)

If you have all manner of devices—iPhone, iPad, Apple TV, even Android—then you know that in order to easily type on them, you probably need a Bluetooth keyboard. But if you don’t have a Bluetooth keyboard, a simple app lets you use the integrated keyboard on your MacBook with lots of other devices.

about 6 days ago - by  |  2 Replies

Fast User Switching can be handy, but also comes with downsides. Here’s how to disable it on all versions of Windows, if you want to.

about 6 days ago - by  |  Leave a reply

As you type into the Search box in Windows’ File Explorer, a list of suggestions displays below the box. These suggestions are from the history of previous searches you’ve typed.

about 7 days ago - by  |  Leave a reply

When you make a new shortcut in Windows, it automatically adds “- Shortcut” to the end of the shortcut’s file name. This doesn’t seem like a big deal, but they can be bothersome. Sure, you can remove the text yourself when you create the shortcut, but why not stop it from happening in the first place?

about 7 days ago - by  |  5 Replies

On every Windows drive—even external USB drives—you’ll find a “System Volume Information” folder. You’ll only see it if you have Windows set to show hidden files and folders, but it’s always there. So what is it for?

about 7 days ago - by  |  2 Replies

When you shut down your computer, Windows doesn’t shut down immediately. Instead, it gives running applications and services some time to close first. You can control how long Windows waits—and whether it automatically closes running applications or not.

about 7 days ago - by  |  1 Reply

When you have guests over who want to use your Wi-Fi, Eero makes it really simple to create a guest network for them to connect to. That way they can get internet access, but they won’t be able to access your local network files or other devices.

about 7 days ago - by  |  Leave a reply

Think you know the answer? Click through to see if you're right!

about 7 days ago - by  |  Leave a reply

WhatsApp is a great way to stay in contact with people, regardless of what smartphone they use. And, like SMS, WhatsApp supports Group Chats so you can talk with a group of friends, your sports team, clubs, or any other group of people. Here’s how to start a group chat in WhatsApp.

about 7 days ago - by  |  Leave a reply

People really like to take, mark up, and share their fun photo creations. Apps like Snapchat and Instagram let you go to town with your photos, but you can have fun with Apple’s built-in Photos app as well.

about 7 days ago - by  |  Leave a reply

In an effort to unify all devices on the same network, Google recently added a new feature to the Google Home app (formerly called “Chromecast”). Now, if someone is playing something on a Chromecast in your home, it’ll show a notification on all the Android devices on your network. That means if your daughter is watching My Little Pony all day, you’ll have to deal with notifications letting you know.

about 7 days ago - by  |  Leave a reply

If you’re using Microsoft Office 2013 or 2016, you may have noticed that the Microsoft Office Picture Manager is not included. Picture Manager was included in Office 2010 and earlier and allowed you to easily view, edit, and manage pictures.

about 8 days ago - by  |  Leave a reply

If you’re like me (and nearly everyone I know), you do a lot of shopping on Amazon. Buying gifts? Amazon. Household items? Amazon. Electronics? Amazon. But because it’s so encompassing, it’s also something you’re going to want to take extra care to secure.

about 8 days ago - by  |  2 Replies

DoS (Denial of Service) and DDoS (Distributed Denial of Service) attacks are becoming increasingly common and potent. Denial of Service attacks come in many forms, but share a common purpose: stopping users from accessing a resource, whether it’s a web page, email, the phone network, or something else entirely. Let’s look at the most common types of attacks against web targets, and how DoS can become DDoS.

about 8 days ago - by  |  4 Replies

Think you know the answer? Click through to see if you're right!

about 8 days ago - by  |  6 Replies

You love technology, but not everyone does. For many people computers are confusing, even scary. Malevolent actors know this, and try to deliberately trick people online. From ads that look like download buttons to ransomware pop-ups, the web is full of deception-based design, intended to take advantage of the less technically inclined.

about 9 days ago - by  |  Leave a reply

Think you know the answer? Click through to see if you're right!

about 9 days ago - by  |  Leave a reply

Newer isn’t always better, and the wget command is proof. First released back in 1996, this application is still one of the best download managers on the planet. Whether you want to download a single file, an entire folder, or even mirror an entire website, wget lets you do it with just a few keystrokes.

about 10 days ago - by  |  11 Replies