PAGE 455

Once a week we dip into the reader mailbag and share some helpful tips. Today we’re looking at Android TXT messaging from your desktop, indexing offline storage volumes, and adding iOS-style folders to your Android homescreen.

about 4 years ago - by  |  Comments (9)

Are you a fan of Wendy and Richard Pini’s Elfquest saga? Then you are in luck! You can now view the entire saga (6,500+ pages) online for free. The scans of the pages are high quality and make for some great reading.

about 4 years ago - by  |  Comments (1)

The old standby in spud gun design is a simple chamber with a flammable gas inside and a basic ignition system. JC, of, mixed thing up a bit by both changing out the propellant system from an explosive gas to a pne...

about 4 years ago - by  |  Comments (3)

Wired magazine goes beyond simply explaining what the CynaogenMod is and digs into the history of the mod, the legal troubles it has run into, the people involved in the development, and more.

about 4 years ago - by  |  Comments (3)

Bromo [DesktopNexus]

about 4 years ago - by  |  Comments (2)

If you’re bent on customizing every aspect of your Android phone, this helpful guide will show you how to swap out the stock boot animation for a new custom one.

about 4 years ago - by  |  Comments (3)

Ubuntu has a lot of GUI-based methods for installing applications, but they take some time to search and find. Since the keyboard is usually faster than the mouse, managing your software via the command-line can be a real time-saver.

about 4 years ago - by  |  Comments (20)

There was recently a lot of noise in the tech news world about the iPhone and iPad keeping a tracking log of your location, and while that’s now in the past, you might want to consider encrypting your backups anyway. Here’s how to do it.

about 4 years ago - by  |  Comments (0)

There is no doubt that multiple tab browsing is a wonderful thing, but what if you want to conserve some vertical screen real-estate? Now you can hide and show the Tab Bar in Firefox as needed with a customized keyboard short...

about 4 years ago - by  |  Comments (6)

Data loss is serious—and tragic—business. This week we want to hear about your data backup strategies and how you ensure that your data stays safe, secure, and ready to be resurrected should the Binary Reaper strike.

about 4 years ago - by  |  Comments (239)

The Red Bird from Angry Birds and the Blue Bird from Tiny Wings get into an argument about copy-catting while flying. During the argument “someone else” shows up to join in the discussion…watch to see who it is!

about 4 years ago - by  |  Comments (5)

Once upon at time before the age of HTML, the internet looked like a command prompt and a world of text. Telehack is a simulation site that recreates the early internet experience.

about 4 years ago - by  |  Comments (6)

Did you know that PowerPoint 2010 has a feature called Broadcast Slide Show with which you can share your presentation through the web to another computer, smartphone or any other device with a browser? Here’s how to use it.

about 4 years ago - by  |  Comments (2)

At PC Magazine they purchased everything from premium Monster brand HDMI cables ($120) to bargain basement $2 cables and found that there was no difference between the two. This is unsurprising if you know that HDMI cables carry a digital signal.

about 4 years ago - by  |  Comments (13)

AUTUMN DRIVE [DesktopNexus]

about 4 years ago - by  |  Comments (4)

Instructables user Matth3w shares a simple tutorial for turning some scrap wood, a handful of bolts, and some segments of Loc-Line modular hosing into a bendable tripod mount you can wrap around things and otherwise mold for ...

about 4 years ago - by  |  Comments (2)

Most of us are guilty of coasting on our digital camera’s “auto” settings. But with a few quick lessons on the basic elements of proper exposure, you can learn how to be a more effective photographer, with or without it.

about 4 years ago - by  |  Comments (19)

Every Apple fanboy will tell you that Macs are safe from malware, but it’s just not true. Recently a fake AV program has been targeting and infecting OS X computers in the wild. Here’s a quick look at how it works, how to remove it, and also how to prevent it in the first place.

about 4 years ago - by  |  Comments (74)