SEARCH

PAGE 8

It’s always a good idea to know some basics about the operating system you’re running on your computer. For example, you may need to know whether you’re running a 64-bit or 32-bit system so you know which file to download for a program you want to install.

about 15 days ago - by  |  2 Replies

Wireshark has quite a few tricks up its sleeve, from capturing remote traffic to creating firewall rules based on captured packets. Read on for some more advanced tips if you want to use Wireshark like a pro.

about 15 days ago - by  |  3 Replies

Ever tried to buy a Windows license from Amazon or Newegg? If only it was so simple. You’ll encounter cheaper System Builder (OEM) and more expensive Full Version (Retail) licenses. But the difference isn’t immediately apparent.

about 15 days ago - by  |  5 Replies

If you have ever had hidden system files set to display on your Windows system, then you have likely noticed a ‘matching’ pair of desktop.ini files on your desktop. Why are there two of them? Today’s SuperUser Q&A post has the answers to a confused reader’s question.

about 16 days ago - by  |  1 Reply

Think you know the answer? Click through to see if you're right!

about 16 days ago - by  |  2 Replies

When you are working with spreadsheets in Microsoft Excel and accidentally copy rows, or if you are making a composite spreadsheet of several others, you will encounter duplicate rows which you need to delete. This can be a very mindless, repetitive, time consuming task, but there are several tricks that make it simpler.

about 16 days ago - by  |  6 Replies

Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets.

about 16 days ago - by  |  4 Replies

If your SD card is slow to mount when you plug it into your computer, throwing up errors, or otherwise misbehaving, you can often whip it back into shape with a little careful management. Let’s take a look at how we can help a fellow reader squeeze a little life out of their SD card.

about 16 days ago - by  |  5 Replies

Java was responsible for 91 percent of all computer compromises in 2013. Most people not only have the Java browser plug-in enabled — they’re using an out-of-date, vulnerable version. Hey, Oracle — it’s time to disable that plug-in by default.

about 16 days ago - by  |  20 Replies

Microsoft has changed the name of “My Computer” to “Computer” and then to “This PC,” and for those people that prefer it one way or another — or something completely different — you can easily rename it.

about 17 days ago - by  |  4 Replies