SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Apple offers 5 GB of free iCloud space to everyone, but you’ll run up against that storage limit sooner than you’d think. Device backups, photos, documents, iCloud email, and other bits of data all share that space.

about 5 months ago - by  |  2 Replies

Windows, Mac, and Linux can all get along together, sharing files with each other on a network. They can also share printers, allowing you to use a single wired printer for all the computers on your home network.

about 5 months ago - by  |  2 Replies

Reach your Chromebook’s storage limit and you’ll start seeing errors when downloading and creating files. This isn’t hard to do, as Chromebooks often come with only 16 GB of internal storage.

about 5 months ago - by  |  2 Replies

iPads and iPhones don’t have file systems you can see, but there are still apps and files eating up space. You can see exactly what’s consuming that limited space and free it up.

about 5 months ago - by  |  5 Replies

Installing software works differently on Linux. Instead of visiting a website, you’ll usually need to grab the software from your Linux distribution’s software repositories with its package manager. This sounds complicated, but is actually simpler than installing software on Windows.

about 5 months ago - by  |  7 Replies

The Enhanced Mitigation Experience Toolkit is Microsoft’s best-kept security secret. It’s easy to install EMET and quickly secure many popular applications, but there’s a lot more you can do with EMET.

about 5 months ago - by  |  4 Replies

If you want the latest Kindle features right this second (or you missed a past update) the best way to get an immediate update for your Kindle is to do it manually. Read on as we show you how to easily update your Kindle.

about 5 months ago - by  |  1 Reply

Linux isn’t a complete operating system — it’s just a kernel. Linux distributions take the Linux kernel and combine it with other free software to create complete packages. There are many different Linux distributions out there.

about 1 year ago - by  |  31 Replies

Computer networking is filled with jargon that isn’t self-explanatory. Here’s a quick overview of many of the terms you’ll see when you glance at the network status information on any device.

about 5 months ago - by  |  2 Replies

Home file sharing used to be a nightmare, even between different versions of Windows — never mind Mac and Linux! These operating systems can now talk to each other and share files without any special software.

about 5 months ago - by  |  4 Replies

Creating installation media for your operating system of choice used to be simple. Just download an ISO and burn it to CD or DVD. Now we’re using USB drives, and the process is a little different for each operating system.

about 5 months ago - by  |  10 Replies

iPads come with touch keyboards, but there’s nothing stopping you from connecting a good old fashioned physical keyboard and typing on that. Apple even shipped a keyboard dock for the original iPad.

about 5 months ago - by  |  6 Replies

Motherboards include integrated graphics, sound, and network hardware — but is it good enough, or do you need to buy discrete components when building your own PC?

about 6 months ago - by  |  9 Replies

Google just made a huge change to the way app permissions work on Android. Apps already on your device can now gain dangerous permissions with automatic updates. Future apps can gain dangerous permissions without asking you, too.

about 6 months ago - by  |  20 Replies

Do you have an old desktop PC sitting in a closet somewhere? Put it to use by installing FreeNAS. FreeNAS is a free, open-source operating system that will convert old PCs into network-attached storage devices.

about 6 months ago - by  |  21 Replies

When you need a data set for testing or demonstration, and that set needs to represent Personally Identifiable Information (PII), you generally don’t want to use real data that represents actual people. Here, we’ll walk you through how you can use PowerShell to generate a list of random names and phone numbers for just such an occasion.

about 6 months ago - by  |  1 Reply

OTR stands for “off the record.” It’s a way to have encrypted private instant message conversations online. It uses end-to-end encryption so your network provider, government, and even the instant-messaging service itself can’t see the content of your messages.

about 6 months ago - by  |  2 Replies

Both Linux and the BSDs are free and open-source, Unix-like operating systems. They even use much of the same software — these operating systems have more things in common than they do differences. So why do they all exist?

about 6 months ago - by  |  8 Replies

Your phone just made a sound, but you’re busy using your PC. Do you pick up your phone, unlock it, and look at the notifications? Don’t bother — just have all your Android notifications appear on your computer.

about 6 months ago - by  |  6 Replies

Chromebooks locally sync some data, so you’ll want to wipe that personal data when selling or passing on your Chromebook. You can also reinstall Chrome OS — particularly useful if you’ve messed around in developer mode.

about 6 months ago - by  |  1 Reply

Only one cash prize went unclaimed at Pwn2Own 2014. All major browsers were hacked, but hackers were unable to claim the $150,000 grand prize for hacking IE 11 secured with EMET. Secure your own PC with EMET today.

about 6 months ago - by  |  16 Replies

Sure, maybe your parents don’t need any help with their PC and your kids are better at technology than you are. But many geeks are called upon to be responsible for a relative’s PC — often after it breaks.

about 6 months ago - by  |  12 Replies

Linux isn’t the only alternative PC operating system out there. Some alternative operating systems are developed by large corporations, while others are small projects worked on by hobbyists.

about 6 months ago - by  |  14 Replies

Tools like ping, traceroute, lookup, whois, finger, netstat, ipconfig, and port scanners are available on nearly every operating system you can get your hands on. They’re used for everything from troubleshooting a connection to looking up information.

about 6 months ago - by  |  7 Replies

Microsoft added User Account Control to Windows in Windows Vista, and it’s still used on Windows 7 and 8 today. UAC restricts what programs can do without your permission.

about 6 months ago - by  |  1 Reply