SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

While doing our regular security audit of all the accounts tied to the HTG site, we noticed something interesting: Inside your Google account settings there is a list of any site or app that you’ve given access to, and the list might surprise you. Time for a checkup!

about 7 months ago - by  |  9 Replies

If the paperless office isn’t here for you yet, you can print from your iPad or iPhone. Sure, you can’t directly connect a printer to your iPad, but there are plenty of ways to print wirelessly.

about 7 months ago - by  |  3 Replies

There are two big choices when it comes to reading eBooks. You can go with either a dedicated eReader, like a Kindle Paperwhite, or a tablet with an LCD screen, like an iPad — but which is best?

about 7 months ago - by  |  3 Replies

When you don’t have unlimited mobile data on your Android or iPhone, every megabyte counts. Mobile browsers like Google Chrome and Opera offer a built in data compression feature, allowing you to browse with less data.

about 7 months ago - by  |  5 Replies

There is a huge number of antivirus programs to choose from, so how do you find the best one? Do you use what came with your computer or what your friend recommended? How do you know if it’s any good?

about 7 months ago - by  |  29 Replies

Many computer users were trained never to turn their PCs off by pressing the power button on their desktop PC’s case. This used to cause problems in the previous millennium, but it’s now perfectly safe to shut down with the power button.

about 7 months ago - by  |  15 Replies

Routers are such an infrequently replaced component of your home network that it’s easy to forget how you had things previously configured and what settings are too important to not overlook. Read on as we highlight the first five things you need to do right after powering up your new router.

about 7 months ago - by  |  5 Replies

Apple sells Apple Remote Desktop on the Mac App Store for $80, but you don’t have to spend any money to remotely connect to your Mac. There are free solutions — including one built into your Mac.

about 7 months ago - by  |  3 Replies

Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of the document.

about 7 months ago - by  |  3 Replies

Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed.

about 7 months ago - by  |  8 Replies

You just got an iPhone, now what?  The amount of things to setup can be overwhelming for first-time users, but How-to Geek is here to guide you through the essential steps required to get your iPhone up and running.

about 7 months ago - by  |  2 Replies

If you need really fast external storage for your laptop, you might be interested to know that you can buy an external solid state drive that connects over USB 3.0 or Thunderbolt… and it is crazy fast. We had to buy one for the office, so we’re reviewing it for you today.

about 7 months ago - by  |  8 Replies

The Mission Control feature in Mac OS X allows you to arrange windows into several different screens you can quickly switch between. This feature was formerly known as Spaces, and is called virtual desktops or workspaces on Linux.

about 7 months ago - by  |  1 Reply

You recommend a program to a family member, and they proceed to install it along with five other junkware programs that sneak their way on to their computer in the installation process.  Sound familiar?  Unchecky prevents these unnecessary programs from installing themselves by unchecking the appropriate boxes.

about 7 months ago - by  |  23 Replies

Not all Wi-Fi networks are created equal. Wi-Fi access points can function in either “ad-hoc” or “infrastructure” mode, and many WI-Fi-enabled devices can only connect to infrastructure-mode networks, not ad-hoc ones.

about 7 months ago - by  |  1 Reply

A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.

about 7 months ago - by  |  9 Replies

Bill Gates famously said “two years from now, spam will be solved” back in 2004. It’s now ten years later and more than 70% of emails are spam, according to Kaspersky. Why is spam still such a problem?

about 7 months ago - by  |  18 Replies

Windows 8′s desktop hasn’t seen many improvements for touch use, but even 8-inch Windows tablets have a desktop. If you have to use the desktop with your finger, these tips will help you avoid frustration.

about 7 months ago - by  |  1 Reply

The caller said “I’m calling you from Windows tech support.” The fake tech support scammers made the mistake of calling us today and we played along to learn their tricks just for fun. Here’s what happened.

about 7 months ago - by  |  54 Replies

Spam seems to arrive in every single email account we use, no matter how careful we are. How are spammers getting all our email addresses? And can we do anything to hide our email address from spammers?

about 7 months ago - by  |  5 Replies

Many laptops now include a combined headphone and microphone jack instead of two separate audio jacks. This trend started with smartphones and tablets, but has spread to MacBooks, ultrabooks, and convertibles like Microsoft’s Surface Pro.

about 7 months ago - by  |  2 Replies

Although the ebook reader market has been dominated by the Kindle (still going strong) and the Nook (losing steam) for years, there’s a contender rising from the ranks: the Kobo Aura HD. Read on as we put it through the paces.

about 7 months ago - by  |  5 Replies

While GPS tagged photos are handy for always knowing where you took a photo, location data embedded in photos does have unsettling privacy and security implications. Should you be worried about the risk of people tracking you down via photos you post online?

about 7 months ago - by  |  7 Replies

Intel x86 or x64 processors have traditionally been found in laptops and desktops, while ARM processors have been found in lower-power embedded devices, smartphones, and tablets. But you can now buy laptops with ARM chips and smartphones with Intel chips.

about 7 months ago - by  |  14 Replies

Are you having a problem with your Internet connection or Wi-Fi? Whatever the problem — from a flaky connection to Wi-Fi troubles or even no access to the Internet at all — some router troubleshooting could fix things.

about 7 months ago - by  |  4 Replies