Hollywood doesn’t understand technology and “hacking.” That’s what we thought, anyway. But many of the ridiculous things we’ve seen in movies turned out to be completely true.
MacBooks are known for their excellent battery life, but we always want more. This is especially important if you have an older MacBook with a more power-hungry CPU and mechanical hard drive, but everyone can benefit from these tips.
Firefox themes — also known as “personas” — can change the way your browser looks, making it more personal. If you like theming the applications you use, there’s no better application to theme than your browser.
TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.
Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.
Thanks to bad design decisions, AutoRun was once a huge security problem on Windows. AutoRun helpfully allowed malicious software to launch as soon as you inserted discs and USB drives into your computer.
You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.
Apple introduced iCloud Drive in iOS 8 and Mac OS X Yosemite. It’s designed to be a more easily understandable cloud storage location, working more like Dropbox, OneDrive, and Google Drive.
It’s that shop-til-you-drop time of year again and retailers have already spent most of November with teaser sales and ads for Black Friday and Cyber Monday. Read on as we show you how to score the best deals and avoid getting ripped off.
Chromium is the open-source project that forms the basis for Google Chrome. Because it’s completely open source, Chromium is available in many Linux distributions’ software repositories for easier installation.
USB devices are apparently more dangerous than we’ve ever imagined. This isn’t about malware that uses the AutoPlay mechanism in Windows — this time, it’s a fundamental design flaw in USB itself.
Chromebooks offer built-in support for SSH tunnelling with their included crosh shell and SSH command. An SSH tunnel allows you to use an SSH connection like a VPN or encrypted proxy, sending your browsing traffic through the secure tunnel.
Android’s user-visible file system is one of its advantages over iOS. This allows you to more easily work with files, opening them in any app of your choice. But Android doesn’t include a file manager app by default.
Some people spend hours — maybe even days — trying to clean an infected Windows system and ensuring it’s actually clean and safe afterward. It’s usually not a good idea to do this — just reinstall Windows and start over.
You may want to switch to another cloud storage service — perhaps moving to Microsoft’s OneDrive to get that now-infinite cloud storage. Yes, you could just download and re-upload all your files, but you can also do this a faster way.
So you’ve shelled out the money for a fancy inkjet photo printer, only you’re not impressed with the images you’re getting out of your standard office paper. Have you ever wondered why that photo paper works so much better?
When it comes to securing your Wi-Fi network, we always recommend WPA2-PSK encryption. It’s the only really effective way to restrict access to your home Wi-Fi network. But WPA2 encryption can be cracked, too — here’s how.
It’s happened to all of us. You step away from your computer and come back a few minutes later. While you were gone, your computer’s hard drive lights start flashing — but what exactly is it doing? It’s natural to be a bit suspicious.
It can be tough porting your videos and music to every device you use. How do you know your Mac, Xbox, and Windows Machine can read your files? Read on to find your perfect USB drive solution.
You might know that there are special cameras for shooting panoramic pictures. Today, we’ll put one together in seconds that we shot with a regular digital camera and a tripod. Grab your favorite image editor and camera, and let’s go!
We’ve often received blank stares and looks of confusion when mentioning that our credit card company is covering a repair via its extended warranty. Yes, your credit card may provide free extended warranties, too!
As a parent, you have plenty to worry about; what your kids are doing on their computers shouldn’t be one of them. Today, well show you how to lock down your curiosity-prone kids and really take control of your home network with Microsoft Family Safety.
Once again there are urgent security patches released for Windows, and this time the problems they fix are “potentially catastrophic” issues with the encryption stack. This is why you should have Windows install updates automatically.
There are many different websites for creating web-based surveys, but all you need is a Google account and Google Docs. Easily create a survey with Google Forms, sending the results directly to Google Sheets.
In today’s edition of Stupid Geek Tricks (where we show off little-known tricks to impress your non-geek friends), we’ll learn how to hide data in a text file that can’t be seen by anybody else unless they know the name of the secret compartment.