SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Google just made a huge change to the way app permissions work on Android. Apps already on your device can now gain dangerous permissions with automatic updates. Future apps can gain dangerous permissions without asking you, too.

about 11 months ago - by  |  20 Replies

Do you have an old desktop PC sitting in a closet somewhere? Put it to use by installing FreeNAS. FreeNAS is a free, open-source operating system that will convert old PCs into network-attached storage devices.

about 11 months ago - by  |  21 Replies

When you need a data set for testing or demonstration, and that set needs to represent Personally Identifiable Information (PII), you generally don’t want to use real data that represents actual people. Here, we’ll walk you through how you can use PowerShell to generate a list of random names and phone numbers for just such an occasion.

about 11 months ago - by  |  1 Reply

OTR stands for “off the record.” It’s a way to have encrypted private instant message conversations online. It uses end-to-end encryption so your network provider, government, and even the instant-messaging service itself can’t see the content of your messages.

about 11 months ago - by  |  2 Replies

Both Linux and the BSDs are free and open-source, Unix-like operating systems. They even use much of the same software — these operating systems have more things in common than they do differences. So why do they all exist?

about 11 months ago - by  |  8 Replies

Your phone just made a sound, but you’re busy using your PC. Do you pick up your phone, unlock it, and look at the notifications? Don’t bother — just have all your Android notifications appear on your computer.

about 11 months ago - by  |  6 Replies

Chromebooks locally sync some data, so you’ll want to wipe that personal data when selling or passing on your Chromebook. You can also reinstall Chrome OS — particularly useful if you’ve messed around in developer mode.

about 11 months ago - by  |  2 Replies

Only one cash prize went unclaimed at Pwn2Own 2014. All major browsers were hacked, but hackers were unable to claim the $150,000 grand prize for hacking IE 11 secured with EMET. Secure your own PC with EMET today.

about 11 months ago - by  |  16 Replies

Sure, maybe your parents don’t need any help with their PC and your kids are better at technology than you are. But many geeks are called upon to be responsible for a relative’s PC — often after it breaks.

about 11 months ago - by  |  12 Replies

Linux isn’t the only alternative PC operating system out there. Some alternative operating systems are developed by large corporations, while others are small projects worked on by hobbyists.

about 11 months ago - by  |  14 Replies

Tools like ping, traceroute, lookup, whois, finger, netstat, ipconfig, and port scanners are available on nearly every operating system you can get your hands on. They’re used for everything from troubleshooting a connection to looking up information.

about 11 months ago - by  |  7 Replies

Microsoft added User Account Control to Windows in Windows Vista, and it’s still used on Windows 7 and 8 today. UAC restricts what programs can do without your permission.

about 11 months ago - by  |  1 Reply

Smartphones are expensive — you wouldn’t want to spend hundreds of dollars on one and end up with a scratched screen. Many people still buy screen protectors to protect those screens, but they’ve become less necessary.

about 11 months ago - by  |  13 Replies

You’ve probably seen references to TCP and UDP when setting up port-forwarding on a router or when configuring firewall software. These two protocols are used for different types of data.

about 11 months ago - by  |  2 Replies

Virtual machines are isolated containers, so the guest operating system in the virtual machine doesn’t have access to your computer’s file system. You’ll have to set up shared folders in a program like VirtualBox or VMware to share files.

about 11 months ago - by  |  2 Replies

RFID is a technology that surrounds us every day. It’s in our credit cards, passports, and some of the products we buy. Even many of our pets have RFID chips in them!

about 11 months ago - by  |  2 Replies

Memory cards are used in digital cameras, music players, smartphones, tablets, and even laptops. But not all SD cards are created equal — there are different speed classes, physical sizes, and capacities to consider.

about 11 months ago - by  |  5 Replies

You can buy a laptop or Wi-Fi tablet and use it on Wi-Fi anywhere in the world, so why are cell phones and devices with mobile data not portable between different cellular networks in the same country?

about 11 months ago - by  |  15 Replies

Ubuntu 14.04 LTS will “form the basis of the first commercially available Ubuntu tablets,” according to Canonical. We installed Ubuntu Touch 14.04 on our own hardware to see what those tablets will be like.

about 11 months ago - by  |  1 Reply

Steam’s In-Home Streaming is now available to everyone, allowing you to stream PC games from one PC to another PC on the same local network. Use your gaming PC to power your laptops and home theater system.

about 11 months ago - by  |  1 Reply

A Mac’s Recovery Mode is for more than just reinstalling Mac OS X. You’ll find many other useful troubleshooting utilities here — you can use these even if your Mac can’t boot normally.

about 11 months ago - by  |  1 Reply

Your operating system provides each user account with its own folders when you set up several different user accounts on the same computer. Shared folders allow you to share files between user accounts.

about 11 months ago - by  |  5 Replies

No need to wait for Valve’s Steam Machines — connect your Windows gaming PC to your TV and use powerful PC graphics in the living room today. It’s easy — you don’t need any unusual hardware or special software.

about 11 months ago - by  |  3 Replies

In 2012, Google’s Dianne Hackborn threatened to revoke CyanogenMod’s access to the Android Market if they moved forward with adding “Cornerstone” multitasking to their custom ROM. Samsung has since created their own multi-window multitasking feature.

about 11 months ago - by  |  5 Replies

Backups on Windows can be confusing. Whether you’re using Windows 7 or 8, you have quite a few integrated backup tools to think about. Windows 8 made quite a few changes, too.

about 11 months ago - by  |  6 Replies