FEATURED ARTICLES / THE BEST OF HOW-TO GEEK
Amazon’s Appstore has quite a few big-name apps, including Microsoft’s. But Google hasn’t put its own apps in the Amazon Appstore. It’s still possible to access Google’s services in other ways — or even use Google’s actual Android apps on your Fire Tablet.
Whether you’re dealing with images, music, or video files, it’s important to understand the difference between different types of formats and when to use them. Using the wrong format could ruin a file’s quality or make its file size unnecessarily large.
Amazon’s Fire Tablet normally restricts you to the Amazon Appstore. But the Fire Tablet runs Fire OS, which is based on Android. You can install Google’s Play Store and gain access to every Android app, including Gmail, Chrome, Google Maps, Hangouts, and the over one million apps in Google Play.
Windows 10, PlayStation 4, and Xbox One all have integrated ways to record your gameplay and post clips online. Now, Android devices, iPhones, and iPads are gaining integrated ways to capture videos of mobile gameplay and post it to YouTube or elsewhere.
Antimalware programs like Malwarebytes pop up warnings when they detect “potentially unwanted programs” you might want to remove. People call PUPs many other names, including “adware” and “crapware.” You almost certainly don’t want these programs on your computer, but they’re categorized differently for legal reasons.
Broadband is the lifeblood of the modern household and it’s incredibly frustrating when your Internet connection is flaky. Read on as we walk you through our tried and true troubleshooting techniques so you can pin down exactly where your connectivity problems are coming from.
Many online services offer two-step verification or two-factor authentication. Enable this for an account and it’ll require more than just your password to sign in. You’ll also need something else — and there are many different types of additional authentication methods you can use.
On a Chromebook, only apps from the Chrome Web Store typically get their own taskbar icons and separate windows. But you can give any website its own taskbar icon and make it open in a separate window, effectively turning any website you like into an “app.”
The setup process for the Apple TV is pretty user friendly but that doesn’t mean a walk through and some helpful configuration tips aren’t in order. Whether you’re setting yours up right now or considering purchasing one, follow along to see how the process works.
For years, pundits and publicist alike were chanting that PC gaming had finally met its match. That after years on top of the gaming world as the technologically superior option, consoles had finally caught up to the aging platform, and asserted their dominance as the go-to option for anyone who took their top score seriously.
U2F is an emerging standard for physical authentication tokens. Current U2F keys are all small USB devices. To log in, you won’t need to enter an authentication code provided from an app or SMS — just insert the USB security key and press a button. Here’s how they work.
U2F is a new standard for universal two-factor authentication tokens. These tokens can use USB, NFC, or Bluetooth to provide two-factor authentication across a variety of services. It’s already supported in Chrome for Google, Dropbox, and GitHub accounts. Microsoft is working on implementing it in Edge.
Yes, Android devices have serious security problems. There’s Android malware out there — mostly outside the Google Play Store. The biggest problem is that most Android devices don’t get security updates. Android antivirus apps aren’t a solution to these problems.
Halloween is one of those holidays that really brings out the tinker in a lot of geeks; there’s a veritable laundry list of things to deploy, modify, and enhance all in search of becoming the spookiest house on the block and throwing the best party. Read on as we highlight how easily you can turn a digital projector into a Swiss Army knife of cool Halloween tricks.
Like cars and homes before them, mobile devices have become an integral part of our lives, something we all need to stay current on the days events or respond to emails while on the road. But what can you do to protect them in case your case can’t protect them from threats external or otherwise?
A few years back, Intel noticed that less and less people were as interested in buying desktop and tower PCs as they were during the roaring 90’s. As sales continued to decline for the dinosaurs of modern computing, the company decided to mix the best of both worlds up in a blender to see what came out the other side, and their new line of NUC computers are the result of that experiment.
Web pages can automatically play audio thanks to HTML5, even if you’ve set Flash and other browser plug-ins to click-to-play. Most modern web browsers include an audio indicator that will show you which tab is playing sound. Most modern browsers also let you mute individual tabs.
The console wars. A test of will, strength, and perseverance almost as old as gaming itself. Over the past few decades companies from every corner of the technosphere have thrown their hat into the ring with one wacky system or another, with only a select few fighting through the fold to make their way to the top of the heap. These days, however, only three major manufacturers have survived to tell the tale: Nintendo, Microsoft, and Sony.