SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

If your reaction to the announced demise of Google Reader was to scream “But my starred items!”, then this is the tutorial for you. Read on as we show you multiple ways to extract all your starred articles from Google Reader.

about 12 months ago - by  |  5 Replies

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.

about 12 months ago - by  |  1 Reply

Pinhole photography is a fun and old fashioned way to capture images; read on as we bring the technique into the 21st century and show you how to use your modern DSLR as a pinhole camera.

about 12 months ago - by  |  3 Replies

You can’t normally “undo” an email sent by mistake. Some email clients have undo-like features, such as the “Recall” feature in Microsoft Outlook, but these won’t work most of the time.

about 12 months ago - by  |  8 Replies

Chromebooks are becoming more popular, with Samsung’s $249 Chromebook garnering solid reviews and decent sales. But a Chromebook still seems a bit scary — how do you live with just a Chrome browser? Is that really enough for a laptop?

about 12 months ago - by  |  32 Replies

Apple bans games that deals with serious issues from its app store. Some of the most high-profile banned games have come to Android and the web, so you can play them yourself to see what all the fuss is about.

about 12 months ago - by  |  10 Replies

Chrome warns you that PDF files “can harm your computer” when you try to download them. But how can a PDF file be so dangerous — isn’t a PDF just a document with text and images?

about 12 months ago - by  |  2 Replies

So you’ve set a password on your Windows laptop or desktop, and you always sign out or lock the screen when you leave it alone. This still won’t protect your data if your computer is ever stolen.

about 12 months ago - by  |  10 Replies

If you find yourself underwhelmed by the photos you’ve been snapping, there’s a good chance that underuse of depth of field manipulation is to blame. Read on as we explain what depth of field is and how you can use it to create more interesting and dynamic photos.

about 12 months ago - by  |  Leave a reply

Google provides a primary app store for Android, known as Google Play. However, Android isn’t like iOS. Google Play isn’t the only game in town, and there are other ways to install apps on Android.

about 12 months ago - by  |  4 Replies

A cheap power strip might protect equipment from power surges, but it does nothing to help when the power goes out and your system comes to a halting crash. Read on as we show you how to buy the right battery backup device for your needs.

about 12 months ago - by  |  20 Replies

Windows allows desktop apps to remain running whether they’re visible or not, while Apple’s iOS only allows apps to perform a few limited tasks in the background. Android sits somewhere in between — apps running in the foreground are prioritized, but apps have much more freedom to run in the background than they do on iOS.

about 12 months ago - by  |  5 Replies

Sharing your Wi-Fi with guests is just the polite thing to do, but that doesn’t mean you want to give them wide open access to your entire LAN. Read on as we show you how to set up your router for dual SSIDs and create a separate (and secured) access point for your guests.

about 12 months ago - by  |  16 Replies

The Digital Millennium Contract is a US law passed in 1998 in an attempt to modernize copyright law to deal with the Internet. The DMCA has a number of provisions, but we’ll be focusing on the ones that have most affected the web we have today.

about 12 months ago - by  |  16 Replies

Cloud gaming has much in common with streaming videos. Essentially, the cloud-gaming server runs a game and streams a video of the gameplay to you. Your keyboard, mouse, and controller input actions are sent over the network to the cloud gaming server.

about 12 months ago - by  |  6 Replies

Hackers aren’t inherently bad — the word “hacker” doesn’t mean “criminal” or “bad guy.”  Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. These terms define different groups of hackers based on their behavior.

about 1 year ago - by  |  7 Replies

Snapshots are a massive time saver when you are testing settings and configuration for your Geek School testing. Read on to see how you can take advantage of them while following along with our articles.

about 1 year ago - by  |  9 Replies

Do you regularly open your antivirus program and run scans? Microsoft Security Essentials and other antivirus programs think you need to, warning you that your computer may be at risk if you haven’t done so in a while.

about 1 year ago - by  |  27 Replies

Our Geek School articles can get pretty complicated, and there’s no reason to do a ton of crazy stuff on your own desktop PC. Instead, you can just VirtualBox like we do to create virtual machines for all of your testing. Here’s how to do it.

about 1 year ago - by  |  30 Replies

iTunes can’t sync your music library to an Android device, and Google doesn’t offer an iTunes-style desktop app. However, there are several ways you can easily transfer your music collection to your Android smartphone or tablet.

about 1 year ago - by  |  13 Replies

Macro photography–or, taking photos of things under high magnification–is really fun; the price of dedicated macro lenses, on the other hand, is not. Read on as we show you how to use low cost tricks and techniques to enjoy macrophotography on a budget.

about 1 year ago - by  |  6 Replies

Unlike most other operating systems, Windows still doesn’t include first-class support for printing to PDFs. However, PDF printing is still fairly simple — you can quickly install a free PDF printer or use the support included in various programs.

about 1 year ago - by  |  28 Replies

When every single file you have is stored directly on your computer, it’s easy to find what you need. There are great search tools like Everything from VoidTools that rip through your master file table in a fraction of a second to find exactly what you’re searching for.

about 1 year ago - by  |  22 Replies

The last few years have seen the rise of closed platforms — operating systems that only allow you to install software approved by the operating system’s developer. However, many popular platforms — even mobile ones — are still open platforms.

about 1 year ago - by  |  4 Replies

If you’re like most people, your Internet service provider hands you a single Internet Protocol address and your router shares it amongst all the connected devices in your home.

about 1 year ago - by  |  15 Replies