Macro photography–or, taking photos of things under high magnification–is really fun; the price of dedicated macro lenses, on the other hand, is not. Read on as we show you how to use low cost tricks and techniques to enjoy macrophotography on a budget.
Unlike most other operating systems, Windows still doesn’t include first-class support for printing to PDFs. However, PDF printing is still fairly simple — you can quickly install a free PDF printer or use the support included in various programs.
When every single file you have is stored directly on your computer, it’s easy to find what you need. There are great search tools like Everything from VoidTools that rip through your master file table in a fraction of a second to find exactly what you’re searching for.
The last few years have seen the rise of closed platforms — operating systems that only allow you to install software approved by the operating system’s developer. However, many popular platforms — even mobile ones — are still open platforms.
If you’re like most people, your Internet service provider hands you a single Internet Protocol address and your router shares it amongst all the connected devices in your home.
Microsoft will be ending support for Windows XP on April 8, 2014 after 12 and a half years of supporting it. Microsoft has gone out of their way to extend support on several occasions, but the 2014 deadline looks like the final one.
Phones have improved dramatically in the last ten years. Modern smartphones seem like a technology from an alien civilization when placed next to the original cell phones. But battery life hasn’t improved. In fact, battery life feels like it’s getting worse.
Have you upgraded to Windows 8 yet? We’ve published a lot of Windows 8 articles here at How-To Geek, and I’ve written many of them, but I haven’t. I still use Windows 7 on my PC.
A few weeks ago, The Geek showed you how you can use the command prompt to find when your computer was started up last. In this last installation of Geek School for PowerShell, we are going to write a reusable PowerShell command to do the same thing.
You’ve probably heard that firewalls are an important security protection, but do you know why that is? Many people don’t, if references to firewalls in TV shows, movies, and other forms of popular media are any indication.
Are you one of those people that loves to see the screensaver come on when you get up from your computer? Here’s an easy way to make the screensaver show up as soon as you lock your PC.
Most Linux distributions come without support for MP3 audio, H.264 video, Flash content, and even commercial video DVDs. Patents, closed-source software, and even laws that make certain types of software illegal restrict what can be included in a Linux distribution.
We recently showed you how to turn your Raspberry Pi into a 24/7 low-power downloading machine. Now we’re back to show you how to make the system almost completely hands off with awesome automation tools.
The All Apps view in Windows 8 is quite useful, considering many of the applications a geek might want to use won’t be pinned to the Start Screen – but it is a pain to get there. We set out to find a better solution.
So you have an antivirus guarding your system, your firewall is up, your browser plug-ins are all up-to-date, and you’re not missing any security patches. But how can be sure your defenses are actually working as well as you think they are?
PowerShell has four types of jobs – Background Jobs, Remote Jobs,WMI Jobs and Scheduled Jobs. Join us as we find out what they are and how we can use them.
If you’re new to the world of PC gaming, it can all seem a bit complicated. Consoles don’t have upgradable hardware, desktop software running in the background, or graphics settings that must be tweaked for ideal performance.
More than $5000. That’s how much one man’s child ran up on his credit card by playing “free” games on his iPad. Many games may be advertised as free, but they actually try to push expensive “in-app purchases.”
The news is full of reports of “spear-phishing attacks” being used against governments, large corporations, and political activists. Spear-phishing attacks are now the most common way corporate networks are compromised, according to many reports.
Shout “Windows 8” and you’re likely to hear “Vista” echoed back at you. For Microsoft, Windows 8 has received a Vista-like reception and it’s showing in tepid sales and an abysmal market share.
Since PowerShell is based on the .Net Framework and incorporates various other technologies like WMI and CIM, there is always more than one way to accomplish the same thing. Come join us for this short post where we learn how to choose the best method to accomplish our tasks.
Whether you’re installing the latest version of Windows or upgrading your Linux distribution, most geeks agree that you should probably perform a clean installation rather than try your luck with an upgrade.
WMI and its newer brother CIM can both be used to manage the Windows machines in your environment. But do you know the difference between them? Join us as we take a look.
Android geeks often unlock their bootloaders to root their devices and install custom ROMs. But there’s a reason devices come with locked bootloaders – unlocking your bootloader creates security risks.
The battery life of cell phones just doesn’t seem to be as long as it used to be. If your Android device is dying faster than you would like, Wakelock Detector can help you to home in on apps you have installed that might be killing your battery or preventing the screen from switching off.