Windows makes it possible to change the welcome screen that appears when you start your computer without any third-party software, but this setting is well hidden in Windows 7 — although much easier in Windows 8 or 10. You can set any image you like as your background.
It’s a scary time to be a Windows user. Lenovo was bundling HTTPS-hijacking Superfish adware, Comodo ships with an even worse security hole called PrivDog, and dozens of other apps like LavaSoft are doing the same. It’s really bad, but if you want your encrypted web sessions to be hijacked just head to CNET Downloads or any freeware site, because they are all bundling HTTPS-breaking adware now.
Old devices using 802.11b Wi-Fi are a problem. They slow down modern Wi-Fi networks just by operating on the same channel nearby. Even your neighbors’ Wireless B devices may be slowing down your Wi-Fi.
Crouton — made by a Google employee — is the ideal solution for running Linux on your Chromebook. If you’re a Crouton user, there are some extra commands you’ll want to know.
Lenovo’s been shipping Superfish on their PCs for months. This is a security disaster, and it shows how little PC manufacturers actually care about your PC’s security. There’s only one way to ensure your new PC is actually safe to use.
Apple’s Photos app saw some changes in iOS 8, and more changes are coming when iCloud Photo Library launches soon. Did you know that your photos app keeps copies of photos you’ve deleted?
If you’re like us, then you know “scanning” documents and photos with your phone or tablet is a mixed bag. Thankfully, there are ways to scan documents that gives reliably good results, and best of all, they’re really easy.
Are you using Apple’s Mail app on your Mac? Then you’re losing gigabytes of space you could be putting to better use! The mail app wants to cache every single email and attachment you’ve ever received offline.
Want to make your tablet or smartphone’s battery last longer? Prevent it from automatically checking for new emails and other data in the background. “Fetch” will drain your battery the fastest.
It’s easier than ever to find a PC game’s FPS. Steam now offers a built-in FPS display, and so does NVIDIA via its GeForce Experience software. Fraps is still around to display this for other games — and many games have this built-in, too.
It’s impossible to completely protect any device from an attacker with physical access. But, unless you set up your Mac properly, it just takes a reboot and a few seconds to bypass your password — or wipe your hard drive.
Your iPhone’s keyboard offers some hidden tricks that can help you type faster. iPads offer some hidden tricks, too — did you know you can split your iPad’s keyboard and move it around the screen?
Not all of us have switched to smartphone photography. Whether you use a DSLR or just a point-and-shoot camera, there are ways to automatically upload and sync photos like you would with a smartphone.
For all the old jokes about one-button mice and simplicity, Macs have some power-user features Windows just doesn’t offer. Automator is one of them, offering a simple way to automate repetitive tasks without any third-party software.
Smartphones and computers are notification-generaitng machines. Every app wants to constantly ping you, interrupting your life and pulling you out of that “flow state” while working.
Wi-Fi networks interfere with each other. Older Wi-Fi standards are even worse about this, so your old Wi-Fi hardware isn’t just hurting your network — it’s interfering with your neighbors, too.
Chrome’s new user account switcher allows you to create multiple “profiles,” which you can use to log into multiple accounts at once on websites, use different groups of add-ons, and more. You can do something similar with Firefox’s Profile Manager.
The latest trend in the awful Windows ecosystem is pretty ridiculous — scammers have a fake version of the reputable AdwCleaner tool, which is a real tool for Windows experts. And this one pretends your computer is infected and tries to make you pay them to remove it.
Google wants to get rid of browser plug-ins, but they’re bundling quite a few with Chrome itself. On a clean install, you’ll see at least five different browser plug-ins, from the Widevine Content Decryption Module to Native Client.
Browser plug-ins are the biggest target on your computer. Java is a gaping security hole, but Flash has seen a stream of 0-day attacks recently. There’s even been an increase in attacks against Silverlight.
Notifications are obnoxious. Few of us actually need a “ding!” from our pocket every time we get a new email. But some emails are more important, and you might want to hear about them immediately with a notification.
Every operating system backs up previous versions of files and offers an easy way to go back in time. If you use a cloud storage service, it also keeps previous versions of your files.
Unbeknownst to most consumers there’s an anti-piracy protocol built right into the HDMI cable standard. Not only does it have a poor track record when it comes to piracy prevention it outright breaks the viewing experience for many people. Read on as we explain how it works, why it breaks your TV, and how you can fix it.
Mac OS X 10.10 Yosemite brought a revamped Spotlight search interface. But it’s still limited. Flashlight smashes those limits, adding a plug-in system to Spotlight.
One of the most common issues with aging laptops is overheating, something many people aren’t sure how to fix. We’ll help you figure out what’s causing the heat and how to keep your notebook functioning at a lower temperature.