SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

If you’re new to the world of PC gaming, it can all seem a bit complicated. Consoles don’t have upgradable hardware, desktop software running in the background, or graphics settings that must be tweaked for ideal performance.

about 1 year ago - by  |  7 Replies

More than $5000. That’s how much one man’s child ran up on his credit card by playing “free” games on his iPad. Many games may be advertised as free, but they actually try to push expensive “in-app purchases.”

about 1 year ago - by  |  11 Replies

The news is full of reports of “spear-phishing attacks” being used against governments, large corporations, and political activists. Spear-phishing attacks are now the most common way corporate networks are compromised, according to many reports.

about 1 year ago - by  |  6 Replies

Shout “Windows 8” and you’re likely to hear “Vista” echoed back at you. For Microsoft, Windows 8 has received a Vista-like reception and it’s showing in tepid sales and an abysmal market share.

about 1 year ago - by  |  33 Replies

Since PowerShell is based on the .Net Framework and incorporates various other technologies like WMI and CIM, there is always more than one way to accomplish the same thing. Come join us for this short post where we learn how to choose the best method to accomplish our tasks.

about 1 year ago - by  |  1 Reply

Whether you’re installing the latest version of Windows or upgrading your Linux distribution, most geeks agree that you should probably perform a clean installation rather than try your luck with an upgrade.

about 1 year ago - by  |  4 Replies

WMI and its newer brother CIM can both be used to manage the Windows machines in your environment. But do you know the difference between them? Join us as we take a look.

about 1 year ago - by  |  1 Reply

Android geeks often unlock their bootloaders to root their devices and install custom ROMs. But there’s a reason devices come with locked bootloaders – unlocking your bootloader creates security risks.

about 1 year ago - by  |  14 Replies

The battery life of cell phones just doesn’t seem to be as long as it used to be. If your Android device is dying faster than you would like, Wakelock Detector can help you to home in on apps you have installed that might be killing your battery or preventing the screen from switching off.

about 1 year ago - by  |  3 Replies

One of the best features PowerShell offers is the ability to remotely manage your Servers. It even lets you manage a bunch of them at once as well.

about 1 year ago - by  |  1 Reply

Multiple user accounts were once impractical to use on Windows, but they aren’t anymore. If multiple people use your computer – particularly children or guests – you should give each person a separate user account.

about 1 year ago - by  |  7 Replies

In this edition of Geek School, we look at formatting, filtering and comparing objects in the Pipeline.

about 1 year ago - by  |  2 Replies

We are switching to Discourse, the new discussion platform that is built for the modern age. But it’s more than just a forum switch. Join us for a look back at discussion on How-To Geek.

about 1 year ago - by  |  43 Replies

We recently showed you how to turn your Raspberry Pi into a 24/7 BitTorrent box to save on your power bill and keep your tracker ratios golden. Now we’re back to show you how to add in Usenet access to round out the build as a comprehensive downloading box.

about 1 year ago - by  |  27 Replies

Some people believe Tor is a completely anonymous, private, and secure way to access the Internet without anyone being able to monitor your browsing and trace it back to you – but is it? It’s not quite that simple.

about 1 year ago - by  |  Comments (3)

Understanding objects is one of the fundamental concepts to “getting” PowerShell. Join us as we explore objects and how they make PowerShell better than any other shell out there today.

about 1 year ago - by  |  Comments (1)

Many gamers refer to any performance problem in an online game as “lag.” But if your computer’s frame rate is low, that isn’t the same thing as lag – lag and low FPS are different problems with different causes.

about 1 year ago - by  |  Comments (3)

Whether you’re dealing with images, music, or video files, it’s important to understand the difference between different types of formats and when to use them. Using the wrong format could ruin a file’s quality or make its file size unnecessarily large.

about 1 year ago - by  |  Comments (15)

Android includes a system encryption feature that encrypts all data – including application data, downloaded files, and everything else – on your phone or tablet. You’ll have to enter your PIN or password each time you turn on your phone

about 1 year ago - by  |  Comments (6)

We all know that Windows is the most malware-ridden platform out there, but why is that? Windows is the most popular desktop operating system, but that isn’t the only reason – past decisions made Windows a fertile breeding ground for viruses and other malware.

about 1 year ago - by  |  17 Replies

If you have installed Linux on its own partition in a dual-boot configuration, there’s no easy uninstaller that will remove it for you. You will need to delete its partitions and repair the Windows boot loader on your own.

about 1 year ago - by  |  Comments (13)

It’s ideal to have a dedicated machine for your BitTorrent client, but it is energy intensive to leave a full rig powered up and online 24/7. Read on as we show you how to set up a power-sipping Raspberry Pi to serve as an always-on downloading machine.

about 1 year ago - by  |  Comments (4)

Geeks often consider encryption a fool-proof tool to ensure that data stays secret. But, whether you encrypt your computer’s hard drive or your smartphone’s storage, you may be surprised to know the encryption can be bypassed at cold temperatures.

about 1 year ago - by  |  Comments (9)

If you have used ipconfig or ping through the command prompt, you’re halfway to becoming a PowerShell ninja. So come on and join us as we discover cmdlets in this installation of Geek School.

about 1 year ago - by  |  Comments (5)

You can’t go anywhere on the web without hearing about Google Reader’s shutdown. There are a number of lessons to be learned, but “never use any Google product ever again” isn’t the right lesson to draw.

about 1 year ago - by  |  Comments (14)