SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

You don’t need a task killer because Android can normally manage processes better on its own. However, this all falls apart if there’s a buggy app hogging your resources and running when it shouldn’t be. But how do you identify these misbehaving apps?

about 1 year ago - by  |  5 Replies

Converting color photos to black and white images that harken to the golden age of black and white photography is an art form. Read on as we show you how to capture the crisp contrast and mood of vintage photographs with today’s digital tools.

about 1 year ago - by  |  8 Replies

Leave the paper maps, outdated travel guides, and thick dictionaries at home when you go traveling — all you need is an Android smartphone. You can do everything offline with features built into Android and free apps.

about 1 year ago - by  |  6 Replies

When you bought your phone it was cutting edge, had the latest version of Android, and made your heart sing. A year or more later, it doesn’t get the new updates and the performance is a little sluggish. Breathe new life into your phone by flashing it with a new custom ROM.

about 1 year ago - by  |  4 Replies

Perhaps the most remarkable thing about the recently-released Ubuntu 13.04 is that it isn’t remarkable at all. Ubuntu 13.04 contains the latest versions of software and additional polish, but there are no must-have features that will make you rush to upgrade.

about 1 year ago - by  |  13 Replies

PC cleaning apps are digital snake oil. The web is full of ads for applications that want to “clean your PC” and “make it feel like new.” Don’t pull out your credit card — these apps are terrible and you don’t need them.

about 1 year ago - by  |  75 Replies

RAID allows you to combine multiple physical hard drives into a single logical hard drive. This allows you to mirror your data across two hard drives, ensuring you always have your important data stored in multiple places.

about 1 year ago - by  |  9 Replies

If you snap photos with your DSLR long enough, it’s bound to happen: dust will find its way onto your camera’s sensor and begin marring your beautiful photos. Read on as we walk you through a safe multi-step process to return your camera sensor to a factory floor shine.

about 1 year ago - by  |  2 Replies

Wireless charging is one of many new features appearing in the latest smartphones, from Google’s Nexus 4 and Samsung’s Galaxy S4 to Nokia’s Lumia 920. There are even cases that add wireless charging capabilities to Apple’s iPhone 5.

about 1 year ago - by  |  18 Replies

QR codes are plastered on advertisements, billboards, business windows, and products. They appear to be very popular among marketers, although it’s rare to see anyone actually scanning one.

about 1 year ago - by  |  18 Replies

ActiveX controls are Internet Explorer’s version of plug-ins. For example, Internet Explorer’s Flash player is an ActiveX control. Unfortunately, ActiveX controls have been a significant source of security problems.

about 1 year ago - by  |  7 Replies

Microsoft recently launched Office 2013 as well as Office 365, a subscription service. Office 365 will cost you $9.99 per month or $99 a year, while Office 2013 will cost you $219.99 for the Home and Business edition, which can only be used on one PC at a time.

about 1 year ago - by  |  25 Replies

Chromebooks aren’t “just a browser” — they’re Linux laptops. You can easily install a full Linux desktop alongside Chrome OS and instantly switch between the two with a hotkey — no rebooting necessary.

about 1 year ago - by  |  26 Replies

The Great Firewall of China, officially known the Golden Shield project, employs a variety of tricks to censor China’s Internet and block access to various foreign websites. We’ll be looking at some of the technical tricks the firewall uses to censor China’s Internet.

about 1 year ago - by  |  10 Replies

We recently showed you how to turn your Raspberry Pi into an always on Usenet machine centered around the feature-rich SABnzbd Usenet client. Now we’re back to show you how to use NZBGet, a more Spartan but also very lightweight Usenet tool.

about 1 year ago - by  |  8 Replies

When people think of innovative tech companies, they generally don’t think of Microsoft. Microsoft has actually had a history of innovative products and ideas, but they’ve failed to execute them over and over again.

about 1 year ago - by  |  27 Replies

If your reaction to the announced demise of Google Reader was to scream “But my starred items!”, then this is the tutorial for you. Read on as we show you multiple ways to extract all your starred articles from Google Reader.

about 1 year ago - by  |  5 Replies

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.

about 1 year ago - by  |  1 Reply

Pinhole photography is a fun and old fashioned way to capture images; read on as we bring the technique into the 21st century and show you how to use your modern DSLR as a pinhole camera.

about 1 year ago - by  |  3 Replies

You can’t normally “undo” an email sent by mistake. Some email clients have undo-like features, such as the “Recall” feature in Microsoft Outlook, but these won’t work most of the time.

about 1 year ago - by  |  8 Replies

Chromebooks are becoming more popular, with Samsung’s $249 Chromebook garnering solid reviews and decent sales. But a Chromebook still seems a bit scary — how do you live with just a Chrome browser? Is that really enough for a laptop?

about 1 year ago - by  |  32 Replies

Apple bans games that deals with serious issues from its app store. Some of the most high-profile banned games have come to Android and the web, so you can play them yourself to see what all the fuss is about.

about 1 year ago - by  |  10 Replies

Chrome warns you that PDF files “can harm your computer” when you try to download them. But how can a PDF file be so dangerous — isn’t a PDF just a document with text and images?

about 1 year ago - by  |  2 Replies

So you’ve set a password on your Windows laptop or desktop, and you always sign out or lock the screen when you leave it alone. This still won’t protect your data if your computer is ever stolen.

about 1 year ago - by  |  10 Replies

If you find yourself underwhelmed by the photos you’ve been snapping, there’s a good chance that underuse of depth of field manipulation is to blame. Read on as we explain what depth of field is and how you can use it to create more interesting and dynamic photos.

about 1 year ago - by  |  Leave a reply