SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Whether you’re dealing with images, music, or video files, it’s important to understand the difference between different types of formats and when to use them. Using the wrong format could ruin a file’s quality or make its file size unnecessarily large.

about 1 year ago - by  |  Comments (15)

Android includes a system encryption feature that encrypts all data – including application data, downloaded files, and everything else – on your phone or tablet. You’ll have to enter your PIN or password each time you turn on your phone

about 1 year ago - by  |  Comments (6)

We all know that Windows is the most malware-ridden platform out there, but why is that? Windows is the most popular desktop operating system, but that isn’t the only reason – past decisions made Windows a fertile breeding ground for viruses and other malware.

about 1 year ago - by  |  17 Replies

If you have installed Linux on its own partition in a dual-boot configuration, there’s no easy uninstaller that will remove it for you. You will need to delete its partitions and repair the Windows boot loader on your own.

about 1 year ago - by  |  Comments (13)

It’s ideal to have a dedicated machine for your BitTorrent client, but it is energy intensive to leave a full rig powered up and online 24/7. Read on as we show you how to set up a power-sipping Raspberry Pi to serve as an always-on downloading machine.

about 1 year ago - by  |  Comments (4)

Geeks often consider encryption a fool-proof tool to ensure that data stays secret. But, whether you encrypt your computer’s hard drive or your smartphone’s storage, you may be surprised to know the encryption can be bypassed at cold temperatures.

about 1 year ago - by  |  Comments (9)

If you have used ipconfig or ping through the command prompt, you’re halfway to becoming a PowerShell ninja. So come on and join us as we discover cmdlets in this installation of Geek School.

about 1 year ago - by  |  Comments (5)

You can’t go anywhere on the web without hearing about Google Reader’s shutdown. There are a number of lessons to be learned, but “never use any Google product ever again” isn’t the right lesson to draw.

about 1 year ago - by  |  Comments (14)

In this edition of Geek School, we will be helping you understand the powerful PowerShell scripting language that is built right into Windows, and is extremely useful to know in an IT environment.

about 1 year ago - by  |  Comments (3)

There are plenty of reasons why someone would need to backup their voicemails; perhaps for legal purposes or to save the voice of a deceased loved one. Whatever your reasons are, this guide will show you two ways to backup the voicemails from your iPhone in MP3 format.

about 1 year ago - by  |  Comments (1)

The Windows Store may be fairly light on great apps, but BlueStacks gives you access to over 750,000 apps on your Windows 8 PC – including lots of touch-enabled games.

about 1 year ago - by  |  Comments (7)

Web browsers have been growing up over the past few years. Now that Internet Explorer 6’s hold on the web has been broken, browsers have been implementing a variety of cool new features that websites are taking advantage of today.

about 1 year ago - by  |  Comments (7)

Web apps have been replacing desktop apps for everything from email and document-editing to playing videos and music. You don’t have to keep your web apps confined to a browser window – they can become first-class citizens on your desktop.

about 1 year ago - by  |  Comments (5)

In this installation of Geek School we take a look at our options for Backup and Recovery. This is an important one, so come on and join us.

about 1 year ago - by  |  Comments (16)

The majority of people use very weak passwords and reuse them on different websites. How are you supposed to use strong, unique passwords on all the websites you use? The solution is a password manager.

about 1 year ago - by  |  Comments (28)

In this installation of Geek School, we take a look at Folder Virtualization, SIDs and Permission, as well as the Encrypting File System.

about 1 year ago - by  |  Comments (0)

If you want to spend less time swapping cards and more time playing with your Raspberry Pi, installing the BerryBoot multi-boot manager makes it dead simple to boot multiple operating systems from one SD card. Read on as we walk you through the process.

about 1 year ago - by  |  Comments (1)

BitTorrent consumes 12% of total Internet traffic in North America and 36% of total traffic in the Asia-Pacific region, according to a 2012 study. It’s so popular that the new “Copyright Alert System” targets BitTorrent traffic alone.

about 1 year ago - by  |  Comments (7)

In today’s edition of Geek School, we look at the tools we can use to monitor the performance and reliability of our computers.

about 1 year ago - by  |  Comments (3)

So you have a Raspberry Pi and you would like to maximize its tiny footprint by turning into a totally stand alone box—no monitor, keyboard, or other input peripherals. Read on as we show you how to set up remote shell, desktop, and file transfer access on your Pi.

about 1 year ago - by  |  Comments (0)

In the last part of the series we looked at how you can manage and use your Windows computers from anywhere as long as you are on the same network. But what if you are not?

about 1 year ago - by  |  Comments (0)

There are tons of great games available on the Android platform, but playing them with an onscreen interface isn’t much fun. Ditch the fake buttons and start enjoying your games with a comfortable gaming controller.

about 1 year ago - by  |  Comments (2)

Free, ad-supported apps have two hidden costs: They use your phone’s data connection and battery power to download and display ads. In the long run, using a free app may be more expensive than buying the paid version.

about 1 year ago - by  |  Comments (7)

In this installation of Geek School, we look at how we can administer our machines remotely using Remote Assistance, Remote Desktop, Windows Remote Management also known as WinRM, and PowerShell.

about 1 year ago - by  |  Comments (0)

The media (and Apple) still can’t stop talking about Android malware. Antivirus companies want to sell you a complete Android security solution, but Android malware can be avoided with a few common-sense tips.

about 1 year ago - by  |  Comments (8)