SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Application-specific passwords are more dangerous than they sound. Despite their name, they’re anything but application-specific. Each application-specific password is more like a skeleton key that provides unrestricted access to your account.

about 1 year ago - by  |  3 Replies

Game-streaming solutions have evolved from the “cloud gaming” services we examined last year. Many new solutions allow you to stream a game from a computer in your house to a device in another room.

about 1 year ago - by  |  10 Replies

Many companies want to sell you “memory optimizers,” often as part of “PC optimization” programs. These programs are worse than useless — not only will they not speed up your computer, they’ll slow it down.

about 1 year ago - by  |  18 Replies

We recently discovered OneGet, a package management framework included with PowerShell and Windows 10. We’ve learned a lot more about OneGet and its future since then.

about 1 year ago - by  |  4 Replies

More operating systems are including encryption by default, which is fine. But, if your operating system doesn’t, you probably don’t need to start encrypting everything with third-party software.

about 1 year ago - by  |  8 Replies

Chromebooks aren’t the ideal Minecraft laptops, that’s for sure. There’s no web-based or Chrome app version of Minecraft, which is written in Java. But Chromebook owners aren’t completely out-of-luck if they want to play Minecraft.

about 1 year ago - by  |  1 Reply

Forget the Windows Store. Microsoft is working on a Linux-style package management framework for Windows, and it’s included with Windows 10. It’s being tested with Chocolatey’s existing packages, and allows you to easily install desktop applications and other software.

about 1 year ago - by  |  13 Replies

If you have an iPhone, iPad, or iPod Touch and a Mac, you can now record a video of your device’s screen thanks to a new feature in Mac OS X Yosemite. Android users can also record an Android device’s screen.

about 1 year ago - by  |  2 Replies

Whether you’re sporting an older computer without a single USB 3.0 port or you’d like to expand and improve the roster of USB 3.0 ports on your newer computer, we’re here to help. Read on as we outline how to pack in all the USB goodness you crave with back, front, and case ports.

about 1 year ago - by  |  4 Replies

Many of Windows 10’s best features showed up in Mac OS X years ago, including virtual desktops, Expose-like window management, and a notification center. Mac OS X 10.10 Yosemite has some other ideas Microsoft should copy for version 10 of its own operating system, too.

about 1 year ago - by  |  26 Replies

about 1 year ago - by  |  7 Replies

There’s a lot you can do with the Google Chromecast but did you know you can cast your screen from your Android phone or tablet to any Chromecast-equipped display? It’s easy, and we’re going to tell you how to do it.

about 1 year ago - by  |  7 Replies

You’ll see badges like “Norton Secured,” “Microsoft Certified Partner,” and “BBB Accredited Business” all over the web — especially when downloading software. You shouldn’t blindly trust a website that displays such badges — they’re just images anyone can copy and paste.

about 1 year ago - by  |  4 Replies

Firewalls are an important piece of security software, and someone is always trying to sell you a new one. However, Windows has come with its own solid firewall since Windows XP SP2, and it’s more than good enough.

about 1 year ago - by  |  26 Replies

Over the years, we’ve created many Registry hacks to customize and tweak your Windows computer. Today we’re going to give you the keys to making your own registry hack files that you can use on any computer.

about 1 year ago - by  |  15 Replies

Although we live in the age of HD video that doesn’t mean all of us have upgraded our old DVDs to HD content. Let’s look at how you can improve the appearance of standard definition content on your high definition television.

about 1 year ago - by  |  4 Replies

f.lux changes the color temperature of your computer’s display depending on the time of day. Everything’s normal during the day, but f.lux users warmer colors after sunset to match your indoor lighting.

about 1 year ago - by  |  9 Replies

Your Internet service provider runs DNS servers for you, but you don’t have to use them. You can use third-party DNS servers instead, which offer a variety of features that your ISP probably doesn’t.

about 1 year ago - by  |  9 Replies

We warned you at the beginning of the year that many of your browser extensions are spying on you, tracking what you are visiting, and even inserting ads into pages. These aren’t just no-name developers either: even Avast, one of the most trusted antivirus vendors was in on the game.

about 1 year ago - by  |  44 Replies

The FBI isn’t happy about the latest versions of iOS and Android using encryption by default. FBI director James Comey has been blasting both Apple and Google. Microsoft is never mentioned — but Windows 8.1 uses encryption by default, too.

about 1 year ago - by  |  19 Replies

iPads and iPhones give you control over how your kids can use your devices. You can quickly lock your device to a certain app before handing it over or lock down an entire device with comprehensive parental controls.

about 1 year ago - by  |  1 Reply

You’ve probably heard all about how the Java browser plug-in is insecure. 91% of system compromises in 2013 were against that insecure Java plug-in. But Java isn’t the same thing as JavaScript — in fact, they’re not really related.

about 1 year ago - by  |  7 Replies

Never download a driver-updating utility. Like PC-cleaning programs, they try to charge you money for a service you don’t need. They do this by scaring you with threats of blue screens and system problems.

about 1 year ago - by  |  37 Replies

Do you get too many newsletters and other promotional emails? These emails aren’t technically “spam” — they’re from legitimate organizations. Thanks to the US CAN-SPAM act, every legitimate company offers a consistent way to unsubscribe from their newsletters.

about 1 year ago - by  |  14 Replies

You’ve probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you’ve ever allowed keeps that access forever — or at least until you revoke it.

about 1 year ago - by  |  1 Reply