SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Web apps have been replacing desktop apps for everything from email and document-editing to playing videos and music. You don’t have to keep your web apps confined to a browser window – they can become first-class citizens on your desktop.

about 1 year ago - by  |  Comments (5)

In this installation of Geek School we take a look at our options for Backup and Recovery. This is an important one, so come on and join us.

about 1 year ago - by  |  Comments (16)

The majority of people use very weak passwords and reuse them on different websites. How are you supposed to use strong, unique passwords on all the websites you use? The solution is a password manager.

about 1 year ago - by  |  Comments (28)

In this installation of Geek School, we take a look at Folder Virtualization, SIDs and Permission, as well as the Encrypting File System.

about 1 year ago - by  |  Comments (0)

If you want to spend less time swapping cards and more time playing with your Raspberry Pi, installing the BerryBoot multi-boot manager makes it dead simple to boot multiple operating systems from one SD card. Read on as we walk you through the process.

about 1 year ago - by  |  Comments (1)

BitTorrent consumes 12% of total Internet traffic in North America and 36% of total traffic in the Asia-Pacific region, according to a 2012 study. It’s so popular that the new “Copyright Alert System” targets BitTorrent traffic alone.

about 1 year ago - by  |  Comments (7)

In today’s edition of Geek School, we look at the tools we can use to monitor the performance and reliability of our computers.

about 1 year ago - by  |  Comments (3)

So you have a Raspberry Pi and you would like to maximize its tiny footprint by turning into a totally stand alone box—no monitor, keyboard, or other input peripherals. Read on as we show you how to set up remote shell, desktop, and file transfer access on your Pi.

about 1 year ago - by  |  Comments (0)

In the last part of the series we looked at how you can manage and use your Windows computers from anywhere as long as you are on the same network. But what if you are not?

about 1 year ago - by  |  Comments (0)

There are tons of great games available on the Android platform, but playing them with an onscreen interface isn’t much fun. Ditch the fake buttons and start enjoying your games with a comfortable gaming controller.

about 1 year ago - by  |  Comments (2)

Free, ad-supported apps have two hidden costs: They use your phone’s data connection and battery power to download and display ads. In the long run, using a free app may be more expensive than buying the paid version.

about 1 year ago - by  |  Comments (7)

In this installation of Geek School, we look at how we can administer our machines remotely using Remote Assistance, Remote Desktop, Windows Remote Management also known as WinRM, and PowerShell.

about 1 year ago - by  |  Comments (0)

The media (and Apple) still can’t stop talking about Android malware. Antivirus companies want to sell you a complete Android security solution, but Android malware can be avoided with a few common-sense tips.

about 1 year ago - by  |  Comments (8)

Whenever antivirus software is mentioned, someone always seems to chime up and say they don’t need an antivirus because they’re careful. This isn’t true. No matter how smart think you are, you can still benefit from an antivirus on Windows.

about 1 year ago - by  |  Comments (24)

Whether you’re a new Linux user or you’ve been using Linux for a while, we’ll help you get started with the terminal. The terminal isn’t something you should be scared of – it’s a powerful tool with lots of uses.

about 1 year ago - by  |  Comments (13)

Most of you probably never even think about the Windows build number — after all, it’s not something you see very often, and it doesn’t matter. But it does hold an interesting secret since Windows Vista.

about 1 year ago - by  |  Comments (10)

Come and join us as we make a the world a safer place using our Windows Firewall in this edition of Geek School.

about 1 year ago - by  |  Comments (1)

The new Copyright Alert System, also known as the “Six Strikes” system, marks the beginning of ISPs in the USA attempting to police their subscribers’ Internet usage. The “punishments” include increasingly harsh alerts, bandwidth throttling, and restricting browsing activity.

about 1 year ago - by  |  Comments (16)

In the last two articles, we looked at how to prepare your PC for network access. In this installment, we are going to look at wireless network configuration.

about 1 year ago - by  |  Comments (6)

Much of the data on your Android phone or tablet is backed up by Google (or the individual apps you use) automatically. Your photos can also be backed up automatically, but aren’t by default. However, some data is never backed up automatically.

about 1 year ago - by  |  Comments (3)

Last time we looked at the theory behind IP addresses, subnet masks and name resolution, and we ended the installment with a practical guide on how to change your network settings. This time we take that knowledge and extend it by introducing things like DHCP, Network Locations, Ping and much more.

about 1 year ago - by  |  Comments (5)

In order to enjoy more diverse media playback on your Raspberry Pi micro computer, you need to manually enable the MPEG-2 and VC-1 codecs. Read on to see how to do so and enjoy DVD playback and more on your Pi.

about 1 year ago - by  |  Comments (2)

Google Chrome allows other programs on your computer to install system-wide Chrome extensions. Chrome even allows these extensions to prevent you from disabling or removing them via Chrome’s Extensions page.

about 1 year ago - by  |  Comments (4)

In this edition of Geek School, we are going to look at how IP addressing works. We will also cover some advanced topics like how your PC determines if the device you are communicating with is on the same network as you. We will then finish with a brief look at two name resolution protocols: LLMNR and DNS.

about 1 year ago - by  |  Comments (7)

Increasingly sophisticated phones and data-hungry applications make it easier than ever to blow through your data plan’s cap and incur overage charges. Read on as we show you how to manage your data use and avoid unwelcome charges.

about 1 year ago - by  |  Comments (3)