SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Your Windows system’s uptime is displayed in the Task Manager. Right-click the taskbar and select Task Manager or press Ctrl+Shift+Escape to open it.

about 1 month ago - by  |  20 Replies

Your computer is probably running a 64-bit version of Windows. But take a look at the Task Manager and you’ll see most programs on your system are still 32-bit. Is this a problem?

about 1 month ago - by  |  15 Replies

Windows domains are typically used on large networks — corporate networks, school networks, and government networks. They aren’t something you’ll encounter at home unless you have a laptop provided by your employer or school.

about 1 month ago - by  |  4 Replies

Regulatory agencies in the US, Canada, and Europe now allow you to use electronics during takeoff and landing. This is called “gate-to-gate” device use — you could be using a device the entire time you’re on an airplane.

about 1 month ago - by  |  2 Replies

Google Services shows up on Android’s Battery statistics screen as one of the many things draining your battery. It can sometimes drain an excessive amount of battery power, but you can solve this problem.

about 1 month ago - by  |  7 Replies

Search engines are becoming ever-more integrated into mobile operating systems, but you can still change your default search engine on your smartphone or tablet. You don’t have to stick with the search engine the device manufacturer chose for you.

about 1 month ago - by  |  1 Reply

An “ATM skimmer” is a malicious device criminals attach to an ATM. When you use an ATM that’s been compromised in such a way, the skimmer will create a copy of your card and capture your PIN.

about 2 months ago - by  |  6 Replies

Adobe is no longer developing the Flash for Firefox on Linux. You’re still getting security updates, but that’s it — your Flash Player plug-in is already several major versions out-of-date.

about 2 months ago - by  |  14 Replies

Windows is packed full of system tools, and many of them are in the Administrative Tools folder. The tools here are more powerful and complex, so they’re hidden where most Windows users won’t stumble across them.

about 2 months ago - by  |  1 Reply

Set up a new disk on Windows 8.1 or 8 and you’ll be asked whether you want to use MBR or GPT. GPT is the new standard and is gradually replacing MBR.

about 2 months ago - by  |  13 Replies

Windows’ BitLocker encryption defaults to 128-bit AES encryption, but you can choose to use 256-bit AES encryption instead. Using a 256-bit AES key could potentially offer more security against future attempts to access your files.

about 2 months ago - by  |  3 Replies

Unknown devices show up in the Windows Device Manager when Windows can’t identify a piece of hardware and provide a driver for it. An unknown device isn’t just unknown — it’s not functioning until you install the right driver.

about 2 months ago - by  |  15 Replies

It’s happened to everybody at some point—you go to install a new application, and Windows tells you to reboot first. Or reboot after. Or it asks you to close out of every other application first. Why does it do that?

about 2 months ago - by  |  4 Replies

Today we’re taking a look at the home networking hardware: what the individual pieces do, when you need them, and how best to deploy them. Read on to get a clearer picture of what you need to optimize your home network.

about 2 months ago - by  |  19 Replies

Ask any PC tech person how to make your computer faster, and almost every one of them will tell you to defrag your PC. But do you really need to manually trigger a defrag these days?

about 2 months ago - by  |  9 Replies

Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.

about 2 months ago - by  |  16 Replies

Compared to the complexity of purchasing a new graphics card or swapping out your motherboard purchasing a USB hub is definitely a simple purchase; but that doesn’t mean you should just grab the first one off the shelf at your local electronics store. There is an enormous discrepancy between build quality, features, and even safety between the different models. Read on as we show you what you need to get the best results and find the hub that fits your needs.

about 2 months ago - by  |  17 Replies

Windows 8.x finally bundled an antivirus utility that used to be called Microsoft Security Essentials and rebranded it as Windows Defender. The only problem is that you can’t easily setup automatic scheduled scans anymore.

about 2 months ago - by  |  3 Replies

Each Linux distribution comes with a single default desktop environment chosen from the many different desktop environments available for Linux. But you don’t have to stick with the default.

about 2 months ago - by  |  7 Replies

Want to install a custom Android ROM — in other words, a third-party version of the Android operating system — like CyanogenMod? You’ll probably be instructed to install a custom recovery, too.

about 2 months ago - by  |  2 Replies

BitLocker normally encrypts entire drives and partitions, but you can also create encrypted container files with tools built into Windows. Such encrypted VHD files can easily be moved between systems, backed up, and hidden when not in-use.

about 2 months ago - by  |  9 Replies

Whether you want to use a new font in a Word or just change your operating system’s system font to give it a different look, you’ll first have to install the font on your operating system.

about 2 months ago - by  |  3 Replies

Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don’t wait until you’ve lost your hardware to think about this — these features need to be enabled ahead of time.

about 2 months ago - by  |  2 Replies

Linux distributions tend to use two different types of release cycles: standard releases and rolling releases. Some people swear by rolling releases to have the latest software, while others like standard releases for being more stable and tested.

about 2 months ago - by  |  1 Reply

Windows can encrypt entire operating system drives and removable devices with its built-in BitLocker encryption. When TrueCrypt controversially closed up shop, they recommended their users transition away from TrueCrypt to BitLocker.

about 2 months ago - by  |  8 Replies