SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

PCs are all about backwards compatibility, but this can lead to problems. Games designed for DOS or even just earlier versions of Windows may not work properly on modern versions of Windows without some tweaking.

about 2 years ago - by  |  6 Replies

Tablets are great devices to leave on a coffee table and share, but they’re intensely personal. They provide direct access to your email, signed-in apps, and even your Chrome browser history from your PC.

about 2 years ago - by  |  Leave a reply

Whether you’re trying to get the dust off your monitor or your kid’s fingerprints off your gorgeous new HDTV set, removing dust, dirt, and oil from the plethora of screens around you requires the right tools and the right touch. Read on as we show you how to safely clean your expensive screens.

about 2 years ago - by  |  37 Replies

If you let someone use your computer, they could gain access to your saved passwords, read your email, access all your files, and more. Instead of looking over their shoulder, just use your operating system’s guest account feature.

about 2 years ago - by  |  8 Replies

Whether you’re building your own computer, installing new RAM, or upgrading your PC’s components, you’ll be opening it up and touching sensitive electronics components. While doing this, you should be careful of static electricity, which can harm your computer.

about 2 years ago - by  |  8 Replies

Have you ever saved a password in your browser — Chrome, Firefox, Internet Explorer, or another one? Then your passwords are likely viewable by anyone with access to your computer while you’re logged in.

about 2 years ago - by  |  4 Replies

People talk about their online accounts being “hacked,” but how exactly does this hacking happen? The reality is that accounts are hacked in fairly simple ways — attackers don’t use black magic.

about 2 years ago - by  |  9 Replies

The Windows Task Manager is an important tool for every Windows user. It can show you why your computer is slow and help you deal with misbehaving and resource-hungry programs, whether they’re draining CPU, RAM, disk, or network resources.

about 2 years ago - by  |  6 Replies

Unlike a typical Windows machine, the little Raspberry Pi running Rasbian doesn’t exactly come with plug-‘n-play printer support. Read on as we show you how to add full-fledged print capabilities to your Pi unit.

about 2 years ago - by  |  12 Replies

Android allows you to create app shortcuts, but you can also create special shortcuts that link directly to screens within an app. For example, shortcuts could link to the Navigation screen in Maps or any screen in the Settings app.

about 2 years ago - by  |  2 Replies

We often fixate on smartphone battery life, but most laptops still don’t have all-day battery life. Rather than always using your laptop tethered to an outlet, here are some ways to squeeze more life from your laptop’s battery.

about 2 years ago - by  |  3 Replies

Google Cloud Print is a fantastic way to link your printers to the cloud and enjoy print-from-anywhere access, but there’s a catch. If you don’t have one of the recent Cloud-Print-Ready printers, you need to leave your computer on to enable remote access. Read on as we configure  a tiny, energy-sipping Raspberry Pi for the task.

about 2 years ago - by  |  12 Replies

Batteries need to be cared for properly — they’re a critical part of our mobile devices and battery technology hasn’t advanced as fast as other technologies. Unfortunately, there’s a lot of incorrect information about batteries out there.

about 2 years ago - by  |  21 Replies

If you’re disappointed that many of the “multiplayer” games you’ve picked up lately are either multiplayer because of lame mini-game content or require online-play, read on as we help a fellow HTG reader find the couch-based multiplayer content he craves.

about 2 years ago - by  |  2 Replies

Windows installation disc-customizing tools are always useful. They allow you to add Windows updates to your installation media, streamline the installation process by filling in your product key and other information, and customize Windows’ default settings.

about 2 years ago - by  |  5 Replies

Some people’s networked printers, cameras, routers, and other hardware devices are accessible from the Internet. There are even search engines designed to search such exposed devices. If your devices are secure, you won’t have to worry about this.

about 2 years ago - by  |  Leave a reply

It’s happened to most of us. You delete a file and realize you need it back. This guide will explain when you can get that file back and how to go about it.

about 2 years ago - by  |  3 Replies

Google is now pushing Chrome packaged apps, but many Chrome apps are still shortcuts to websites. You can make  your own custom web apps that function as shortcuts if the website you want isn’t available in the Chrome Web Store.

about 2 years ago - by  |  11 Replies

Deleting the cache is definitely something you’ll want to do if you are worried about your privacy. Just keep in mind that deleting the cache will only sorta delete those files — unless you overwrite the free space, you aren’t really deleting anything permanently. All you have to do is run a few utilities, and those deleted files are most likely going to be recovered.

about 2 years ago - by  |  16 Replies

Sandboxing is an important security technique that isolates programs, preventing malicious or malfunctioning programs from damaging or snooping on the rest of your computer. The software you use is already sandboxing much of the code you run every day.

about 2 years ago - by  |  2 Replies

The “Collections” feature on the Kindle has so much potential, but Amazon has done a terrible job implementing it. Read on as we show you how to use third-party tools to properly manage your Kindle Collections and make them truly useful.

about 2 years ago - by  |  11 Replies

Browser extensions extend your web browser with additional features, modify web pages, and integrate your browser with the other services you use. This guide will introduce you to the world of browser extensions and help you get started.

about 2 years ago - by  |  2 Replies

We’ve shown you how to jailbreak your Kindle in the past, but the new Paperwhite (with a beautiful higher resolution screen that begs for custom screensavers) requires a brand new bag of tricks to jailbreak. Read on as we jailbreak a Paperwhite and show off the new screensaver modes.

about 2 years ago - by  |  22 Replies

PC gaming isn’t quite as simple as console gaming. If you have a laptop with weak graphics hardware or an older PC, it’s important to check whether your computer can support a game before you spend your hard-earned cash.

about 2 years ago - by  |  29 Replies

There are some things you can only do from the command line, even on Windows. Some of these tools don’t have graphical equivalents, while others are just plain faster to use than their graphical interfaces.

about 2 years ago - by  |  25 Replies