Hard drives use S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) to gauge their own reliability and determine if they’re failing. You can view your hard drive’s S.M.A.R.T. data and see if it has started to develop problems.
If Windows won’t boot, recovering your files can be a headache. You do not have to pull the hard drive or use a Linux live CD – you can use a Windows installer disc to quickly back up your files.
For years, Java has been the top source of browser exploits. Even after a recent emergency patch, Java is still vulnerable. To protect ourselves, we should assume that Java is always going to be vulnerable.
Google’s Chrome Web Store offers a variety of themes for Chrome, which include background images for your new tab page and custom colors. Even better — you can create your own theme in just a few minutes.
We’ve covered virtual private networks and when you might want to use them before. Connecting to a VPN is easy, as Windows and most other operating systems offer built-in VPN support.
A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.
The NTFS file system used by Windows has a built-in compression feature known as NTFS compression. With a few clicks, you can compress files, making them take up less space on your hard drive. Best of all, you can still access the files normally.
Open home Wi-Fi networks are still too common. The situation has improved as wireless router manufacturers began shipping with wireless passwords enabled by default, but there are still too many unsecured Wi-Fi networks out there.
The Professional edition of Windows 8 comes with “downgrade rights.” If you’re not happy with Windows 8 on a new computer, you can downgrade it to Windows 7 for free – as long as you have Windows 8 Pro.
Computer repair places like Best Buy’s Geek Squad do a lot of things that you can easily do yourself. Instead of paying for a pricy malware removal or computer tune-up, you can do it yourself.
You’ve got WEP encryption enabled, your network’s SSID is hidden, and you’ve enabled MAC address filtering so no one else can connect. Your Wi-Fi network is secure, right? Not really.
Facebook, Twitter, Google, Dropbox, and all the other web services out there can be accessed by various applications and other services. Here’s a couple of links that you can use to quickly remove anything that has access.
If you’re looking to purchase Windows 8, there are two main editions you need to concern yourself with: Windows 8 (similar to the Home edition in previous versions of Windows) and Windows 8 Pro.
We’ve written about rooting your Android smartphones and tablets before, but why don’t they come rooted? Google argues that rooting is a mistake for security reasons, as it subverts Android’s security model.
We at How-To Geek appreciate all our readers and hope you have learned new and interesting things from our many articles. We’ve collected the top 25 articles published on How-To Geek in 2012.
In a world where you can have 3D scenes rendered in real time as your smartphone’s background, plain black wallpapers aren’t the most eye-catching option. However, they can offer battery life improvements over colored wallpapers on some displays.
Installing RAM should be as simple as placing the new RAM into the slots and powering on your computer. However, a number of issues – both hardware and software related – can cause problems when installing new RAM.
One of the noticeable changes in Windows 8 was the exclusion of the Wireless Profile manager that was included in Windows 7. While there are a lot of third-party tools to change the priority of the networks you connect to, we’re going to show you how to do it natively in Windows 8.
Routers protect their web interfaces, where you can configure their networking, parental control, and port forwarding settings, with a username and password. These default passwords can be changed to protect the router’s settings.
Two-factor authentication, also known as 2-step verification, provides additional security for your online accounts. Even if someone discovers your password, they’ll need a special one-time code to log in after you enable two-factor authentication on these services.
Have you ever noticed that a pixel – a little dot on your computer’s LCD monitor – is staying a single color all of the time? You have a stuck pixel. Luckily, stuck pixels aren’t always permanent.
Safe mode can help you troubleshoot your Android, but sometimes you’ll need to wipe everything and restore your device to its factory state. You can even perform a factory reset when your Android phone or tablet won’t boot normally.
When we first released our Geek Trivia app, it was sadly only available in the US store for Windows 8, but now you can get it no matter where you live. It’s completely free, so get your copy right now!
On your Windows PC, you can boot into safe mode to load Windows without any third-party software. You can do the same on Android with Android’s safe mode. In safe mode, Android won’t load any third-party applications.
The media is full of reports saying Android malware is exploding and that Android users are at risk. Does this mean you should install an antivirus app on your Android phone or tablet?