You’re guaranteed to stumble into an occasional error page while browsing the web. This guide will help you understand exactly what each error page means and what to do when you see them.
DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.
We all want the replicator from Star Trek: a machine that can create any object we desire. 3D printers, which create objects from plastics and other materials, are the closest things we have. And they’re getting cheaper every year.
The more software you install on your computer, the longer it may seem to take to start up Windows. Many programs add themselves to the list of programs started when you boot your computer, and that list can get long.
A cheap power strip might protect equipment from power surges, but it does nothing to help when the power goes out and your system comes to a halting crash. Read on as we show you how to buy the right battery backup device for your needs.
Whether you want to sell off your old smartphone to pay for the new one, add a little cash to your fun money pile, or to put the proceeds toward Christmas, we’re here to help. Read on as we outline the best ways to turn your old gear into money.
Modern gadgets are power hungry. If you want to make it through a long commute or a cross-country flight without having to plug your tablet or gaming device in, you’re going to need an external battery pack to keep the electrons flowing. Read on as we show you how to shop for a pack that will meet your needs and keep your screens glowing.
So it’s the end of the road for your PC, tablet, or smartphone. Before letting go, be sure to follow this quick check list to prepare your device for its new owner.
Whether you are setting up your computer speakers or a complex home theater bundle, understanding the art and science of speaker channels and placement is the most critical step in enjoying your new sound system. Read on as we guide you through a crash course in surround sound setup.
Any time you make a change to the Windows Registry, any responsible article will probably tell you to backup the registry first. But how do you do that? It’s not quite as simple as you might think.
When you sign up for cable Internet service, you need a modem. You’re often asked to choose between renting the modem from your Internet service provider for a monthly fee or buying it outright.
Verizon FIOS is great — the speeds are incredible, and the price is… well, kinda expensive. The real problem is that the terrible router they give you needs to be rebooted all the time, which is a royal pain considering it’s down in the basement. Plus, I don’t want to get off the couch.
We’ve long railed against registry cleaners and system tuners as useless products that waste your money, but how do you go about cleaning up after uninstalling shady freeware? Answer: You don’t. You avoid installing nonsense on your PC to begin with by testing everything in a virtual machine first. Snapshots just make it easier.
If you’re planning on doing a reinstall of Windows but can’t find your product key, you’re in luck because it’s stored in the Windows Registry… it’s just not easy to find, and it’s impossible to read without some help. Luckily, we’re here to help.
Barely a month had passed after we told you to let Windows Update automatically keep your PC updated before Microsoft decided to make us look bad by releasing a couple of really bad updates that broke people’s computers. So today we’re going to show you how to roll things back should an update break everything.
Most people use their operating system’s included file manager, but many geeks prefer third-party file managers. After all, Windows Explorer doesn’t offer tabs, a dual-pane interface, batch file-renaming tools, and more advanced features.
Screenshots are great, but sometimes you need to create a video recording to really get your point across. You can record your computer’s desktop, your smartphone’s screen, or your tablet’s display.
Your Mac’s Services menu can be very useful. The Services menu has become a hidden feature used mostly be power-users, but it’s very easy to use. It’s a bit like the Share features on Android or iOS.
We love Bluetooth and all its possibilities. Once the domain of dorky headsets, Bluetooth is now in mice, keyboards, phones, computers, tablets, fitness trackers, and so much more. One of the best applications we’ve seen, however, is Bluetooth audio.
Google rolls out Android updates slowly, even to their own Nexus devices. It may take weeks before an over-the-air update becomes available via the System updates screen, but you can skip the wait.
Animations on a desktop PC, smartphone, or tablet are nice — the first few times. Eventually, you just wish they would hurry up and stop wasting your time.
Keeping your home router updated is a crucial part of staying secure. Shellshock affected a number of routers, and we’ve also seen routers hacked and turned into botnets. Home router security is notoriously poor.
Gatekeeper is how Apple is “locking down” Mac OS X, forcing it to only run Apple-approved software by default. But a Mac is locked down in the same way Android is locked down — you’re free to change an option and install any application you want.
Consoles have come a long way from cartridges. Today, they’re practically just gaming PCs and include built-in storage for save files, game updates, and digital-download games.
One of the great things about Linux is that you can do the same thing hundreds of different ways—even something as simple as generating a random password can be accomplished with dozens of different commands. Here’s 10 ways you can do it.