FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Despite the ever increasing reach of cellular data networks there are still plenty of places where the only cell coverage you’re going to get is sparse at best with phone calls and plain text messages (SMS) only. Read on as we show you how to set up text message alerts so even when your email client can’t update you’ll still get critical notifications.

about 2 years ago - by  |  2 Replies

Wi-Fi isn’t the same in every country. Regulatory agencies in countries around the world limit Wi-Fi to different parts of the radio frequency spectrum. Some routers broadcast the countries they think they’re in.

about 2 years ago - by  |  1 Reply

Not everyone has unlimited cellular data. If you find yourself going over your cellular data allowance and paying overage charges or getting throttled, you can make your iPhone use less data.

about 2 years ago - by  |  2 Replies

Two-factor authentication systems aren’t as foolproof as they seem. An attacker doesn’t actually need your physical authentication token if they can trick your phone company or the secure service itself into letting them in.

about 2 years ago - by  |  11 Replies

Ubuntu’s installer offers an easy “Use LVM” checkbox. The description says it enables Logical Volume Management so you can take snapshots and more easily resize your hard disk partitions — here’s how to do that.

about 2 years ago - by  |  1 Reply

Apple’s new MacBook has a single USB Type-C port, but this isn’t an Apple-only standard. This is a new USB standard, and — given time — it’ll spread to everything that currently uses an older, larger USB connector.

about 2 years ago - by  |  14 Replies

Macs offer a way to hide files and folders, just like other operating systems. But Mac OS X hides these options and doesn’t make it as easy as it is on Windows and Linux.

about 2 years ago - by  |  1 Reply

Anytime somebody has hard drive errors, I always recommend that they run chkdsk—what geek wouldn’t? Here’s a full guide to using the Check Disk feature built into every version of Windows.

about 2 years ago - by  |  Comments (52)

Keyboard shortcuts aren’t just for web browsers themselves. Most of those web apps you use — everything from Facebook and Twitter to Gmail and Outlook.com — offer keyboard shortcuts you can use to speed things up.

about 2 years ago - by  |  1 Reply

Apple has added an increasingly sophisticated app permission system to iOS over the years. It’s up to you whether an app gets access to everything from your device’s sensors and personal information to notifications and cellular data.

about 2 years ago - by  |  1 Reply

You are no doubt reading this article because you are wondering what on earth this conhost.exe process is doing in Task Manager, and why it’s running on your shiny new Windows PC. We’ve got the answer for you.

about 2 years ago - by  |  Comments (58)

Modern smartphone embed GPS coordinates in each photo they take. Yes, those photos you’re taking have location data embedded in them — at least by default. Many modern digital cameras also do this.

about 2 years ago - by  |  1 Reply

Too many browser tabs! It’s a problem everyone has at some point. For all the window-management tricks built into our desktops, we often just use a single browser window packed with tabs.

about 2 years ago - by  |  10 Replies

Minecraft is and, for the foreseeable future, will remain one of the most popular video games among children. Behind all those millions upon millions of downloads are more than a few curious parents; read on as we help clear up some misconceptions and give curious parents a crash course in the game.

about 2 years ago - by  |  4 Replies

uTorrent recently made headlines for bundling cryptocurrency-mining junkware. Out of all the junkware programs bundled with installers, cryptocurrency-miners like Epic Scale are some of the worst.

about 2 years ago - by  |  9 Replies

Want to use a VPN? If you’re looking for a VPN provider or setting up your own VPN, you’ll need to choose a protocol. Some VPN providers may even provider you with a choice of protocols.

about 2 years ago - by  |  22 Replies

Once a concern that was the province of the paranoid, years worth of reports and revelations have made it readily apparent that people really can (and do) spy on you through your webcam. Read on as we discuss why you should disable or cover your webcam, how you can do so, and review some handy products that can help make the job simple.

about 2 years ago - by  |  31 Replies

Ctrl+Alt+Delete isn’t just necessary on Windows and other desktop operating systems. Applications can freeze or get stuck in bad states on modern iPhones, iPads, and Android devices too.

about 2 years ago - by  |  6 Replies

Windows has Ctrl+Alt+Delete and Macs have Command+Option+Escape to force frozen applications to close. Linux has its own ways of “killing” those misbehaving processes, whether they’re graphical windows or background processes.

about 2 years ago - by  |  5 Replies

Always-listening voice commands are a big thing now. You don’t need an Xbox one or Amazon Echo for this — just make your phone, tablet, or computer always listen for voice commands.

about 2 years ago - by  |  3 Replies

Remember when uTorrent was great? The upstart BitTorrent client was super-lightweight and trounced other popular BitTorrent clients. But that was long ago, before BitTorrent, Inc. bought uTorrent and crammed it full of junkware and scammy advertisements.

about 2 years ago - by  |  19 Replies

The internet went crazy today when somebody figured out that uTorrent was bundling a piece of crapware called EpicScale that uses your computer to mine for Bitcoins, and according to many reports, was silently installed. The even bigger problem is that it doesn’t uninstall clean, so we’re going to show you how to do that today.

about 2 years ago - by  |  11 Replies

Macs include a Wireless Diagnostics tool that can help you speed up your Wi-Fi network and improve its signal strength. It also includes many additional tools for power users.

about 2 years ago - by  |  1 Reply

All modern smartphone, tablet, and desktop operating systems offer secure ways to give a guest access to your computer. Lock them to a specific app or give them restricted access to your PC. Forget looking over their shoulder!

about 2 years ago - by  |  4 Replies

Fewer things annoy us than when we set our Android tablet aside for a few days only to return to a low or even dead battery. This shouldn’t be happening, so it’s time to try to fix it.

about 2 years ago - by  |  10 Replies