Most of you probably never even think about the Windows build number — after all, it’s not something you see very often, and it doesn’t matter. But it does hold an interesting secret since Windows Vista.
Come and join us as we make a the world a safer place using our Windows Firewall in this edition of Geek School.
The new Copyright Alert System, also known as the “Six Strikes” system, marks the beginning of ISPs in the USA attempting to police their subscribers’ Internet usage. The “punishments” include increasingly harsh alerts, bandwidth throttling, and restricting browsing activity.
In the last two articles, we looked at how to prepare your PC for network access. In this installment, we are going to look at wireless network configuration.
Much of the data on your Android phone or tablet is backed up by Google (or the individual apps you use) automatically. Your photos can also be backed up automatically, but aren’t by default. However, some data is never backed up automatically.
Last time we looked at the theory behind IP addresses, subnet masks and name resolution, and we ended the installment with a practical guide on how to change your network settings. This time we take that knowledge and extend it by introducing things like DHCP, Network Locations, Ping and much more.
In order to enjoy more diverse media playback on your Raspberry Pi micro computer, you need to manually enable the MPEG-2 and VC-1 codecs. Read on to see how to do so and enjoy DVD playback and more on your Pi.
Google Chrome allows other programs on your computer to install system-wide Chrome extensions. Chrome even allows these extensions to prevent you from disabling or removing them via Chrome’s Extensions page.
In this edition of Geek School, we are going to look at how IP addressing works. We will also cover some advanced topics like how your PC determines if the device you are communicating with is on the same network as you. We will then finish with a brief look at two name resolution protocols: LLMNR and DNS.
Increasingly sophisticated phones and data-hungry applications make it easier than ever to blow through your data plan’s cap and incur overage charges. Read on as we show you how to manage your data use and avoid unwelcome charges.
Have you seen that message in Windows 8 that tells you your computer is going to reboot and there is not a thing you can do about it except save your work? Here’s how to make sure that never happens again. This tip works for Windows 7 as well.
Internet Explorer is a complex piece of software and hasn’t always been the browser choice of us geeks, but the truth is that it has gotten a lot better over the years so come and see what it has to offer.
The Raspberry Pi makes a nice compact platform to attach an indicator light to for all sorts of projects—weather notification, new emails, etc. Read on as we show you how to hook up an LED module to your Pi and set up some basic notifications.
The tech press is constantly writing about new and dangerous “zero-day” exploits. But what exactly is a zero-day exploit, what makes it so dangerous, and – most importantly – how can you protect yourself?
The Caps Lock key is outdated and mostly useless. Most people will only ever trigger it accidentally. Google replaced the Caps Lock key with a Search key on its Chromebooks, and you can do the same thing on Windows.
Entering your online-banking or email passwords on an untrusted computer – particularly one in a public place – is risky. If you had a USB drive with Linux installed on it, you could log into your accounts without fear.
BitLocker is a lesser-known technology included in Windows that allows you to both password protect and encrypt the contents of your storage mediums.
Browser plug-ins like Flash and Java add additional features web pages can use. However, they can also slow things down when in use or add extra security holes, particularly in the case of Java.
Have you ever wondered why your favorite game from Windows 95 just doesn’t seem to run on Windows 7 but other applications do? Well we have the answer for you, as well as a few solutions for how to fix it.
Browsers are packed with settings and options, many of which are hidden. Each browser has a place where you can change advanced settings that aren’t available in its standard options window.
Hard Drives: every computer running Windows has them and none can function without them. They house all our data, so we should set them up correctly. Read on to learn more about how to use RAID to protect your data.
Web browsers store your personal data – bookmarks, history, settings, extensions, and more – in a profile. You can create separate profiles to split things up – for example, you could have one profile for work and one for play.
It was only a matter of time before somebody figured out how to use Metro / Modern apps in a regular desktop window, and naturally it was Stardock who came up with the solution. It’ll cost you a couple of bucks, but you can use the trial mode for free.
In this edition of Geek School we are going to cover the configuration of hardware in Windows 7. Come join us.
If you’re looking to relive the classic titles of yesterday on the console you have today, the Nintendo Wii makes a perfect platform for emulating older Nintendo Entertainment System and Super Nintendo Entertainment System titles—read on as we show you how.