If you’ve ever wanted to relive your Mario Paint days, scatter stars all over a picture, or draw with cats, today you’re in luck. Here’s a simple how-to and video that will show you how to make custom Photoshop brushes.
What would BitTorrent look like if it was lightening fast, always available, completely private, and secure? It’d look a lot like Usenet. Read on to learn how to ditch Torrenting and enjoy super speeds and selection on Usenet.
Flashes are so convenient that flash photography is practically the norm. But have you stopped to think about what that flash is doing, or whether you need to use it at all?
Phones get stolen or lost everyday. With a plethora of data ripe for identity-theft on it, a lost phone can easily make your blood run cold. Take a deep breath, How-To Geek will talk you through this.
If you want to get serious about backing up your Android phone, including everything from system app data to saved Wi-Fi nodes, Titanium Backup can help. Read on to learn how to backup your Android phone from A to Z.
Ever spent ages working on a photo, only to upload it and find out it looks completely different in your browser? Let How To Geek explain why, and how you can easily fix the problem with Photoshop or GIMP.
If you bought a Wi-Fi only iPad and now you wish you could use GPS with it, this is the guide for you. Follow along to hook your iPad up to an external GPS unit and/or GPS-enabled smartphone phone.
Ever take one of those photos that’s great, except for a bunch of shadows that ruin the image? Here’s how to salvage that shot and bring the detail back out of those shadows in a few quick seconds.
Linux is pretty quick to boot on modern computers, but why not pare it down some more? If you’re hurting from a lack of SSD or just want to boot faster, E4rat will easily shave down your boot time.
The Windows Event Logs are a tremendous resource as they can not only help you troubleshoot current system issues, but can also provide you with warning signs of potential future problems. So keeping on top of the events your system records can be key to keeping your system running as it should. Unfortunately, sifting through the Event Logs or creating custom views can be a cumbersome manual process.
We’ve covered the manual methods of some fun Photoshop effects—now here’s they are in automatic. Download the How-To Geek Photoshop Action Pack, and get those effects in seconds with the touch of a button.
Many ebook readers natively support PDF documents but, unfortunately, not all PDF documents are easy to read on a small ebook reader screen. Let’s take a look at two simple and free ways to convert PDF files for enjoyable reading.
Want to make photos really stand out? Create a fun Red/Cyan 3D effect that will pop off the page and screen, just because it’s a heck of a lot of fun. Grab your 3D glasses, and either Photoshop or GIMP!
Google has a tremendous number of free services they offer which many of your probably take advantage of. But have you ever considered what you might lose if all of a sudden you lost access to your account? Just like all important data on your hard drive, your critical data in “the cloud” should also have backup consideration.
Don’t be in the dark about who is visiting what web sites on your LAN. Use our two-prong approach to lock in on who is browsing what on your home network.
Ever seen a mall photobooth create a “pencil drawing” from a photo? Give us about one minute, and see how you can create an easy grayscale image effect that looks like a tonal pencil drawing. Check it out!
We’ve been covering topics on shell scripting because Linux can be put on almost anything. The versatility of the command-line shell is what really allows this, but what makes each shell different and why do people prefer one over another?
You’ve probably seen lots of vintage photo effects, or maybe even made some of your own using software like Instagram. Today we’ll look at a few “vintage effects” and see how they can be replicated in either GIMP or Photoshop.
Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network.
One of the most convenient tools browsers offer is the ability to save and automatically prefill your passwords on login forms. Because so many sites require accounts and it is well known (or should be at least) that using a shared password is a big no-no, a password manager is almost essential.
Sometimes, graphics editing is useful. And sometimes, you use it to turn things invisible just because you can. Here’s how to make invisibility cloaks in Photoshop in a few minutes, with our GIMP friendly technique.
If you want to build up your geek cred, join us for the second installment in our shell scripting series. We have a few corrections, a few improvements to last week’s script, and a guide on looping for the uninitiated.
Connecting to the internet from Wi-Fi hotspots, at work, or anywhere else away from home, exposes your data to unnecessary risks. You can easily configure your router to support a secure tunnel and shield your remote browser traffic—read on to see how.
There’s a hidden advantage to digital photography, and it’s called Exif. See what it is, how it can help you, and how you can use it to learn from skilled photographers all over the internet.
If you’ve been using Linux for some time (and even OS X) you’ll probably have come across a “permissions” error. But what exactly are they, and why are they necessary or useful? Let’s take an inside look.