If you’ve ever purchased a computer with a hard disk capacity of 500 GB and opened Windows Explorer only to find that its capacity looked more like 440 GB, you may be wondering where all those gigabytes went.
As usual, there’s yet another security hole in the Java Runtime Environment, and if you don’t disable your Java plugin, you’re at risk for being infected with malware. Here’s how to do it.
Did you know you could be connected to facebook.com – and see facebook.com in your web browser’s address bar – while not actually being connected to Facebook’s real website? To understand why, you’ll need to know a bit about DNS.
Do you use a webmail service you’re unhappy with because it’s where all your email is? There’s good news – you can easily switch, without losing your old email and contacts and without missing email sent to your old address.
Channing a process’s affinity means that you limit the application to only run on certain logical processors, which can come in terribly handy if you have an application that is hogging all the CPU. Here’s how to choose the processor for a running application.
UPnP comes enabled by default on many new routers. At one point, the FBI and other security experts recommended disabling UPnP for security reasons. But how secure is UPnP today? Are we trading security for convenience when using UPnP?
Windows 8’s Family Safety features allow you to monitor your children’s computer usage, get weekly reports, set time limits for computer use, filter inappropriate websites, block children from using certain applications, and more.
The desktop versions of Solitaire and Minesweeper are gone in Windows 8, replaced with Xbox-integrated full-screen versions. While the classic desktop versions are missing in action, there’s a way to get them back.
There are two types of firewalls: hardware firewalls and software firewalls. Your router functions as a hardware firewall, while Windows includes a software firewall. There are other third-party firewalls you can install, too.
Windows 8 is more integrated with Microsoft’s services than ever. When you create a user account on your computer, you’ll be prompted to use a Microsoft account. Microsoft accounts are different from local user accounts, which are still available.
One of the first messages you’ll see after logging into Windows 8 for the first time (aside from a message about activating Windows) is a request to “Trust this PC.” But why does Microsoft want you to “trust” your PC?
There are few security problems a healthy dose of paranoia and know-how can’t take care of. Today we’re looking at how to secure your Android phone’s mobile data connection against intrusion using free software and a simple SSH tunnel.
For a long time Linux users have been able to install their OS onto a portable USB drive, but Windows just caught up. Read on to find out how you can install Windows 8 onto a USB drive so you can take it wherever you go.
Consider this a public service announcement: Scammers can forge email addresses. Your email program may say a message is from a certain email address, but it may be from another address entirely.
Have you noticed your usually speedy IE9 browser slowing down, or even crashing on you? Unnecessary plugins, extensions, and even browsing data can slow your browser down to a crawl, or make it crash. Here’s how to fix it.
Each version of Android since Gingerbread (Android 2.3) has included an Easter egg, which is always accessed in the same way. The Easter eggs in the latest versions are becoming more complex, with animations and interactivity.
Try to install an extension from outside the Chrome Web Store and Chrome will tell you that extensions “can only be added from the Chrome Web Store.” However, this message is incorrect – you can still install extensions from elsewhere.
Have you noticed your usually speedy Firefox browser slowing down, or even crashing on you? Unnecessary plugins, extensions, and even browsing data can slow your browser down to a crawl, or make it crash. Here’s how to fix it.
If thoughts of playing Maniac Mansion, The Secret of Monkey Island, Kings Quest, and other classic point-and-click adventures sends tingles of nostalgia to your mouse hand, read on as we show you how to enjoy the classics on your computer with ScummVM.
If you’ve been holding off on setting up a media center computer because they’re loud, expensive, don’t fit in your media rack, or all of the above, read on to see how you can build a $35 XBMC-based media center with plug-and-play ease.
If you’re a Linux user, you may have seen zombie processes shambling around your processes list. You can’t kill a zombie process because it’s already dead – like an actual zombie.
Have you ever noticed that your browser sometimes displays a website’s organization name on an encrypted website? This is a sign that the website has an extended validation certificate, indicating that the website’s identity has been verified.
IPv4 addresses on the public Internet are running low. Microsoft paid $7.5 million for Nortel’s 666,624 IP addresses when Nortel went bankrupt in 2011 – that’s over $8 an IP address. IPv4 has technical problems, and IPv6 is the solution.
When a Linux system boots, it enters its default runlevel and runs the startup scripts associated with that runlevel. You can also switch between runlevels – for example, there’s a runlevel designed for recovery and maintenance operations.