You’ve probably heard that you always need to use the Safely Remove Hardware icon before unplugging a USB device. However, there’s also a good chance that you’ve unplugged a USB device without using this option and everything worked fine.

about 3 years ago - by  |  Comments (44)

AppArmor is an important security feature that’s been included by default with Ubuntu since Ubuntu 7.10. However, it runs silently in the background, so you may not be aware of what it is and what it’s doing.

about 3 years ago - by  |  Comments (5)

The keyboard and mouse might be a good fit for many native computer games, but it feels downright weird to play emulated games that way. Whether you want to play Super Mario with a proper gamepad or try out a new PC title like Diablo III in comfort, we’ve got you covered.

about 3 years ago - by  |  Comments (22)

One of the defining features of Linux and other UNIX-like operating systems is that “everything is a file.” This is an oversimplification, but understanding what it means will help you understand how Linux works.

about 3 years ago - by  |  Comments (16)

Private Browsing, InPrivate Browsing, Incognito Mode – it has a lot of names, but it’s the same basic feature in every browser. Private browsing offers some improved privacy, but it’s not a silver bullet that makes you completely anonymous online.

about 3 years ago - by  |  Comments (17)

Installing software on Linux involves package managers and software repositories, not downloading and running .exe files from websites like on Windows. If you’re new to Linux, this can seem like a dramatic culture shift.

about 3 years ago - by  |  Comments (17)

You meant well, you intended to be a good file custodian, but somewhere along the way things got out of hand and you’ve got duplicate photos galore. Don’t be afraid to delete them and lose important photos, read on as we show you how to clean safely.

about 3 years ago - by  |  Comments (16)

If you’re coming from Windows, the Linux file system structure can seem particularly alien. The C:\ drive and drive letters are gone, replaced by a / and cryptic-sounding directories, most of which have three letter names.

about 3 years ago - by  |  Comments (36)

Have you ever connected your Laptop to a wired network point in your house and continued to get wireless  network speeds ? Here’s how you can quickly fix that, the easy way.

about 3 years ago - by  |  Comments (21)

More and more banks, credit card companies, and even social media networks and gaming sites are starting to use two-factor authentication. If you’re a little unclear on what it is or on why you’d want to start using it, read on to learn how two-factor authentication can keep your data secure.

about 3 years ago - by  |  Comments (10)

Windows RT is a special edition of Windows 8. It runs on ARM and you’ll find it alongside Intel x86 machines in stores, but you’ll be surprised just how much Windows RT differs from the Windows you know.

about 3 years ago - by  |  Comments (40)

Whether you plan on using Windows 8 or not, everyone buying a PC in the future will end up with the Microsoft-driven Secure Boot feature enabled. Secure Boot prevents “unauthorized” operating systems and software from loading during the startup process.

about 3 years ago - by  |  Comments (38)

The font options included with the Kindle are certainly serviceable, but why limit yourself? Today we’ll show you how to easily swap out the font files on your Kindle for a completely customized reading experience.

about 3 years ago - by  |  Comments (7)

If you’re trying to keep up with news and content on multiple web sites, you’re faced with the never ending task of visiting those sites to check for new content. Read on to learn about RSS and how it can deliver the content right to your digital doorstep.

about 3 years ago - by  |  Comments (19)

You’ve probably heard that you need to overwrite a drive multiple times to make the data unrecoverable. Many disk-wiping utilities offer multiple-pass wipes. This is an urban legend – you only need to wipe a drive once.

about 3 years ago - by  |  Comments (126)

Some forms of tracking are obvious – for example, websites know who you are if you’re logged in. But how do tracking networks build up profiles of your browsing activity across multiple websites over time?

about 3 years ago - by  |  Comments (23)

Want to get the latest version of Windows 8 right now? This one is called the Release Preview, and it’s available for download right now. There’s a lot of little bugs resolved, the multi-monitor support has improved, and you should download it now.

about 3 years ago - by  |  Comments (32)

If you’re a Linux user, you’ve probably heard that you don’t need to defragment your Linux file systems. You’ll also notice that Linux distributions don’t come with disk-defragmenting utilities. But why is that?

about 3 years ago - by  |  Comments (78)

Setting up your ebook reader to receive bundles of articles from web sites that interest you is a great way to add functionality and great content. Read on as we show you how to turn the RSS feeds from your favorite sites into ebooks.

about 3 years ago - by  |  Comments (1)

Ubuntu and Linux Mint are two of the most popular desktop Linux distributions at the moment. If you’re looking to take the dive into Linux – or you’ve already used Ubuntu or Mint – you wonder how they’re different.

about 3 years ago - by  |  Comments (38)

Your browser sends its user agent to every website you connect to. We’ve written about changing your browser’s user agent before – but what exactly is a user agent, anyway?

about 3 years ago - by  |  Comments (12)

If you’re looking for a free but powerful solution to automate your Windows wallpaper switching, read on as we show you how to pull fresh wallpaper from your computer, wallpaper web sites, RSS feeds, and custom image searches.

about 3 years ago - by  |  Comments (3)

When you’re shooting portraits, the soft background look keeps distracting backgrounds from ruining a shot. If you’ve not shot correctly, here’s a quick, simple tip to pop out your foreground and keep the most important parts the most visible.

about 3 years ago - by  |  Comments (3)

Each major web browser shares a large number of keyboard shortcuts in common. Whether you’re using Mozilla Firefox, Google Chrome, Internet Explorer, Apple Safari, or Opera – these keyboard shortcuts will work in your browser.

about 3 years ago - by  |  Comments (77)

Encryption tools exist to protect your privacy… and also to make you feel like you’re an awesome spy. Today we’ll use a portable USB drive to hold all of your passwords encrypted in a virtual disk hidden inside a file.

about 3 years ago - by  |  Comments (42)