If you want to build up your geek cred, join us for the second installment in our shell scripting series. We have a few corrections, a few improvements to last week’s script, and a guide on looping for the uninitiated.
Connecting to the internet from Wi-Fi hotspots, at work, or anywhere else away from home, exposes your data to unnecessary risks. You can easily configure your router to support a secure tunnel and shield your remote browser traffic—read on to see how.
There’s a hidden advantage to digital photography, and it’s called Exif. See what it is, how it can help you, and how you can use it to learn from skilled photographers all over the internet.
If you’ve been using Linux for some time (and even OS X) you’ll probably have come across a “permissions” error. But what exactly are they, and why are they necessary or useful? Let’s take an inside look.
If you have a lot of time and information invested in Facebook, it’s not easy moving to a new social network. Here are a few tips on moving your information from your Facebook account to your shiny new Google+ account.
It’s a classic effect: the black and white photo with the stark, isolated red. Here’s how to knock out that effect in Photoshop in ten seconds with our (GIMP friendly!) method.
One of the most common issues with aging laptops is overheating, something many people aren’t sure how to fix. We’ll help you figure out what’s causing the heat and how to keep your notebook functioning at a lower temperature.
Hypervisors are what make virtual machines possible, and they aren’t just for servers anymore. You probably use one every day and don’t even know it. If you don’t use one now, you will in the near future.
XBMC is an awesome open-source media center application that can be customized, thanks to an easy-to-skin interface, to give you the best looking media center on the block (and possibly in the county). Read on to see how.
You may have seen MD5 hashes listed next to downloads during your internet travels, but what exactly are they? Let’s take a look at what these cryptic strings are and how you can use them to verify your downloads.
The security debacle at Dropbox last week opened a lot of peoples’ eyes to the need for user-managed encryption for cloud-based storage. Read on to learn how to secure your Dropbox (and other cloud-based files) with Boxcryptor.
We’ve become reliant on digital cameras since they are so easy to use. But have you ever wondered how film-based photography works? Read on to increase your photographic knowledge—or to develop an new appreciation for your point and click camera.
We have already shown you how to clean your keyboard without breaking it, but did you know your smartphone can be just as dirty and covered with bacteria? Here is how to properly clean your smartphone.
What’s with that weird graph with all the peaks and valleys? You’ve seen it when you open Photoshop or go to edit a camera raw file. But what is that weird thing called a histogram, and what does it mean?
Whether you’re hosting a web page or running a Minecraft server, it’s a pain to keep track of IP addresses. Using a free dynamic DNS, you can turn 18.104.22.168 into mygeekydns.dyndns.org and be free from changing IPs.
Your friends are reporting spam and pleas for money originating from your email account and some of your logins aren’t working; you’ve been compromised. Read on to see what to do right now and how to protect yourself in the future.
We’ve already shown you some great ways to get your keyboard clean. For geeks that aren’t faint of heart, check out how to make your keyboard dishwasher safe and clean it with half the work and in half the time.
HDR tone mapping is everywhere these days; it’s sort of like Auto-Tuning equivalent of photography. Want to create High Dynamic Range images without the “HDR” look? Open up Photoshop or GIMP, and get ready to hack some images!
Syncing files between your computer and your iOS device via iTunes can be tedious and requires that you tether to your computer. Break free and enjoy wireless access to shared files from anywhere on your network—and beyond.
We’ve featured a lot of nicely designed icons for Windows, but have you ever wondered how to customize your own? Load up a web browser and your favorite image editor, because here’s an easy way to do it.
If there is one thing the iPad doesn’t lack for it’s games. Unfortunately if you’re in love with retro games from a bygone era, you’re largely out of luck. Today we take a look at how you can play SNES games on your iPad (and iPhone too!)
Your keyboard is one of your most important peripherals, but it’s bound to get clogged with dirt and grime over time. Dust off, scrub down, and clean up your number one input device safely with these tips.
Product keys are one of the most important parts of your computer. Unfortunately, most people don’t have them backed up. Here is how you can recover your product keys in case your computer crashes.
What better way to kick off your summer than building something to dazzle your neighbors with a symphony of booms, zaps, thumps, and other assorted better-call-the-ambulance noises? Read on as we highlight 10 geeky and dangerous projects.
Made for the photographer on the go, our newest HTG Cheat Sheet is designed to be printed and is conveniently credit card-sized to fit in most wallets. Carry critical photographic info with you wherever you go!