Linux is pretty quick to boot on modern computers, but why not pare it down some more? If you’re hurting from a lack of SSD or just want to boot faster, E4rat will easily shave down your boot time.
The Windows Event Logs are a tremendous resource as they can not only help you troubleshoot current system issues, but can also provide you with warning signs of potential future problems. So keeping on top of the events your system records can be key to keeping your system running as it should. Unfortunately, sifting through the Event Logs or creating custom views can be a cumbersome manual process.
We’ve covered the manual methods of some fun Photoshop effects—now here’s they are in automatic. Download the How-To Geek Photoshop Action Pack, and get those effects in seconds with the touch of a button.
Many ebook readers natively support PDF documents but, unfortunately, not all PDF documents are easy to read on a small ebook reader screen. Let’s take a look at two simple and free ways to convert PDF files for enjoyable reading.
Want to make photos really stand out? Create a fun Red/Cyan 3D effect that will pop off the page and screen, just because it’s a heck of a lot of fun. Grab your 3D glasses, and either Photoshop or GIMP!
Google has a tremendous number of free services they offer which many of your probably take advantage of. But have you ever considered what you might lose if all of a sudden you lost access to your account? Just like all important data on your hard drive, your critical data in “the cloud” should also have backup consideration.
Don’t be in the dark about who is visiting what web sites on your LAN. Use our two-prong approach to lock in on who is browsing what on your home network.
Ever seen a mall photobooth create a “pencil drawing” from a photo? Give us about one minute, and see how you can create an easy grayscale image effect that looks like a tonal pencil drawing. Check it out!
We’ve been covering topics on shell scripting because Linux can be put on almost anything. The versatility of the command-line shell is what really allows this, but what makes each shell different and why do people prefer one over another?
You’ve probably seen lots of vintage photo effects, or maybe even made some of your own using software like Instagram. Today we’ll look at a few “vintage effects” and see how they can be replicated in either GIMP or Photoshop.
Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network.
One of the most convenient tools browsers offer is the ability to save and automatically prefill your passwords on login forms. Because so many sites require accounts and it is well known (or should be at least) that using a shared password is a big no-no, a password manager is almost essential.
Sometimes, graphics editing is useful. And sometimes, you use it to turn things invisible just because you can. Here’s how to make invisibility cloaks in Photoshop in a few minutes, with our GIMP friendly technique.
If you want to build up your geek cred, join us for the second installment in our shell scripting series. We have a few corrections, a few improvements to last week’s script, and a guide on looping for the uninitiated.
Connecting to the internet from Wi-Fi hotspots, at work, or anywhere else away from home, exposes your data to unnecessary risks. You can easily configure your router to support a secure tunnel and shield your remote browser traffic—read on to see how.
There’s a hidden advantage to digital photography, and it’s called Exif. See what it is, how it can help you, and how you can use it to learn from skilled photographers all over the internet.
If you’ve been using Linux for some time (and even OS X) you’ll probably have come across a “permissions” error. But what exactly are they, and why are they necessary or useful? Let’s take an inside look.
If you have a lot of time and information invested in Facebook, it’s not easy moving to a new social network. Here are a few tips on moving your information from your Facebook account to your shiny new Google+ account.
It’s a classic effect: the black and white photo with the stark, isolated red. Here’s how to knock out that effect in Photoshop in ten seconds with our (GIMP friendly!) method.
One of the most common issues with aging laptops is overheating, something many people aren’t sure how to fix. We’ll help you figure out what’s causing the heat and how to keep your notebook functioning at a lower temperature.
Hypervisors are what make virtual machines possible, and they aren’t just for servers anymore. You probably use one every day and don’t even know it. If you don’t use one now, you will in the near future.
XBMC is an awesome open-source media center application that can be customized, thanks to an easy-to-skin interface, to give you the best looking media center on the block (and possibly in the county). Read on to see how.
You may have seen MD5 hashes listed next to downloads during your internet travels, but what exactly are they? Let’s take a look at what these cryptic strings are and how you can use them to verify your downloads.
The security debacle at Dropbox last week opened a lot of peoples’ eyes to the need for user-managed encryption for cloud-based storage. Read on to learn how to secure your Dropbox (and other cloud-based files) with Boxcryptor.
We’ve become reliant on digital cameras since they are so easy to use. But have you ever wondered how film-based photography works? Read on to increase your photographic knowledge—or to develop an new appreciation for your point and click camera.