SEARCH

FEATURED ARTICLES / THE BEST OF HOW-TO GEEK

Google has a tremendous number of free services they offer which many of your probably take advantage of. But have you ever considered what you might lose if all of a sudden you lost access to your account? Just like all important data on your hard drive, your critical data in “the cloud” should also have backup consideration.

about 3 years ago - by  |  Comments (22)

Don’t be in the dark about who is visiting what web sites on your LAN. Use our two-prong approach to lock in on who is browsing what on your home network.

about 3 years ago - by  |  Comments (18)

Ever seen a mall photobooth create a “pencil drawing” from a photo? Give us about one minute, and see how you can create an easy grayscale image effect that looks like a tonal pencil drawing. Check it out!

about 3 years ago - by  |  Comments (43)

We’ve been covering topics on shell scripting because Linux can be put on almost anything. The versatility of the command-line shell is what really allows this, but what makes each shell different and why do people prefer one over another?

about 3 years ago - by  |  Comments (11)

You’ve probably seen lots of vintage photo effects, or maybe even made some of your own using software like Instagram. Today we’ll look at a few “vintage effects” and see how they can be replicated in either GIMP or Photoshop.

about 3 years ago - by  |  Comments (12)

Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network.

about 3 years ago - by  |  Comments (37)

One of the most convenient tools browsers offer is the ability to save and automatically prefill your passwords on login forms. Because so many sites require accounts and it is well known (or should be at least) that using a shared password is a big no-no, a password manager is almost essential.

about 3 years ago - by  |  Comments (28)

Sometimes, graphics editing is useful. And sometimes, you use it to turn things invisible just because you can. Here’s how to make invisibility cloaks in Photoshop in a few minutes, with our GIMP friendly technique.

about 3 years ago - by  |  Comments (9)

If you want to build up your geek cred, join us for the second installment in our shell scripting series. We have a few corrections, a few improvements to last week’s script, and a guide on looping for the uninitiated.

about 3 years ago - by  |  Comments (6)

Connecting to the internet from Wi-Fi hotspots, at work, or anywhere else away from home, exposes your data to unnecessary risks. You can easily configure your router to support a secure tunnel and shield your remote browser traffic—read on to see how.

about 3 years ago - by  |  Comments (56)

There’s a hidden advantage to digital photography, and it’s called Exif. See what it is, how it can help you, and how you can use it to learn from skilled photographers all over the internet.

about 3 years ago - by  |  Comments (13)

If you’ve been using Linux for some time (and even OS X) you’ll probably have come across a “permissions” error. But what exactly are they, and why are they necessary or useful? Let’s take an inside look.

about 3 years ago - by  |  Comments (10)

If you have a lot of time and information invested in Facebook, it’s not easy moving to a new social network. Here are a few tips on moving your information from your Facebook account to your shiny new Google+ account.

about 3 years ago - by  |  Comments (81)

It’s a classic effect: the black and white photo with the stark, isolated red. Here’s how to knock out that effect in Photoshop in ten seconds with our (GIMP friendly!) method.

about 3 years ago - by  |  Comments (17)

One of the most common issues with aging laptops is overheating, something many people aren’t sure how to fix. We’ll help you figure out what’s causing the heat and how to keep your notebook functioning at a lower temperature.

about 3 years ago - by  |  Comments (55)

Hypervisors are what make virtual machines possible, and they aren’t just for servers anymore. You probably use one every day and don’t even know it. If you don’t use one now, you will in the near future.

about 3 years ago - by  |  Comments (11)

XBMC is an awesome open-source media center application that can be customized, thanks to an easy-to-skin interface,  to give you the best looking media center on the block (and possibly in the county). Read on to see how.

about 3 years ago - by  |  Comments (13)

You may have seen MD5 hashes listed next to downloads during your internet travels, but what exactly are they? Let’s take a look at what these cryptic strings are and how you can use them to verify your downloads.

about 3 years ago - by  |  Comments (6)

The security debacle at Dropbox last week opened a lot of peoples’ eyes to the need for user-managed encryption for cloud-based storage. Read on to learn how to secure your Dropbox (and other cloud-based files) with Boxcryptor.

about 3 years ago - by  |  Comments (32)

We’ve become reliant on digital cameras since they are so easy to use. But have you ever wondered how film-based photography works? Read on to increase your photographic knowledge—or to develop an new appreciation for your point and click camera.

about 3 years ago - by  |  Comments (13)

We have already shown you how to clean your keyboard without breaking it, but did you know your smartphone can be just as dirty and covered with bacteria? Here is how to properly clean your smartphone.

about 3 years ago - by  |  Comments (35)

What’s with that weird graph with all the peaks and valleys? You’ve seen it when you open Photoshop or go to edit a camera raw file. But what is that weird thing called a histogram, and what does it mean?

about 3 years ago - by  |  Comments (8)

Whether you’re hosting a web page or running a Minecraft server, it’s a pain to keep track of IP addresses. Using a free dynamic DNS, you can turn 174.45.19.242 into mygeekydns.dyndns.org and be free from changing IPs.

about 3 years ago - by  |  Comments (7)

Your friends are reporting spam and pleas for money originating from your email account and some of your logins aren’t working; you’ve been compromised. Read on to see what to do right now and how to protect yourself in the future.

about 4 years ago - by  |  Comments (22)

We’ve already shown you some great ways to get your keyboard clean. For geeks that aren’t faint of heart, check out how to make your keyboard dishwasher safe and clean it with half the work and in half the time.

about 4 years ago - by  |  Comments (106)