You meant well, you intended to be a good file custodian, but somewhere along the way things got out of hand and you’ve got duplicate photos galore. Don’t be afraid to delete them and lose important photos, read on as we show you how to clean safely.
If you’re coming from Windows, the Linux file system structure can seem particularly alien. The C:\ drive and drive letters are gone, replaced by a / and cryptic-sounding directories, most of which have three letter names.
Have you ever connected your Laptop to a wired network point in your house and continued to get wireless network speeds ? Here’s how you can quickly fix that, the easy way.
More and more banks, credit card companies, and even social media networks and gaming sites are starting to use two-factor authentication. If you’re a little unclear on what it is or on why you’d want to start using it, read on to learn how two-factor authentication can keep your data secure.
Windows RT is a special edition of Windows 8. It runs on ARM and you’ll find it alongside Intel x86 machines in stores, but you’ll be surprised just how much Windows RT differs from the Windows you know.
Whether you plan on using Windows 8 or not, everyone buying a PC in the future will end up with the Microsoft-driven Secure Boot feature enabled. Secure Boot prevents “unauthorized” operating systems and software from loading during the startup process.
The font options included with the Kindle are certainly serviceable, but why limit yourself? Today we’ll show you how to easily swap out the font files on your Kindle for a completely customized reading experience.
If you’re trying to keep up with news and content on multiple web sites, you’re faced with the never ending task of visiting those sites to check for new content. Read on to learn about RSS and how it can deliver the content right to your digital doorstep.
You’ve probably heard that you need to overwrite a drive multiple times to make the data unrecoverable. Many disk-wiping utilities offer multiple-pass wipes. This is an urban legend – you only need to wipe a drive once.
Some forms of tracking are obvious – for example, websites know who you are if you’re logged in. But how do tracking networks build up profiles of your browsing activity across multiple websites over time?
Want to get the latest version of Windows 8 right now? This one is called the Release Preview, and it’s available for download right now. There’s a lot of little bugs resolved, the multi-monitor support has improved, and you should download it now.
If you’re a Linux user, you’ve probably heard that you don’t need to defragment your Linux file systems. You’ll also notice that Linux distributions don’t come with disk-defragmenting utilities. But why is that?
Setting up your ebook reader to receive bundles of articles from web sites that interest you is a great way to add functionality and great content. Read on as we show you how to turn the RSS feeds from your favorite sites into ebooks.
Ubuntu and Linux Mint are two of the most popular desktop Linux distributions at the moment. If you’re looking to take the dive into Linux – or you’ve already used Ubuntu or Mint – you wonder how they’re different.
Your browser sends its user agent to every website you connect to. We’ve written about changing your browser’s user agent before – but what exactly is a user agent, anyway?
If you’re looking for a free but powerful solution to automate your Windows wallpaper switching, read on as we show you how to pull fresh wallpaper from your computer, wallpaper web sites, RSS feeds, and custom image searches.
When you’re shooting portraits, the soft background look keeps distracting backgrounds from ruining a shot. If you’ve not shot correctly, here’s a quick, simple tip to pop out your foreground and keep the most important parts the most visible.
Each major web browser shares a large number of keyboard shortcuts in common. Whether you’re using Mozilla Firefox, Google Chrome, Internet Explorer, Apple Safari, or Opera – these keyboard shortcuts will work in your browser.
Encryption tools exist to protect your privacy… and also to make you feel like you’re an awesome spy. Today we’ll use a portable USB drive to hold all of your passwords encrypted in a virtual disk hidden inside a file.
Trying to remember, based on the titles alone, what order a series of books goes in can be quite frustrating. Read on as we show you how to annotate and sort your book titles as they’re transferred to your ebook reader for frustration-free reading.
Printers have been using line tones to create rich looking images long before there was any digital art. Today we’ll be using Photoshop tricks (with no filters) to turn an ordinary photograph into old-timey line tone style piece of art.
Adding access to popular streaming video services is a great way to expand the reach of XBMC. Read on as we show you how to add Hulu and Amazon Video to your XBMC install to enjoy easy and on-demand video streaming.
There’s more to CCleaner than clicking a single button. This popular application for wiping temporary files and clearing private data hides a variety of features, from fine-grained options for tweaking the cleaning process to full drive-wiping tools.
If you think Photoshop is the most powerful tool in a photographer’s toolbox, think again. Whether you’re using freeware, Adobe Camera Raw, or Lightroom, Raw developing tools are the best way to turn good pictures into great ones.
Backing up your text messages from your Android phone to your Gmail account is so simple there’s no reason to not back them up and make them search-friendly in the process. Read on to see how you can turn your Gmail account into an SMS vault.