Google has a tremendous number of free services they offer which many of your probably take advantage of. But have you ever considered what you might lose if all of a sudden you lost access to your account? Just like all important data on your hard drive, your critical data in “the cloud” should also have backup consideration.
Don’t be in the dark about who is visiting what web sites on your LAN. Use our two-prong approach to lock in on who is browsing what on your home network.
Ever seen a mall photobooth create a “pencil drawing” from a photo? Give us about one minute, and see how you can create an easy grayscale image effect that looks like a tonal pencil drawing. Check it out!
We’ve been covering topics on shell scripting because Linux can be put on almost anything. The versatility of the command-line shell is what really allows this, but what makes each shell different and why do people prefer one over another?
You’ve probably seen lots of vintage photo effects, or maybe even made some of your own using software like Instagram. Today we’ll look at a few “vintage effects” and see how they can be replicated in either GIMP or Photoshop.
Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network.
One of the most convenient tools browsers offer is the ability to save and automatically prefill your passwords on login forms. Because so many sites require accounts and it is well known (or should be at least) that using a shared password is a big no-no, a password manager is almost essential.
Sometimes, graphics editing is useful. And sometimes, you use it to turn things invisible just because you can. Here’s how to make invisibility cloaks in Photoshop in a few minutes, with our GIMP friendly technique.
If you want to build up your geek cred, join us for the second installment in our shell scripting series. We have a few corrections, a few improvements to last week’s script, and a guide on looping for the uninitiated.
Connecting to the internet from Wi-Fi hotspots, at work, or anywhere else away from home, exposes your data to unnecessary risks. You can easily configure your router to support a secure tunnel and shield your remote browser traffic—read on to see how.
There’s a hidden advantage to digital photography, and it’s called Exif. See what it is, how it can help you, and how you can use it to learn from skilled photographers all over the internet.
If you’ve been using Linux for some time (and even OS X) you’ll probably have come across a “permissions” error. But what exactly are they, and why are they necessary or useful? Let’s take an inside look.
If you have a lot of time and information invested in Facebook, it’s not easy moving to a new social network. Here are a few tips on moving your information from your Facebook account to your shiny new Google+ account.
It’s a classic effect: the black and white photo with the stark, isolated red. Here’s how to knock out that effect in Photoshop in ten seconds with our (GIMP friendly!) method.
One of the most common issues with aging laptops is overheating, something many people aren’t sure how to fix. We’ll help you figure out what’s causing the heat and how to keep your notebook functioning at a lower temperature.
Hypervisors are what make virtual machines possible, and they aren’t just for servers anymore. You probably use one every day and don’t even know it. If you don’t use one now, you will in the near future.
XBMC is an awesome open-source media center application that can be customized, thanks to an easy-to-skin interface, to give you the best looking media center on the block (and possibly in the county). Read on to see how.
You may have seen MD5 hashes listed next to downloads during your internet travels, but what exactly are they? Let’s take a look at what these cryptic strings are and how you can use them to verify your downloads.
The security debacle at Dropbox last week opened a lot of peoples’ eyes to the need for user-managed encryption for cloud-based storage. Read on to learn how to secure your Dropbox (and other cloud-based files) with Boxcryptor.
We’ve become reliant on digital cameras since they are so easy to use. But have you ever wondered how film-based photography works? Read on to increase your photographic knowledge—or to develop an new appreciation for your point and click camera.
We have already shown you how to clean your keyboard without breaking it, but did you know your smartphone can be just as dirty and covered with bacteria? Here is how to properly clean your smartphone.
What’s with that weird graph with all the peaks and valleys? You’ve seen it when you open Photoshop or go to edit a camera raw file. But what is that weird thing called a histogram, and what does it mean?
Whether you’re hosting a web page or running a Minecraft server, it’s a pain to keep track of IP addresses. Using a free dynamic DNS, you can turn 184.108.40.206 into mygeekydns.dyndns.org and be free from changing IPs.
Your friends are reporting spam and pleas for money originating from your email account and some of your logins aren’t working; you’ve been compromised. Read on to see what to do right now and how to protect yourself in the future.
We’ve already shown you some great ways to get your keyboard clean. For geeks that aren’t faint of heart, check out how to make your keyboard dishwasher safe and clean it with half the work and in half the time.