When you don’t have unlimited mobile data on your Android or iPhone, every megabyte counts. Mobile browsers like Google Chrome and Opera offer a built in data compression feature, allowing you to browse with less data.
There is a huge number of antivirus programs to choose from, so how do you find the best one? Do you use what came with your computer or what your friend recommended? How do you know if it’s any good?
Many computer users were trained never to turn their PCs off by pressing the power button on their desktop PC’s case. This used to cause problems in the previous millennium, but it’s now perfectly safe to shut down with the power button.
Routers are such an infrequently replaced component of your home network that it’s easy to forget how you had things previously configured and what settings are too important to not overlook. Read on as we highlight the first five things you need to do right after powering up your new router.
Apple sells Apple Remote Desktop on the Mac App Store for $80, but you don’t have to spend any money to remotely connect to your Mac. There are free solutions — including one built into your Mac.
Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of the document.
Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed.
You just got an iPhone, now what? The amount of things to setup can be overwhelming for first-time users, but How-to Geek is here to guide you through the essential steps required to get your iPhone up and running.
If you need really fast external storage for your laptop, you might be interested to know that you can buy an external solid state drive that connects over USB 3.0 or Thunderbolt… and it is crazy fast. We had to buy one for the office, so we’re reviewing it for you today.
The Mission Control feature in Mac OS X allows you to arrange windows into several different screens you can quickly switch between. This feature was formerly known as Spaces, and is called virtual desktops or workspaces on Linux.
You recommend a program to a family member, and they proceed to install it along with five other junkware programs that sneak their way on to their computer in the installation process. Sound familiar? Unchecky prevents these unnecessary programs from installing themselves by unchecking the appropriate boxes.
Not all Wi-Fi networks are created equal. Wi-Fi access points can function in either “ad-hoc” or “infrastructure” mode, and many WI-Fi-enabled devices can only connect to infrastructure-mode networks, not ad-hoc ones.
A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
Bill Gates famously said “two years from now, spam will be solved” back in 2004. It’s now ten years later and more than 70% of emails are spam, according to Kaspersky. Why is spam still such a problem?
Windows 8’s desktop hasn’t seen many improvements for touch use, but even 8-inch Windows tablets have a desktop. If you have to use the desktop with your finger, these tips will help you avoid frustration.
The caller said “I’m calling you from Windows tech support.” The fake tech support scammers made the mistake of calling us today and we played along to learn their tricks just for fun. Here’s what happened.
Spam seems to arrive in every single email account we use, no matter how careful we are. How are spammers getting all our email addresses? And can we do anything to hide our email address from spammers?
Many laptops now include a combined headphone and microphone jack instead of two separate audio jacks. This trend started with smartphones and tablets, but has spread to MacBooks, ultrabooks, and convertibles like Microsoft’s Surface Pro.
Although the ebook reader market has been dominated by the Kindle (still going strong) and the Nook (losing steam) for years, there’s a contender rising from the ranks: the Kobo Aura HD. Read on as we put it through the paces.
While GPS tagged photos are handy for always knowing where you took a photo, location data embedded in photos does have unsettling privacy and security implications. Should you be worried about the risk of people tracking you down via photos you post online?
Intel x86 or x64 processors have traditionally been found in laptops and desktops, while ARM processors have been found in lower-power embedded devices, smartphones, and tablets. But you can now buy laptops with ARM chips and smartphones with Intel chips.
Are you having a problem with your Internet connection or Wi-Fi? Whatever the problem — from a flaky connection to Wi-Fi troubles or even no access to the Internet at all — some router troubleshooting could fix things.
The internet exploded Friday with the news that Google Chrome extensions are being sold and injected with adware. But the little-known and much more important fact is that your extensions are spying on you and selling your browsing history to shady corporations. HTG investigates.
Malware isn’t the only online threat to worry about. Social engineering is a huge threat, and it can hit you on any operating system. In fact, social engineering can also occur over the phone and in face-to-face situations.
A false positive is a mistake that happens occasionally — the antivirus thinks a download is harmful when it’s actually safe. But malicious people may try to trick you into downloading malware with this assurance.