More and more banks, credit card companies, and even social media networks and gaming sites are starting to use two-factor authentication. If you’re a little unclear on what it is or on why you’d want to start using it, read on to learn how two-factor authentication can keep your data secure.

about 3 years ago - by  |  Comments (10)

Windows RT is a special edition of Windows 8. It runs on ARM and you’ll find it alongside Intel x86 machines in stores, but you’ll be surprised just how much Windows RT differs from the Windows you know.

about 3 years ago - by  |  Comments (40)

Whether you plan on using Windows 8 or not, everyone buying a PC in the future will end up with the Microsoft-driven Secure Boot feature enabled. Secure Boot prevents “unauthorized” operating systems and software from loading during the startup process.

about 3 years ago - by  |  Comments (38)

The font options included with the Kindle are certainly serviceable, but why limit yourself? Today we’ll show you how to easily swap out the font files on your Kindle for a completely customized reading experience.

about 3 years ago - by  |  Comments (7)

If you’re trying to keep up with news and content on multiple web sites, you’re faced with the never ending task of visiting those sites to check for new content. Read on to learn about RSS and how it can deliver the content right to your digital doorstep.

about 3 years ago - by  |  Comments (19)

You’ve probably heard that you need to overwrite a drive multiple times to make the data unrecoverable. Many disk-wiping utilities offer multiple-pass wipes. This is an urban legend – you only need to wipe a drive once.

about 3 years ago - by  |  Comments (126)

Some forms of tracking are obvious – for example, websites know who you are if you’re logged in. But how do tracking networks build up profiles of your browsing activity across multiple websites over time?

about 3 years ago - by  |  Comments (23)

Want to get the latest version of Windows 8 right now? This one is called the Release Preview, and it’s available for download right now. There’s a lot of little bugs resolved, the multi-monitor support has improved, and you should download it now.

about 3 years ago - by  |  Comments (32)

If you’re a Linux user, you’ve probably heard that you don’t need to defragment your Linux file systems. You’ll also notice that Linux distributions don’t come with disk-defragmenting utilities. But why is that?

about 3 years ago - by  |  Comments (78)

Setting up your ebook reader to receive bundles of articles from web sites that interest you is a great way to add functionality and great content. Read on as we show you how to turn the RSS feeds from your favorite sites into ebooks.

about 3 years ago - by  |  Comments (1)

Ubuntu and Linux Mint are two of the most popular desktop Linux distributions at the moment. If you’re looking to take the dive into Linux – or you’ve already used Ubuntu or Mint – you wonder how they’re different.

about 3 years ago - by  |  Comments (38)

Your browser sends its user agent to every website you connect to. We’ve written about changing your browser’s user agent before – but what exactly is a user agent, anyway?

about 3 years ago - by  |  Comments (12)

If you’re looking for a free but powerful solution to automate your Windows wallpaper switching, read on as we show you how to pull fresh wallpaper from your computer, wallpaper web sites, RSS feeds, and custom image searches.

about 3 years ago - by  |  Comments (3)

When you’re shooting portraits, the soft background look keeps distracting backgrounds from ruining a shot. If you’ve not shot correctly, here’s a quick, simple tip to pop out your foreground and keep the most important parts the most visible.

about 3 years ago - by  |  Comments (3)

Each major web browser shares a large number of keyboard shortcuts in common. Whether you’re using Mozilla Firefox, Google Chrome, Internet Explorer, Apple Safari, or Opera – these keyboard shortcuts will work in your browser.

about 3 years ago - by  |  Comments (77)

Encryption tools exist to protect your privacy… and also to make you feel like you’re an awesome spy. Today we’ll use a portable USB drive to hold all of your passwords encrypted in a virtual disk hidden inside a file.

about 3 years ago - by  |  Comments (42)

Trying to remember, based on the titles alone, what order a series of books goes in can be quite frustrating. Read on as we show you how to annotate and sort your book titles as they’re transferred to your ebook reader for frustration-free reading.

about 3 years ago - by  |  Comments (6)

Printers have been using line tones to create rich looking images long before there was any digital art. Today we’ll be using Photoshop tricks (with no filters) to turn an ordinary photograph into old-timey line tone style piece of art.

about 3 years ago - by  |  Comments (5)

Adding access to popular streaming video services is a great way to expand the reach of XBMC. Read on as we show you how to add Hulu and Amazon Video to your XBMC install to enjoy easy and on-demand video streaming.

about 3 years ago - by  |  Comments (15)

There’s more to CCleaner than clicking a single button. This popular application for wiping temporary files and clearing private data hides a variety of features, from fine-grained options for tweaking the cleaning process to full drive-wiping tools.

about 3 years ago - by  |  Comments (39)

If you think Photoshop is the most powerful tool in a photographer’s toolbox, think again. Whether you’re using freeware, Adobe Camera Raw, or Lightroom, Raw developing tools are the best way to turn good pictures into great ones.

about 3 years ago - by  |  Comments (19)

Backing up your text messages from your Android phone to your Gmail account is so simple there’s no reason to not back them up and make them search-friendly in the process. Read on to see how you can turn your Gmail account into an SMS vault.

about 3 years ago - by  |  Comments (19)

You might laugh at the high retail prices for “premium” cables at big box retail stores. But is it possible that a higher quality cable can give you a better digital signal? The nuance of the answer may surprise you.

about 3 years ago - by  |  Comments (48)

Windows’ built-in firewall hides the ability to create powerful firewall rules. Block programs from accessing the Internet, use a whitelist to control network access, restrict traffic to specific ports and IP addresses, and more – all without installing another firewall.

about 3 years ago - by  |  Comments (12)

Navi-X is a free media portal add-on for popular media center applications and mobile devices; read on as we show you how to supercharge your streaming media experience with one-stop access to thousands of content sources.

about 3 years ago - by  |  Comments (13)