Compared to the complexity of purchasing a new graphics card or swapping out your motherboard purchasing a USB hub is definitely a simple purchase; but that doesn’t mean you should just grab the first one off the shelf at your local electronics store. There is an enormous discrepancy between build quality, features, and even safety between the different models. Read on as we show you what you need to get the best results and find the hub that fits your needs.
If you’re in the market for a sport-oriented smartwatch to help you mind your heartbeat, laps, distance traveled, and more, the Magellan Echo is a solid budget-friendly entry into the smartwatch/fitness market. Read on as we explore the numerous features, long battery life, and a few limitations to be aware of.
Internet connection data caps are becoming more widespread in the US. Internet service providers may claim their data limits are good for “millions of emails,” but emails are small and HD videos on Netflix are much, much larger.
Computers need cooling to remove the heat their components generate during use. If you’re building your own PC — especially if you’re overclocking it — you’ll need to think about how you’ll cool it.
Laptops aren’t as easy to upgrade as desktop PCs. In fact, newer laptops are becoming harder to upgrade — but you still may be able to upgrade your laptop with more RAM or a solid-state drive.
Over-the-ear headphones (or, for the terminology-loving, circumaural headphones) come in two primary flavors: open-back and closed-back. Before you sink some serious cash into a nice pair of headphones it pays to know the difference.
Connect a Chromebook to a Windows network and you may be in for a surprise. Your Chromebook can’t access shared folders or network printers, whether they’re shared from a Windows, Mac, or Linux system.
Sometimes you need to work on hardware components, like a motherboard, outside of the computer case, but is it safe to do so with the hardware in question powered up? Today’s SuperUser Q&A posts looks at precautions one should take with an endeavor like this.
It’s important to secure your wireless network with WPA2 encryption and a strong passphrase. But what sorts of attacks are you actually securing it against? Here’s how attackers crack encrypted wireless networks.
The FileHub is a little digital Swiss Army knife of useful tools; you can recharge your devices, link them together via mobile hotspot, stream files to them, and in turn back files up from your devices to the FileHub. Read on as we put it through the paces and see if a device smaller than a deck of cards can really shine in all those categories.
Computer networking is filled with jargon that isn’t self-explanatory. Here’s a quick overview of many of the terms you’ll see when you glance at the network status information on any device.
Motherboards include integrated graphics, sound, and network hardware — but is it good enough, or do you need to buy discrete components when building your own PC?
Bluetooth mice are conveniently cordless but it’s very frustrating when they lose their connection; read on as we troubleshoot a reader’s Windows laptop and help them keep their mouse awake and in communication with their computer.
Do you have an old desktop PC sitting in a closet somewhere? Put it to use by installing FreeNAS. FreeNAS is a free, open-source operating system that will convert old PCs into network-attached storage devices.
Chromebooks locally sync some data, so you’ll want to wipe that personal data when selling or passing on your Chromebook. You can also reinstall Chrome OS — particularly useful if you’ve messed around in developer mode.
Linux isn’t the only alternative PC operating system out there. Some alternative operating systems are developed by large corporations, while others are small projects worked on by hobbyists.
Smartphones are expensive — you wouldn’t want to spend hundreds of dollars on one and end up with a scratched screen. Many people still buy screen protectors to protect those screens, but they’ve become less necessary.
You’ve probably seen references to TCP and UDP when setting up port-forwarding on a router or when configuring firewall software. These two protocols are used for different types of data.
RFID is a technology that surrounds us every day. It’s in our credit cards, passports, and some of the products we buy. Even many of our pets have RFID chips in them!
Memory cards are used in digital cameras, music players, smartphones, tablets, and even laptops. But not all SD cards are created equal — there are different speed classes, physical sizes, and capacities to consider.
No need to wait for Valve’s Steam Machines — connect your Windows gaming PC to your TV and use powerful PC graphics in the living room today. It’s easy — you don’t need any unusual hardware or special software.
Netbooks — small, cheap, slow laptops — were once very popular. They fell out of favor — people bought them because they seemed cheap and portable, but the actual experience was lackluster. Most netbooks now sit unused.
QWERTY — so-called because the letters at the top-left corner of the keyboard begin with QWERTY — is the most common keyboard layout. But some people think alternative keyboard layouts like Dvorak and Colemak are faster and more efficient.
Routers are basically little computers. By default, they run a manufacture-provided operating system, or firmware, to route network traffic and provide you with various settings and features. But you can often replace this firmware.
Consumer PCs didn’t always run Windows. Before Windows arrived, PCs came with Microsoft’s MS-DOS operating system. Here’s what the command-line environment was actually like to use.