SEARCH

HARDWARE ARTICLES / RASPBERRY PI, DIY, GADGETS, AND MORE

If you snap photos with your DSLR long enough, it’s bound to happen: dust will find its way onto your camera’s sensor and begin marring your beautiful photos. Read on as we walk you through a safe multi-step process to return your camera sensor to a factory floor shine.

about 1 year ago - by  |  2 Replies

Wireless charging is one of many new features appearing in the latest smartphones, from Google’s Nexus 4 and Samsung’s Galaxy S4 to Nokia’s Lumia 920. There are even cases that add wireless charging capabilities to Apple’s iPhone 5.

about 1 year ago - by  |  18 Replies

Chromebooks aren’t “just a browser” — they’re Linux laptops. You can easily install a full Linux desktop alongside Chrome OS and instantly switch between the two with a hotkey — no rebooting necessary.

about 1 year ago - by  |  26 Replies

The Great Firewall of China, officially known the Golden Shield project, employs a variety of tricks to censor China’s Internet and block access to various foreign websites. We’ll be looking at some of the technical tricks the firewall uses to censor China’s Internet.

about 1 year ago - by  |  10 Replies

We recently showed you how to turn your Raspberry Pi into an always on Usenet machine centered around the feature-rich SABnzbd Usenet client. Now we’re back to show you how to use NZBGet, a more Spartan but also very lightweight Usenet tool.

about 1 year ago - by  |  8 Replies

When people think of innovative tech companies, they generally don’t think of Microsoft. Microsoft has actually had a history of innovative products and ideas, but they’ve failed to execute them over and over again.

about 1 year ago - by  |  26 Replies

Your office mate says the new device your company issued is a fob, and you say it’s a dongle. Before things come to fisticuffs in front of the water cooler, let’s investigate.

about 1 year ago - by  |  8 Replies

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.

about 1 year ago - by  |  1 Reply

Pinhole photography is a fun and old fashioned way to capture images; read on as we bring the technique into the 21st century and show you how to use your modern DSLR as a pinhole camera.

about 1 year ago - by  |  3 Replies

Domain Name System Security Extensions (DNSSEC) is a security technology that will help patch up one of the Internet’s weak points. We’re lucky SOPA didn’t pass, because SOPA would have made DNSSEC illegal.

about 1 year ago - by  |  9 Replies

Chromebooks are becoming more popular, with Samsung’s $249 Chromebook garnering solid reviews and decent sales. But a Chromebook still seems a bit scary — how do you live with just a Chrome browser? Is that really enough for a laptop?

about 1 year ago - by  |  32 Replies

If you find yourself underwhelmed by the photos you’ve been snapping, there’s a good chance that underuse of depth of field manipulation is to blame. Read on as we explain what depth of field is and how you can use it to create more interesting and dynamic photos.

about 1 year ago - by  |  Leave a reply

A cheap power strip might protect equipment from power surges, but it does nothing to help when the power goes out and your system comes to a halting crash. Read on as we show you how to buy the right battery backup device for your needs.

about 1 year ago - by  |  20 Replies

Sharing your Wi-Fi with guests is just the polite thing to do, but that doesn’t mean you want to give them wide open access to your entire LAN. Read on as we show you how to set up your router for dual SSIDs and create a separate (and secured) access point for your guests.

about 1 year ago - by  |  16 Replies

The Digital Millennium Contract is a US law passed in 1998 in an attempt to modernize copyright law to deal with the Internet. The DMCA has a number of provisions, but we’ll be focusing on the ones that have most affected the web we have today.

about 1 year ago - by  |  16 Replies

Cloud gaming has much in common with streaming videos. Essentially, the cloud-gaming server runs a game and streams a video of the gameplay to you. Your keyboard, mouse, and controller input actions are sent over the network to the cloud gaming server.

about 1 year ago - by  |  6 Replies

Hackers aren’t inherently bad — the word “hacker” doesn’t mean “criminal” or “bad guy.”  Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. These terms define different groups of hackers based on their behavior.

about 1 year ago - by  |  7 Replies

With the goal of becoming the center of your online life, it seems like all the big companies are focused on having their own ‘personalized’ line of hardware as an extension of their expanding software and service offerings. Now you can add Evernote to the list of companies expressing interest in joining the hardware trend.

about 1 year ago - by  |  2 Replies

Macro photography–or, taking photos of things under high magnification–is really fun; the price of dedicated macro lenses, on the other hand, is not. Read on as we show you how to use low cost tricks and techniques to enjoy macrophotography on a budget.

about 1 year ago - by  |  7 Replies

Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.

about 1 year ago - by  |  14 Replies

The last few years have seen the rise of closed platforms — operating systems that only allow you to install software approved by the operating system’s developer. However, many popular platforms — even mobile ones — are still open platforms.

about 1 year ago - by  |  5 Replies

If you’re like most people, your Internet service provider hands you a single Internet Protocol address and your router shares it amongst all the connected devices in your home.

about 1 year ago - by  |  16 Replies

You’ve probably heard that firewalls are an important security protection, but do you know why that is? Many people don’t, if references to firewalls in TV shows, movies, and other forms of popular media are any indication.

about 1 year ago - by  |  5 Replies

Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.

about 1 year ago - by  |  Comments (0)

We recently showed you how to turn your Raspberry Pi into a 24/7 low-power downloading machine. Now we’re back to show you how to make the system almost completely hands off with awesome automation tools.

about 1 year ago - by  |  27 Replies