SEARCH

HARDWARE ARTICLES / RASPBERRY PI, DIY, GADGETS, AND MORE

Domain Name System Security Extensions (DNSSEC) is a security technology that will help patch up one of the Internet’s weak points. We’re lucky SOPA didn’t pass, because SOPA would have made DNSSEC illegal.

about 2 years ago - by  |  9 Replies

Chromebooks are becoming more popular, with Samsung’s $249 Chromebook garnering solid reviews and decent sales. But a Chromebook still seems a bit scary — how do you live with just a Chrome browser? Is that really enough for a laptop?

about 2 years ago - by  |  34 Replies

If you find yourself underwhelmed by the photos you’ve been snapping, there’s a good chance that underuse of depth of field manipulation is to blame. Read on as we explain what depth of field is and how you can use it to create more interesting and dynamic photos.

about 2 years ago - by  |  Leave a reply

A cheap power strip might protect equipment from power surges, but it does nothing to help when the power goes out and your system comes to a halting crash. Read on as we show you how to buy the right battery backup device for your needs.

about 2 years ago - by  |  20 Replies

Sharing your Wi-Fi with guests is just the polite thing to do, but that doesn’t mean you want to give them wide open access to your entire LAN. Read on as we show you how to set up your router for dual SSIDs and create a separate (and secured) access point for your guests.

about 2 years ago - by  |  16 Replies

The Digital Millennium Contract is a US law passed in 1998 in an attempt to modernize copyright law to deal with the Internet. The DMCA has a number of provisions, but we’ll be focusing on the ones that have most affected the web we have today.

about 2 years ago - by  |  16 Replies

Cloud gaming has much in common with streaming videos. Essentially, the cloud-gaming server runs a game and streams a video of the gameplay to you. Your keyboard, mouse, and controller input actions are sent over the network to the cloud gaming server.

about 2 years ago - by  |  6 Replies

Hackers aren’t inherently bad — the word “hacker” doesn’t mean “criminal” or “bad guy.”  Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. These terms define different groups of hackers based on their behavior.

about 2 years ago - by  |  7 Replies

With the goal of becoming the center of your online life, it seems like all the big companies are focused on having their own ‘personalized’ line of hardware as an extension of their expanding software and service offerings. Now you can add Evernote to the list of companies expressing interest in joining the hardware trend.

about 2 years ago - by  |  2 Replies

Macro photography–or, taking photos of things under high magnification–is really fun; the price of dedicated macro lenses, on the other hand, is not. Read on as we show you how to use low cost tricks and techniques to enjoy macrophotography on a budget.

about 2 years ago - by  |  7 Replies

Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.

about 2 years ago - by  |  14 Replies

The last few years have seen the rise of closed platforms — operating systems that only allow you to install software approved by the operating system’s developer. However, many popular platforms — even mobile ones — are still open platforms.

about 2 years ago - by  |  5 Replies

If you’re like most people, your Internet service provider hands you a single Internet Protocol address and your router shares it amongst all the connected devices in your home.

about 2 years ago - by  |  16 Replies

You’ve probably heard that firewalls are an important security protection, but do you know why that is? Many people don’t, if references to firewalls in TV shows, movies, and other forms of popular media are any indication.

about 2 years ago - by  |  5 Replies

Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.

about 2 years ago - by  |  Comments (0)

We recently showed you how to turn your Raspberry Pi into a 24/7 low-power downloading machine. Now we’re back to show you how to make the system almost completely hands off with awesome automation tools.

about 2 years ago - by  |  27 Replies

There are so many things a modern computer does that we simply take for granted, but sometimes it is fun to peek under the hood and see how everything works. Today we’re investigating how exactly your computer knows what kind and amount of RAM you have installed.

about 2 years ago - by  |  1 Reply

We recently showed you how to turn your Raspberry Pi into a 24/7 BitTorrent box to save on your power bill and keep your tracker ratios golden. Now we’re back to show you how to add in Usenet access to round out the build as a comprehensive downloading box.

about 2 years ago - by  |  27 Replies

It’s ideal to have a dedicated machine for your BitTorrent client, but it is energy intensive to leave a full rig powered up and online 24/7. Read on as we show you how to set up a power-sipping Raspberry Pi to serve as an always-on downloading machine.

about 2 years ago - by  |  Comments (4)

Geeks often consider encryption a fool-proof tool to ensure that data stays secret. But, whether you encrypt your computer’s hard drive or your smartphone’s storage, you may be surprised to know the encryption can be bypassed at cold temperatures.

about 2 years ago - by  |  Comments (9)

If you want to spend less time swapping cards and more time playing with your Raspberry Pi, installing the BerryBoot multi-boot manager makes it dead simple to boot multiple operating systems from one SD card. Read on as we walk you through the process.

about 2 years ago - by  |  Comments (1)

So you have a Raspberry Pi and you would like to maximize its tiny footprint by turning into a totally stand alone box—no monitor, keyboard, or other input peripherals. Read on as we show you how to set up remote shell, desktop, and file transfer access on your Pi.

about 2 years ago - by  |  Comments (0)

There are tons of great games available on the Android platform, but playing them with an onscreen interface isn’t much fun. Ditch the fake buttons and start enjoying your games with a comfortable gaming controller.

about 2 years ago - by  |  Comments (2)

The new Copyright Alert System, also known as the “Six Strikes” system, marks the beginning of ISPs in the USA attempting to police their subscribers’ Internet usage. The “punishments” include increasingly harsh alerts, bandwidth throttling, and restricting browsing activity.

about 2 years ago - by  |  Comments (16)

In order to enjoy more diverse media playback on your Raspberry Pi micro computer, you need to manually enable the MPEG-2 and VC-1 codecs. Read on to see how to do so and enjoy DVD playback and more on your Pi.

about 2 years ago - by  |  Comments (2)