You’re not a Jolly Roger flying pirate, you’re just somebody that wants to backup the ebooks they paid for and read them on the devices they want to read them on. Follow along as we show you how to liberate your Kindle books.
Sure, everyone involved can come up with a variety of excuses — they aren’t technically misleading customers, it’s all in the fine print, and these are the standard ways the industry operates — but hardware has been advertised in many misleading ways.
If you are a Raspberry Pi enthusiast, then you are going to love this latest bit of news. Camera boards are now available to add to your favorite Raspberry Pi device and we have the links you need to learn more about the latest bit of hardware goodness as well as where to buy the new boards.
Last week we showed you how to convert your color photos to black and white photos. While the tips and tricks we shared with you yield awesome results, we’re back this week to highlight some powerful techniques to take your image to the next level.
In this guide, we will show you how to backup your movie collection on to blank DVD and Blu-Ray discs, along with ripping the movie on to your computer if you prefer to keep a digital copy instead.
The “paperless office” we were promised never seems to arrive for many people. The reality, however, is that a paperless office is here today if you want to take advantage of it.
Converting color photos to black and white images that harken to the golden age of black and white photography is an art form. Read on as we show you how to capture the crisp contrast and mood of vintage photographs with today’s digital tools.
The new UEFI Secure Boot system in Windows 8 has caused more than its fair share of confusion, especially among dual booters. Read on as we clear up the misconceptions about dual booting with Windows 8 and Linux.
When you bought your phone it was cutting edge, had the latest version of Android, and made your heart sing. A year or more later, it doesn’t get the new updates and the performance is a little sluggish. Breathe new life into your phone by flashing it with a new custom ROM.
Your computer has a speaker port (perhaps even multiple ones) and a headphone port. You can plug your headphones into both of them and tunes come out, so what’s the real difference between the two?
RAID allows you to combine multiple physical hard drives into a single logical hard drive. This allows you to mirror your data across two hard drives, ensuring you always have your important data stored in multiple places.
If you snap photos with your DSLR long enough, it’s bound to happen: dust will find its way onto your camera’s sensor and begin marring your beautiful photos. Read on as we walk you through a safe multi-step process to return your camera sensor to a factory floor shine.
Wireless charging is one of many new features appearing in the latest smartphones, from Google’s Nexus 4 and Samsung’s Galaxy S4 to Nokia’s Lumia 920. There are even cases that add wireless charging capabilities to Apple’s iPhone 5.
Chromebooks aren’t “just a browser” — they’re Linux laptops. You can easily install a full Linux desktop alongside Chrome OS and instantly switch between the two with a hotkey — no rebooting necessary.
The Great Firewall of China, officially known the Golden Shield project, employs a variety of tricks to censor China’s Internet and block access to various foreign websites. We’ll be looking at some of the technical tricks the firewall uses to censor China’s Internet.
We recently showed you how to turn your Raspberry Pi into an always on Usenet machine centered around the feature-rich SABnzbd Usenet client. Now we’re back to show you how to use NZBGet, a more Spartan but also very lightweight Usenet tool.
When people think of innovative tech companies, they generally don’t think of Microsoft. Microsoft has actually had a history of innovative products and ideas, but they’ve failed to execute them over and over again.
Your office mate says the new device your company issued is a fob, and you say it’s a dongle. Before things come to fisticuffs in front of the water cooler, let’s investigate.
Pinhole photography is a fun and old fashioned way to capture images; read on as we bring the technique into the 21st century and show you how to use your modern DSLR as a pinhole camera.
Domain Name System Security Extensions (DNSSEC) is a security technology that will help patch up one of the Internet’s weak points. We’re lucky SOPA didn’t pass, because SOPA would have made DNSSEC illegal.
Chromebooks are becoming more popular, with Samsung’s $249 Chromebook garnering solid reviews and decent sales. But a Chromebook still seems a bit scary — how do you live with just a Chrome browser? Is that really enough for a laptop?
If you find yourself underwhelmed by the photos you’ve been snapping, there’s a good chance that underuse of depth of field manipulation is to blame. Read on as we explain what depth of field is and how you can use it to create more interesting and dynamic photos.
Sharing your Wi-Fi with guests is just the polite thing to do, but that doesn’t mean you want to give them wide open access to your entire LAN. Read on as we show you how to set up your router for dual SSIDs and create a separate (and secured) access point for your guests.
The Digital Millennium Contract is a US law passed in 1998 in an attempt to modernize copyright law to deal with the Internet. The DMCA has a number of provisions, but we’ll be focusing on the ones that have most affected the web we have today.
Cloud gaming has much in common with streaming videos. Essentially, the cloud-gaming server runs a game and streams a video of the gameplay to you. Your keyboard, mouse, and controller input actions are sent over the network to the cloud gaming server.