Smartphones are expensive — you wouldn’t want to spend hundreds of dollars on one and end up with a scratched screen. Many people still buy screen protectors to protect those screens, but they’ve become less necessary.
You’ve probably seen references to TCP and UDP when setting up port-forwarding on a router or when configuring firewall software. These two protocols are used for different types of data.
RFID is a technology that surrounds us every day. It’s in our credit cards, passports, and some of the products we buy. Even many of our pets have RFID chips in them!
Memory cards are used in digital cameras, music players, smartphones, tablets, and even laptops. But not all SD cards are created equal — there are different speed classes, physical sizes, and capacities to consider.
No need to wait for Valve’s Steam Machines — connect your Windows gaming PC to your TV and use powerful PC graphics in the living room today. It’s easy — you don’t need any unusual hardware or special software.
Netbooks — small, cheap, slow laptops — were once very popular. They fell out of favor — people bought them because they seemed cheap and portable, but the actual experience was lackluster. Most netbooks now sit unused.
QWERTY — so-called because the letters at the top-left corner of the keyboard begin with QWERTY — is the most common keyboard layout. But some people think alternative keyboard layouts like Dvorak and Colemak are faster and more efficient.
Routers are basically little computers. By default, they run a manufacture-provided operating system, or firmware, to route network traffic and provide you with various settings and features. But you can often replace this firmware.
Consumer PCs didn’t always run Windows. Before Windows arrived, PCs came with Microsoft’s MS-DOS operating system. Here’s what the command-line environment was actually like to use.
Although monitors are largely a plug and play device, there’s more to setting up a new monitor than simply plugging it in and turning it on. Read on as we show a fellow reader how to quality check his new monitor and help it put the best face forward.
Building your own computer is actually pretty simple. Don’t be afraid to dive right in — all you’ll need is a screwdriver, patience, and the ability to follow simple instructions.
Have you ever wondered why laptop screens seem to come in such odd sizes? Then you are not alone! Today’s SuperUser Q&A post looks at the reasons for the odd screen sizes you see when comparing laptops.
Putting your computer to sleep overnight to save energy and resume your work first thing in the morning is a handy trick, but what if your computer wakes itself up early like an energetic toddler? Read on as we help a fellow reader figure out what exactly is waking his PC up.
Many Internet service providers are now giving their customers combined devices that function as both a modem and a wireless router. With these devices, you don’t have to buy a router — but you can, if you like.
It’s common wisdom that deleted files can’t be recovered from solid-state media, only from traditional mechanical hard drives. But this only applies to internal drives — USB flash drives and external solid-state drives are vulnerable to file-recovery attacks.
When you sign up for cable Internet service, you need a modem. You’re often asked to choose between renting the modem from your Internet service provider for a monthly fee or buying it outright.
Many computers give you the option to set a “hard disk password” along with operating system passwords and BIOS passwords. This is different from encryption — a hard disk password doesn’t actually encrypt your files.
The numbers in the title will vary from carrier to carrier and phone to phone, but we show how we came up with these numbers below. They illustrate how you’re paying more when you buy a phone on contract, even if it doesn’t seem like it at first.
Fax machines are still trucking along in offices around the world. Government agencies, lawyers, doctors, and other slow-moving organizations often still require faxes — at best, it’s a necessary evil.
A Windows, Linux, or Mac password just prevents people from logging into your operating system. It doesn’t prevent people from booting other operating systems, wiping your drive, or using a live CD to access your files.
It’s a common sight for many Windows users: you pop in your flash drive or the memory card from your camera and Windows insists there is some problem that needs fixing. Does something actually need fixing? Are you risking anything by ignoring the nagging to scan and fix the drive? Read on as we explain what the message means, if you should heed it, and how to keep it from coming back.
Thanks to a new mobile device charging standard, it’s possible to keep your phone charged up without ever fumbling with the tiny microUSB charging cable again. Read on as we review the RAVPower wireless charger, show you how to set up a phone for wireless charging, and talk about how we went from skeptical to entirely in love with the whole wireless charging process.
You love Pandora’s streaming music service and you use it on your computer, phone, and even pipe it into your stereo system, yet the quality of the stream seems to vary depending on the device you use. What gives? Read on as we show a Pandora-loving reader how to maximize the quality of his streaming experience.
If you have a newer HDTV set, you may have noticed that your TV remote can function as a universal remote of sorts (but it doesn’t work with all your devices). Read on as we explore how newer televisions are able to control the devices connected to them (and vice versa).
The digital picture frame market got off to a rough start; early frames were clunky, had tiny screens, very few features, and required you to manually update the pictures. Read on as we review the Nixplay, a next generation digital picture frame with Wi-Fi connectivity, cloud-based photo sharing, and a pile of user-friendly features.