DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.
Manufacturers are pushing “Ultra HD” 4k TVs hard here at CES 2015. By the end of 2015, half of all TVs in stores may be 4K TVs. They’re cheaper than ever, too. So, when should you buy one?
We all want the replicator from Star Trek: a machine that can create any object we desire. 3D printers, which create objects from plastics and other materials, are the closest things we have. And they’re getting cheaper every year.
Most of the How-To Geek team is at CES 2015, and we’re doing a group photo “live blog” of sorts, which just means that we’ll be posting pictures of everything we’re looking at in Vegas, as we’re looking at it (assuming we have a decent Internet connection).
As with TVs, a 4K computer monitor has a display resolution of 3840×2160. This is about four times as many pixels as a typical 1920×1080, or 1080p, display.
A cheap power strip might protect equipment from power surges, but it does nothing to help when the power goes out and your system comes to a halting crash. Read on as we show you how to buy the right battery backup device for your needs.
Whether you want to sell off your old smartphone to pay for the new one, add a little cash to your fun money pile, or to put the proceeds toward Christmas, we’re here to help. Read on as we outline the best ways to turn your old gear into money.
Modern gadgets are power hungry. If you want to make it through a long commute or a cross-country flight without having to plug your tablet or gaming device in, you’re going to need an external battery pack to keep the electrons flowing. Read on as we show you how to shop for a pack that will meet your needs and keep your screens glowing.
So it’s the end of the road for your PC, tablet, or smartphone. Before letting go, be sure to follow this quick check list to prepare your device for its new owner.
Whether you are setting up your computer speakers or a complex home theater bundle, understanding the art and science of speaker channels and placement is the most critical step in enjoying your new sound system. Read on as we guide you through a crash course in surround sound setup.
When you sign up for cable Internet service, you need a modem. You’re often asked to choose between renting the modem from your Internet service provider for a monthly fee or buying it outright.
Verizon FIOS is great — the speeds are incredible, and the price is… well, kinda expensive. The real problem is that the terrible router they give you needs to be rebooted all the time, which is a royal pain considering it’s down in the basement. Plus, I don’t want to get off the couch.
We love Bluetooth and all its possibilities. Once the domain of dorky headsets, Bluetooth is now in mice, keyboards, phones, computers, tablets, fitness trackers, and so much more. One of the best applications we’ve seen, however, is Bluetooth audio.
Whether you’re looking for a way to simply extend your Wi-Fi network, bridge your existing Wi-Fi network to a LAN, or create a completely new access point, the Netgear EX6100 can do it all. Read on as we put the multi-faceted little range extender through the paces.
Keeping your home router updated is a crucial part of staying secure. Shellshock affected a number of routers, and we’ve also seen routers hacked and turned into botnets. Home router security is notoriously poor.
Consoles have come a long way from cartridges. Today, they’re practically just gaming PCs and include built-in storage for save files, game updates, and digital-download games.
Remember TV antennas? Well, they still exist! Get a digital TV antenna and you’ll be able to watch local TV stations for free, all without paying a dime to a cable TV company.
The era of the $200 Windows laptop is back, and the HP Stream is just the first of many. These products are definitely better than the much-maligned netbook, but Chromebooks beat them in many ways.
If you like testing or just checking up on your computer’s hardware specifications, you might be surprised to see different operating systems provide conflicting information about your hardware. Why is that? Today’s SuperUser Q&A post helps clear up the confusion for a concerned reader.
Once upon a time, when laptops were a far bulkier affair, Ethernet ports were standard. Ever more slender laptop designs eschew the Ethernet port these days but that doesn’t mean you have to go without: read on as we show you how to cheaply and easily add in Ethernet accessibility to even the most razor thin ultrabook.
On our Comcast Xfinity router, WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) are all different options. Choose the wrong option and you’ll have a slower, less-secure network.
The Chromecast is arguably How-to Geek’s streaming stick of choice. It literally allows any device with the Chromecast app installed, to be a remote control.
MAC address filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network. That’s the theory, anyway. In practice, this protection is tedious to set up and easy to breach.
By now, most people know that an open Wi-Fi network allows people to eavesdrop on your traffic. Standard WPA2-PSK encryption is supposed to prevent this from happening — but it’s not as foolproof as you might think.
Every camera — whether it’s a dedicated digital camera or the Camera app on Android or iPhone — places the photos you take in a DCIM folder. DCIM stands for “Digital Camera Images.”