If you have ever received a message that your new password is too similar to your old one, then you may be curious as to how your Linux system ‘knows’ they are too much alike. Today’s SuperUser Q&A post provides a peek behind the ‘magic curtain’ at what is going on for a curious reader.
Verizon FIOS is great — the speeds are incredible, and the price is… well, kinda expensive. The real problem is that the terrible router they give you needs to be rebooted all the time, which is a royal pain considering it’s down in the basement. Plus, I don’t want to get off the couch.
We’ve long railed against registry cleaners and system tuners as useless products that waste your money, but how do you go about cleaning up after uninstalling shady freeware? Answer: You don’t. You avoid installing nonsense on your PC to begin with by testing everything in a virtual machine first. Snapshots just make it easier.
If you’re using Linux as your desktop operating system, you probably are very aware of what version you are running, but what if you need to connect to somebody’s server and do some work? It’s really useful to know exactly what you are dealing with, and luckily it’s also pretty easy.
Most people use their operating system’s included file manager, but many geeks prefer third-party file managers. After all, Windows Explorer doesn’t offer tabs, a dual-pane interface, batch file-renaming tools, and more advanced features.
Screenshots are great, but sometimes you need to create a video recording to really get your point across. You can record your computer’s desktop, your smartphone’s screen, or your tablet’s display.
Animations on a desktop PC, smartphone, or tablet are nice — the first few times. Eventually, you just wish they would hurry up and stop wasting your time.
One of the great things about Linux is that you can do the same thing hundreds of different ways—even something as simple as generating a random password can be accomplished with dozens of different commands. Here’s 10 ways you can do it.
Mac OS X ships with a built-in firewall, but it’s not enabled by default. The Windows firewall has been enabled by default ever since worms like Blaster infected all those vulnerable Windows XP systems, so what gives?
If you like testing or just checking up on your computer’s hardware specifications, you might be surprised to see different operating systems provide conflicting information about your hardware. Why is that? Today’s SuperUser Q&A post helps clear up the confusion for a concerned reader.
Windows, Mac OS X, and Linux all allow you to schedule boot-ups, shut-downs, and wake-ups. You can have your computer automatically power up in the morning and automatically shut down at night, if you’d like.
Chromebooks allow you to set a custom DNS server, but Google doesn’t make the option easy to find. There are many reasons to change your DNS server, after all.
There’s nothing more tedious as a system administrator than running security updates on a dozen servers every single day. Luckily Ubuntu will let you automate stable security updates so you’re never at risk.
Amazon Instant Video uses the Flash plug-in, so you might imagine that it would “just work” with Flash on Linux. You’d be wrong, but you can get Amazon Instant Video to work with minimal tweaking.
A “text expander” autocorrects short combination of characters you type to longer phrases. They can be used anywhere in any operating system. For example, you could type “bbl” and have this always automatically expand to “I’ll be back later.”
You’ve set up the programs you need. Your windows are arranged just right. Then, something else demands your attention and you have to shut down. No worries. You can have Ubuntu remember all your running applications and restore them the next time you log in.
Chromebooks are supposed to have amazing, all-day battery life — but not all of them do. Follow these tips to squeeze more battery life out of your Chromebook.
TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.
Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.
If you’ve tried to install Google Chrome in Ubuntu Linux, you may have noticed that it’s not available in the Ubuntu Software Center. However, it’s easy to download a package file for Google Chrome and install it on your system, and we’ll show you how.
When you enter a long command into the Terminal window that you found on the web or in a document, you can save yourself some time by easily copying and pasting the command at the prompt.
You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.
If you do not need or want to encrypt files on your computer but would like to stop casual snooping, then what is the best method for password protecting your folders on Linux/Unix? Today’s SuperUser Q&A post has helpful answers to a curious reader’s question.
Chromium is the open-source project that forms the basis for Google Chrome. Because it’s completely open source, Chromium is available in many Linux distributions’ software repositories for easier installation.
Chromebooks offer built-in support for SSH tunnelling with their included crosh shell and SSH command. An SSH tunnel allows you to use an SSH connection like a VPN or encrypted proxy, sending your browsing traffic through the secure tunnel.