You’ve set up the programs you need. Your windows are arranged just right. Then, something else demands your attention and you have to shut down. No worries. You can have Ubuntu remember all your running applications and restore them the next time you log in.
Chromebooks are supposed to have amazing, all-day battery life — but not all of them do. Follow these tips to squeeze more battery life out of your Chromebook.
TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.
Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.
If you’ve tried to install Google Chrome in Ubuntu Linux, you may have noticed that it’s not available in the Ubuntu Software Center. However, it’s easy to download a package file for Google Chrome and install it on your system, and we’ll show you how.
When you enter a long command into the Terminal window that you found on the web or in a document, you can save yourself some time by easily copying and pasting the command at the prompt.
You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.
If you do not need or want to encrypt files on your computer but would like to stop casual snooping, then what is the best method for password protecting your folders on Linux/Unix? Today’s SuperUser Q&A post has helpful answers to a curious reader’s question.
Chromium is the open-source project that forms the basis for Google Chrome. Because it’s completely open source, Chromium is available in many Linux distributions’ software repositories for easier installation.
Chromebooks offer built-in support for SSH tunnelling with their included crosh shell and SSH command. An SSH tunnel allows you to use an SSH connection like a VPN or encrypted proxy, sending your browsing traffic through the secure tunnel.
It can be tough porting your videos and music to every device you use. How do you know your Mac, Xbox, and Windows Machine can read your files? Read on to find your perfect USB drive solution.
The Unity Launcher in Ubuntu is locked to the left side of the screen. If you would rather have a launcher at the bottom of the screen, there is a way to convert the Unity Launcher into a dock-style launcher at the bottom of the screen.
Whether you’re cutting out the boring parts of your vacation video or getting a hilarious scene for an animated GIF, Avidemux provides a quick and easy way to cut clips from any video file.
Search for a duplicate-file-finder and you’ll find yourself bombarded with junkware-filled installers and paid applications. We’ve put together lists of the best free duplicate-file-finders so you can save some time.
Whether you’re using Linux on your desktop or a server, there are good tools that will scan your system for duplicate files and help you remove them to free up space. Solid graphical and command-line interfaces are both available.
Most home networks rarely have one single type of client connecting to it. Usually, there’s a blend of Windows, Android, iOS, and maybe even Macs. How do you keep all these clients connected while keeping younger users out of trouble?
Have you switched from Mac to Linux and miss the Mac OS X-style launcher? Or, maybe you just want a dock other than the Unity Launcher on your Linux machine. Cairo-Dock is a customizable dock you can add to your Linux desktop.
It’s time to compress some files, so what format do you use? Zip, RAR, 7z, or something else? We performed some benchmarks to determine which format gives you maximum compression.
It’s worth noting that both Windows Phone and Windows RT also offer a “device encryption” feature. It works similarly to the feature that made its way over to the desktop version of Windows with Windows 8.1.
Ever since the first person wrote out 5318008 on a calculator, nerds have been hiding secret numbers inside of your PC, and using them to negotiate secret handshakes between applications and files. Today we take a quick look at some of the more entertaining examples.
Chromebooks aren’t the ideal Minecraft laptops, that’s for sure. There’s no web-based or Chrome app version of Minecraft, which is written in Java. But Chromebook owners aren’t completely out-of-luck if they want to play Minecraft.
If you’re a keyboard person, a lot of things can be accomplished simply using the command line. For example, there are a few easy-to-use methods for creating text files, should you need to do so.
f.lux changes the color temperature of your computer’s display depending on the time of day. Everything’s normal during the day, but f.lux users warmer colors after sunset to match your indoor lighting.
Minecraft runs just fine on Linux, but it’s probably not available for easy installation in your Linux distribution’s package manager. Here’s how to get your Linux system ready for Minecraft.
It’s always a good idea to know some basics about the operating system you’re running on your computer. For example, you may need to know whether you’re running a 64-bit or 32-bit system so you know which file to download for a program you want to install.