SEARCH

WINDOWS ARTICLES / EVERYTHING ABOUT MICROSOFT WINDOWS

One of the great things about Linux is that you can do the same thing hundreds of different ways—even something as simple as generating a random password can be accomplished with dozens of different commands. Here’s 10 ways you can do it.

about 2 days ago - by  |  3 Replies

If you have a compromised Windows system and want to analyze when services were installed or modified, then how do you do that? Today’s SuperUser Q&A post has the answers to a curious reader’s question.

about 4 days ago - by  |  Leave a reply

Screenshots are a great way to prove a point, build a case, or just send someone something interesting on your screen. If you don’t know how to take screenshots, then you’re really missing out.

about 4 days ago - by  |  7 Replies

If you’ve got loads of icons cluttering up your desktop, you might want a quick way to turn them off without using the context menu; here’s a quick and easy way to make a shortcut key to turn them on or off.

about 5 days ago - by  |  5 Replies

If you’re a Windows power user you probably already know how to do this, but for everybody else, it can be useful to see file extensions so that you know for sure what type of file you are dealing with.

about 5 days ago - by  |  3 Replies

The era of the $200 Windows laptop is back, and the HP Stream is just the first of many. These products are definitely better than the much-maligned netbook, but Chromebooks beat them in many ways.

about 5 days ago - by  |  21 Replies

Drivers aren’t something that you need to be terribly worried about anymore unless you’re a gamer, but when you are troubleshooting a problem it can be useful to see what you have installed. But who wants to click through every item in Device Manager?

about 6 days ago - by  |  4 Replies

If someone else is using your computer or if you need to see what changes were made to your files and folders during a specific time, you can use Nirsoft’s handy FolderChangesView application. Nirsoft is a great freeware provider that produces amazing little tools for your PC, and the best part is that they never bundle crapware with their programs like so many other software vendors do.

about 8 days ago - by  |  2 Replies

Windows, Mac OS X, and Linux all allow you to schedule boot-ups, shut-downs, and wake-ups. You can have your computer automatically power up in the morning and automatically shut down at night, if you’d like.

about 8 days ago - by  |  1 Reply

We’ve been touting the benefits of third-party DNS servers for a while now, but one additional benefit that might be of interest is the ability to encrypt all of your DNS requests, further protecting you from anybody spying on you in the middle.

about 12 days ago - by  |  26 Replies

If you are new to computing, you may wonder if having anti-virus software is really necessary if you keep your system updated. Are updates alone enough to keep a system secure? Today’s SuperUser Q&A post discusses the situation to help a new computer user make the right decision.

about 13 days ago - by  |  5 Replies

Whether you are an avid Mac programmer using a Windows Machine, or if you find a DMG file on your Windows machine, it can be useful to know what it is and how to open it.

about 14 days ago - by  |  5 Replies

A “text expander” autocorrects short combination of characters you type to longer phrases. They can be used anywhere in any operating system. For example, you could type “bbl” and have this always automatically expand to “I’ll be back later.”

about 16 days ago - by  |  2 Replies

Windows and PowerShell have built-in security features and default configurations intended to prevent end-users from accidentally launching scripts in the course of their daily activities. However, if your daily activities routinely involve writing and running your own PowerShell scripts, this can be more of a nuisance than a benefit. Here, we’ll show you how to work around these features without completely compromising on security.

about 19 days ago - by  |  1 Reply

For several reasons, mostly security-related, PowerShell scripts aren’t as easily portable and usable as batch scripts can be. However, we can bundle a batch script with our PowerShell scripts to work around these issues. Here, we’ll show you a few of those problem areas, and how to build a batch script to get around them.

about 20 days ago - by  |  7 Replies

Firefox themes — also known as “personas” — can change the way your browser looks, making it more personal. If you like theming the applications you use, there’s no better application to theme than your browser.

about 21 days ago - by  |  4 Replies

Whether you need to hide your recent activity on a computer or if you need to synchronize file dates, using BulkFileChanger is the best way to adjust the creation, access, or modification dates and times of files or folders.

about 22 days ago - by  |  2 Replies

TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.

about 22 days ago - by  |  11 Replies

Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.

about 23 days ago - by  |  1 Reply

Thanks to bad design decisions, AutoRun was once a huge security problem on Windows. AutoRun helpfully allowed malicious software to launch as soon as you inserted discs and USB drives into your computer.

about 24 days ago - by  |  3 Replies

You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.

about 25 days ago - by  |  1 Reply

In batch scripts, changes to environment variables have a global impact to the current session by default. For PowerShell, the exact opposite is true because scopes are used to isolate a script’s modifications. Here, we’ll explore how scopes affect PowerShell scripts and how to work in and around them.

about 26 days ago - by  |  1 Reply

EXIF contains a ton of information about your camera, and potentially where the picture was taken (GPS coordinates). That means, if you’re sharing images, there’s a lot of details others can glean from them.

about 27 days ago - by  |  4 Replies

Some people spend hours — maybe even days — trying to clean an infected Windows system and ensuring it’s actually clean and safe afterward. It’s usually not a good idea to do this — just reinstall Windows and start over.

about 30 days ago - by  |  58 Replies

You may want to switch to another cloud storage service — perhaps moving to Microsoft’s OneDrive to get that now-infinite cloud storage. Yes, you could just download and re-upload all your files, but you can also do this a faster way.

about 1 month ago - by  |  6 Replies
Page 1 of 13312345678Next »...Last »