Whether it is just a matter of curiosity or a genuine need to know, how do you tell if two DVDs are exactly the same? Today’s SuperUser Q&A looks at some different ways to find out.
Bluetooth mice are conveniently cordless but it’s very frustrating when they lose their connection; read on as we troubleshoot a reader’s Windows laptop and help them keep their mouse awake and in communication with their computer.
While most people will never need to open a .lnk file to edit it, there may be rare occasions when it is necessary or desired. But how do you open and edit a shortcut file? Today’s SuperUser Q&A post has the answers.
OTR stands for “off the record.” It’s a way to have encrypted private instant message conversations online. It uses end-to-end encryption so your network provider, government, and even the instant-messaging service itself can’t see the content of your messages.
Only one cash prize went unclaimed at Pwn2Own 2014. All major browsers were hacked, but hackers were unable to claim the $150,000 grand prize for hacking IE 11 secured with EMET. Secure your own PC with EMET today.
Having a monitor with a very high resolution is awesome, but what do you do when Google Chrome and Internet Explorer refuse to make appropriate use of all that resolution real-estate? Today’s SuperUser Q&A has some possible solutions to one reader’s resolution dilemma.
Sure, maybe your parents don’t need any help with their PC and your kids are better at technology than you are. But many geeks are called upon to be responsible for a relative’s PC — often after it breaks.
Are you looking for the ‘hottest’ combination of Google Chrome and 64-bit Windows systems? Then you will definitely want to give the new 64-bit builds of Google Chrome in the Dev and Canary channels a try! The new builds just became available this week and are ready for all manner of testing fun.
Tools like ping, traceroute, lookup, whois, finger, netstat, ipconfig, and port scanners are available on nearly every operating system you can get your hands on. They’re used for everything from troubleshooting a connection to looking up information.
Microsoft added User Account Control to Windows in Windows Vista, and it’s still used on Windows 7 and 8 today. UAC restricts what programs can do without your permission.
Virtual machines are isolated containers, so the guest operating system in the virtual machine doesn’t have access to your computer’s file system. You’ll have to set up shared folders in a program like VirtualBox or VMware to share files.
The eternal debate…Macs or PCs. Both have loyal fan bases that love each for various reasons, but if you look past that, what is it that really makes them different from each other? Professor Tom Rodden explains the differences between PCs and Macs in today’s video from Computerphile.
Steam’s In-Home Streaming is now available to everyone, allowing you to stream PC games from one PC to another PC on the same local network. Use your gaming PC to power your laptops and home theater system.
Your operating system provides each user account with its own folders when you set up several different user accounts on the same computer. Shared folders allow you to share files between user accounts.
Sometimes you just want to pop the browser open for a quick web search without reloading all your saved tabs; read on as we show a fellow reader how to make a quick private-browsing shortcut.
Backups on Windows can be confusing. Whether you’re using Windows 7 or 8, you have quite a few integrated backup tools to think about. Windows 8 made quite a few changes, too.
Web browser bookmarklets allow you to perform actions on the current page with just a click or tap. They’re a lightweight alternative to browser extensions. They even work on mobile browsers that don’t support traditional extensions.
Boot Camp can be annoying. Both Windows and Mac OS X can see each other’s files, but they can’t write to the other operating system’s partition.
This is Microsoft’s attempt to give Windows 8 and 8.1 the “always-on” state people get from iPads, Android tablets, and smartphones. A PC with Connected Standby can’t use other power-management states like Sleep and Hibernate.
Windows software downloads are a mess. Many programs try to drag adware and other malicious junk onto your computer. Even safe programs we test sometimes turn to the dark side and start bundling junk later.
There are plenty of third-party programs and other widgets that may help you keep information close at hand. Here’s a neat trick to keep short notes or other small pieces of information accessible from the taskbar without any extra software.
Chrome is gradually becoming more of a platform, and some of the best features of Android are making their way to Windows. With voice search and Google Now support, Google beat Microsoft’s own Cortana service to Windows.
Have you heard? Antivirus software is dead — at least according to Symantec, maker of Norton Antivirus. But they’re still making Norton Antivirus and want to sell it to you, so what does this statement even mean?
Sometimes it’s the big changes in a new OS that really grind your gears and, other times, it’s something as simple as finding the background color to be an eyesore. Let’s take a look at how you can easily change the background/accent color in Windows 8.
Browser extensions are pieces of code that run in your web browser. They can do malicious things like display ads, track your browsing, and capture your passwords and private data. A safe extension could automatically update and become malware.