One of the great things about Linux is that you can do the same thing hundreds of different ways—even something as simple as generating a random password can be accomplished with dozens of different commands. Here’s 10 ways you can do it.
If you have a compromised Windows system and want to analyze when services were installed or modified, then how do you do that? Today’s SuperUser Q&A post has the answers to a curious reader’s question.
Screenshots are a great way to prove a point, build a case, or just send someone something interesting on your screen. If you don’t know how to take screenshots, then you’re really missing out.
If you’ve got loads of icons cluttering up your desktop, you might want a quick way to turn them off without using the context menu; here’s a quick and easy way to make a shortcut key to turn them on or off.
If you’re a Windows power user you probably already know how to do this, but for everybody else, it can be useful to see file extensions so that you know for sure what type of file you are dealing with.
The era of the $200 Windows laptop is back, and the HP Stream is just the first of many. These products are definitely better than the much-maligned netbook, but Chromebooks beat them in many ways.
Drivers aren’t something that you need to be terribly worried about anymore unless you’re a gamer, but when you are troubleshooting a problem it can be useful to see what you have installed. But who wants to click through every item in Device Manager?
If someone else is using your computer or if you need to see what changes were made to your files and folders during a specific time, you can use Nirsoft’s handy FolderChangesView application. Nirsoft is a great freeware provider that produces amazing little tools for your PC, and the best part is that they never bundle crapware with their programs like so many other software vendors do.
Windows, Mac OS X, and Linux all allow you to schedule boot-ups, shut-downs, and wake-ups. You can have your computer automatically power up in the morning and automatically shut down at night, if you’d like.
We’ve been touting the benefits of third-party DNS servers for a while now, but one additional benefit that might be of interest is the ability to encrypt all of your DNS requests, further protecting you from anybody spying on you in the middle.
If you are new to computing, you may wonder if having anti-virus software is really necessary if you keep your system updated. Are updates alone enough to keep a system secure? Today’s SuperUser Q&A post discusses the situation to help a new computer user make the right decision.
Whether you are an avid Mac programmer using a Windows Machine, or if you find a DMG file on your Windows machine, it can be useful to know what it is and how to open it.
A “text expander” autocorrects short combination of characters you type to longer phrases. They can be used anywhere in any operating system. For example, you could type “bbl” and have this always automatically expand to “I’ll be back later.”
Windows and PowerShell have built-in security features and default configurations intended to prevent end-users from accidentally launching scripts in the course of their daily activities. However, if your daily activities routinely involve writing and running your own PowerShell scripts, this can be more of a nuisance than a benefit. Here, we’ll show you how to work around these features without completely compromising on security.
For several reasons, mostly security-related, PowerShell scripts aren’t as easily portable and usable as batch scripts can be. However, we can bundle a batch script with our PowerShell scripts to work around these issues. Here, we’ll show you a few of those problem areas, and how to build a batch script to get around them.
Firefox themes — also known as “personas” — can change the way your browser looks, making it more personal. If you like theming the applications you use, there’s no better application to theme than your browser.
Whether you need to hide your recent activity on a computer or if you need to synchronize file dates, using BulkFileChanger is the best way to adjust the creation, access, or modification dates and times of files or folders.
TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.
Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.
Thanks to bad design decisions, AutoRun was once a huge security problem on Windows. AutoRun helpfully allowed malicious software to launch as soon as you inserted discs and USB drives into your computer.
You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.
In batch scripts, changes to environment variables have a global impact to the current session by default. For PowerShell, the exact opposite is true because scopes are used to isolate a script’s modifications. Here, we’ll explore how scopes affect PowerShell scripts and how to work in and around them.
EXIF contains a ton of information about your camera, and potentially where the picture was taken (GPS coordinates). That means, if you’re sharing images, there’s a lot of details others can glean from them.
Some people spend hours — maybe even days — trying to clean an infected Windows system and ensuring it’s actually clean and safe afterward. It’s usually not a good idea to do this — just reinstall Windows and start over.
You may want to switch to another cloud storage service — perhaps moving to Microsoft’s OneDrive to get that now-infinite cloud storage. Yes, you could just download and re-upload all your files, but you can also do this a faster way.