SEARCH

WINDOWS ARTICLES / EVERYTHING ABOUT MICROSOFT WINDOWS

To actually erase files from a magnetic hard drive, you would have to overwrite the file with useless data. Some tools attempt to make this easier, offering to “securely delete” a file by deleting it and overwriting its sectors with junk.

about 11 months ago - by  |  10 Replies

If you’re like most Windows users, you probably just uninstall programs by launching their uninstallers from the Add/Remove Programs Control Panel. But if you’re a geek, there’s a chance you’ve dabbled with a third-party uninstaller.

about 11 months ago - by  |  30 Replies

Windows 8 awkwardly forces the Start menu programs list into a flat “All Apps” list. Many programs haven’t been properly updated for this new reality and fill your All Apps list with useless shortcuts to help files, websites, and uninstallers.

about 11 months ago - by  |  5 Replies

Microsoft Office documents containing built-in macros can be dangerous. Macros are essentially bits of computer code, and historically they’ve been vehicles for malware. Luckily, modern versions of Office contain security features that will protect you from macros.

about 11 months ago - by  |  1 Reply

Cloud storage services are constantly vying for attention, and the inclusion of SkyDrive in Windows 8.1 is indicative of the importance Microsoft places on it. But not everyone is so enamored with the service and would rather that it wasn’t so hard-baked into the OS. Using Group Policy Editor or the Registry Editor, it can be disabled.

about 11 months ago - by  |  Comments (0)

Want to reset your web browser to its default settings? You can’t necessarily just uninstall it — your personal files will stay on your computer. And if your browser is Internet Explorer, it can’t be uninstalled at all.

about 11 months ago - by  |  4 Replies

Some geeks use “driver cleaners” when updating their drivers — generally graphics drivers — to ensure the old driver was completely uninstalled and that no leftover files will conflict with the new driver. But is this necessary?

about 11 months ago - by  |  5 Replies

Google accounts now use a shared pool of storage. Every account gets 15 GB of free space, which is shared across your Gmail, Google Drive, and Google+ Photos. But certain types of files don’t count towards your storage quota.

about 11 months ago - by  |  5 Replies

PC gaming is different from console gaming. Consoles run a stripped-down operating system optimized for games, but PCs run a general-purpose operating system like Windows that may be doing other things in the background.

about 11 months ago - by  |  11 Replies

Outlook 2013 allows you to customize the font used to display the sender’s name, subject, date received, and size of each message in your message list. Maybe you want to just change the size to make the font bigger or smaller, or change the font to one you like better.

about 11 months ago - by  |  Leave a reply

Email inbox gimmicks keep popping up. First Google introduced Priority Inbox, and now it’s using category tabs. Dropbox purchased Mailbox, which turns your inbox into more of a to-do-list. Microsoft’s Outlook.com has a Sweep feature that automatically cleans your inbox.

about 11 months ago - by  |  20 Replies

Office 2013 allows you to add useful apps directly to Word, Excel, etc.. By apps, generally we mean research resources such as dictionaries for defining terms or accessing sites such as Wikipedia directly within Office programs to confirm facts.

about 11 months ago - by  |  Leave a reply

We’ve said it again and again: Registry cleaners don’t speed up your PC. At best, they’re a waste of time — and often money. At worst, they can cause problems by removing registry entries they shouldn’t.

about 11 months ago - by  |  39 Replies

Your computer’s RAM is still faster than even modern solid-state drives. RAM disks take advantage of this, using your computer’s RAM as a lightning-fast virtual drive. But you probably don’t want to use a RAM disk, anyway.

about 11 months ago - by  |  53 Replies

On occasion you will need to edit the hosts file on your machine. Sometimes because of an attack or prank, and others so that you can simply and freely control access to websites and network traffic.

about 11 months ago - by  |  Comments (19)

You can virtualize Windows XP with almost any virtual machine program, but we’ll cover a solution that gives you Windows XP-mode like desktop and taskbar integration on Windows 8.

about 11 months ago - by  |  14 Replies

Many companies want to sell you “memory optimizers,” often as part of “PC optimization” programs. These programs are worse than useless — not only will they not speed up your computer, they’ll slow it down.

about 11 months ago - by  |  9 Replies

The reality is that password database compromises are a concern. However, if you use unique passwords everywhere, you shouldn’t need to worry too much.

about 11 months ago - by  |  13 Replies

Many email servers refuse to accept email attachments over 10MB in size. While attachment sizes haven’t kept up with the times, there are other easy ways to send someone large files over email.

about 11 months ago - by  |  8 Replies

If you use Outlook for your email and calendar, but also use Google Calendar (say one for business and one for personal), you can easily add your Google Calendar to Outlook so you can view all your calendars in one place.

about 11 months ago - by  |  10 Replies

VirtualBox is packed with features that you may have never used, even if you frequently use it to run virtual machines. VMware keeps many of its best features to its paid versions, but all of VirtualBox’s features are completely free.

about 11 months ago - by  |  26 Replies

You have more than enough available space on a given hard disk, so why can’t you park your file there? Read on as we investigate why Windows will deny you even if there is plenty of space to spare.

about 11 months ago - by  |  3 Replies

The deadline for the end of Windows XP support is drawing closer every day now, yet many people and businesses continue to use it. Microsoft is adamant that once April 8th comes and goes, there will be no end-of-life extensions, assisted support options, or online technical content updates of any kind, period. With this in mind, many security experts are expecting malware authors to start stockpiling exploits and vulnerabilities in the lead-up to the cut-off date.

about 11 months ago - by  |  31 Replies

When sending email, you might want to know that your message has been delivered (delivery receipt) and you might want to know whether the message was opened (read receipt). You can request one or both types of receipts easily in Outlook 2013.

about 11 months ago - by  |  2 Replies

Virtual machines generally run guest operating systems and their programs in a single window. However, both VirtualBox and VMware have features that allow you to free virtualized programs from their prison, running them on your host desktop.

about 11 months ago - by  |  2 Replies