SEARCH

WINDOWS ARTICLES / EVERYTHING ABOUT MICROSOFT WINDOWS

Curious about when you installed Windows and how long you’ve been chugging along without a system refresh? Read on as we show you a simple way to see how long-in-the-tooth your Windows installation is.

about 12 months ago - by  |  12 Replies

Have you ever noticed how slow Steam’s built-in web browser can be? Do you struggle with slow download speeds? Or is Steam just slow in general? These tips will help you speed it up.

about 12 months ago - by  |  1 Reply

When organizing your home network it’s easier to assign each computer it’s own IP address than using DHCP. Here we will take a look at doing it in XP, Vista, Windows 7, Windows 8 and Windows 8.1.

about 12 months ago - by  |  Comments (36)

PC games usually have built-in graphics options that you can change. However, you’re not limited to the options built into games — the graphics control panels bundled with graphics drivers allow you to tweak options from outside PC games.

about 12 months ago - by  |  2 Replies

If your computer is infected with malware, running an antivirus within Windows may not be enough to remove it. If your computer has a rootkit, the malware may be able to hide itself from your antivirus software.

about 12 months ago - by  |  16 Replies

It seems particularly counterintuitive: you minimize an application because you plan on returning to it later and wish to skip shutting the application down and restarting it later, but sometimes maximizing it takes even longer than launching it fresh. What gives?

about 12 months ago - by  |  5 Replies

You’ve setup your worksheet with all your row and column headings and you’ve entered all your data. Then, you discover that it would look better if the rows were the columns and the columns were the rows. How do you accomplish this easily?

about 12 months ago - by  |  3 Replies

Viruses and other types of malware seem largely confined to Windows in the real world. Even on a Windows 8 PC, you can still get infected with malware. But how vulnerable are other operating systems to malware?

about 12 months ago - by  |  6 Replies

Windows 8 has a new layer of security that builds in the SmartScreen filter from Internet Explorer right into Windows itself. If you don’t like that idea, here’s how to disable it.

about 12 months ago - by  |  Comments (3)

If you use Outlook to check and manage your email, you can easily use it to check your Gmail account as well. You can set up your Gmail account to allow you to synchronize email across multiple machines using email clients instead of a browser.

about 12 months ago - by  |  8 Replies

The Signature Editor in Outlook 2013 allows you to create a custom signature from text, graphics, or business cards. We will show you how to use the various features of the Signature Editor to customize your signatures.

about 12 months ago - by  |  Leave a reply

If you’ve created a signature with an image, links, text formatting, or special characters, the signature will not look the same in plain text formatted emails as it does in HTML format. As the name suggests, Plain Text does not support any type of formatting.

about 1 year ago - by  |  Leave a reply

Most people seem to call every type of malware a “virus”, but that isn’t technically accurate. You’ve probably heard of many more terms beyond virus: malware, worm, Trojan, rootkit, keylogger, spyware, and more. But what do all these terms mean?

about 1 year ago - by  |  3 Replies

Keyboard shortcuts are practically essential for using any type of PC. They’ll speed up almost everything you do. But long lists of keyboard shortcuts can quickly become overwhelming if you’re just getting started.

about 1 year ago - by  |  13 Replies

Let’s be honest: The Windows desktop is a mess. Sure, it’s extremely powerful and has a huge software library, but it’s not a good experience for average people. It’s not even a good experience for geeks, although we tolerate it.

about 1 year ago - by  |  40 Replies

If your computer becomes infected with a virus or another piece of malware, removing the malware from your computer is only the first step. There’s more you need to do to ensure you’re secure.

about 1 year ago - by  |  6 Replies

Do you use the Windows Calculator to perform quick calculations while building spreadsheets in Excel? You can save time by adding the Calculator to the Quick Access Toolbar in Excel so you don’t have to leave the program to access the Calculator.

about 1 year ago - by  |  1 Reply

Before Windows 8.1, it was possible to sync any folder on your computer with SkyDrive using symbolic links. This method no longer works now that SkyDrive is baked into Windows 8.1, but there are other tricks you can use.

about 1 year ago - by  |  4 Replies

Normally, the first page, or cover page, of a document does not have a page number or other header or footer text. You can avoid putting a page number on the first page using sections, but there is an easier way to do this.

about 1 year ago - by  |  Leave a reply

The WinSXS folder at C:\Windows\WinSXS is massive and continues to grow the longer you have Windows installed. This folder builds up unnecessary files over time, such as old versions of system components.

about 1 year ago - by  |  16 Replies

Bloatware is still a big problem on new Windows 8 and 8.1 PCs. Some websites will tell you that you can easily get rid of manufacturer-installed bloatware with Windows 8′s Reset feature, but they’re generally wrong.

about 1 year ago - by  |  3 Replies

We’ve shown you how to export a contact to and import a contact from a vCard (.vcf) file. However, what if you want to export multiple contacts at the same time to multiple vCard files or even a single vCard file?

about 1 year ago - by  |  Leave a reply

If you want to add a business card template to an existing contact in Outlook, you can do so without having to enter all of the information again. We will also show you how to customize the layout and format of the text on the card.

about 1 year ago - by  |  Leave a reply

Ransomware is a type of malware that tries to extort money from you. One of the nastiest examples, CryptoLocker, takes your files hostage and holds them for ransom, forcing you to pay hundreds of dollars to regain access.

about 1 year ago - by  |  33 Replies

Whenever you add a Business Card to your signature in Outlook 2013, the Signature Editor automatically generates a picture of it and includes that in the signature as well as attaching the .vcf file. However, there is a way to leave out the image.

about 1 year ago - by  |  1 Reply