There are two types of mixed content — one is worse than the other, but neither is good. Mixed content warnings are in indication that something is wrong with a web page you’re visiting.
HTTPS, the lock icon in the address bar, an encrypted website connection — it’s known as many things. Knowing what it means is important, as it has serious implications banking online, shopping, and avoiding phishing.
Have you ever noticed that it’s C:\Windows\ in Windows, http://howtogeek.com/ on the web, and /home/user/ on Linux, OS X, and Android? Windows uses backslashes for paths, while everything else seems to use forward slashes.
You’re playing a game and you Alt+Tab to use another program, but there’s a problem. The Alt+Tab process may be extremely slow, the game may crash or freeze, or you may see graphical corruption.
Windows has quite a few features for automatically arranging windows, placing them side by side or tiling them on your screen. These features are a bit hidden, so you may not have noticed them.
There is a huge number of antivirus programs to choose from, so how do you find the best one? Do you use what came with your computer or what your friend recommended? How do you know if it’s any good?
Did you know that you can drag and drop files and folders to the command prompt or terminal? It simply auto-completes the path, so you don’t have to type the full thing out or navigate to the right folder. This works in Windows or Mac, and maybe elsewhere.
Once upon a time Windows natively displayed PSD thumbnails after you installed Photoshop. These days, however, you only get the generic Photoshop icon. How can you get the thumbnails for Photoshop back (and other image and design formats in the process)?
You can easily access the PC Settings screen in Windows 8.1… by swiping on the right side of the screen, and then clicking on Settings, and then finally clicking on PC Settings at the bottom of the window. Since that’s a pain, here is how to pin it to your Start Screen.
Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of the document.
While doing some cleaning up on a test computer around the office, we realized that we’ve never written about how to block an application from running using a registry hack. It’s easy, so here you go.
Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed.
If you’ve recently made the jump to Windows 8 and you’re puzzled over the seemingly limited thumbnail size choices, read on as we highlight how to get extra large thumbnails back (and some very handy keyboard shortcuts that give you access to a whopping 45 thumbnail size choices).
If you work with Windows long enough, especially with folders and files that have long names, you’ll run into a bizarre error: Windows will report that the folder path or file name is too long to move to a new destination or even delete. What’s the deal?
You recommend a program to a family member, and they proceed to install it along with five other junkware programs that sneak their way on to their computer in the installation process. Sound familiar? Unchecky prevents these unnecessary programs from installing themselves by unchecking the appropriate boxes.
A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
Bill Gates famously said “two years from now, spam will be solved” back in 2004. It’s now ten years later and more than 70% of emails are spam, according to Kaspersky. Why is spam still such a problem?
I’m sure that we are not the only people who carry around multiple devices and only have 1 or 2 mobile data plans. If the device carrying your data plan happens to be your Windows tablet, start celebrating. We’ll show you how you can share that data goodness with your other devices.
Windows 8’s desktop hasn’t seen many improvements for touch use, but even 8-inch Windows tablets have a desktop. If you have to use the desktop with your finger, these tips will help you avoid frustration.
The caller said “I’m calling you from Windows tech support.” The fake tech support scammers made the mistake of calling us today and we played along to learn their tricks just for fun. Here’s what happened.
Spam seems to arrive in every single email account we use, no matter how careful we are. How are spammers getting all our email addresses? And can we do anything to hide our email address from spammers?
It’s important to check various log data and statistics on your server every day, but it grows to be tedious. Wouldn’t it be nice to receive a single email with all the highlights each day, so you don’t even need to get on the server to check for problems? This guide will show you how to configure automated emails on Linux and Windows.
If your Taskbar, System Tray, or even the Start Screen starts acting up, you don’t have to power off or reboot your computer. You can usually just restart the Explorer process, and Windows 8.x makes that really easy.
The internet exploded Friday with the news that Google Chrome extensions are being sold and injected with adware. But the little-known and much more important fact is that your extensions are spying on you and selling your browsing history to shady corporations. HTG investigates.
Malware isn’t the only online threat to worry about. Social engineering is a huge threat, and it can hit you on any operating system. In fact, social engineering can also occur over the phone and in face-to-face situations.