Many email servers refuse to accept email attachments over 10MB in size. While attachment sizes haven’t kept up with the times, there are other easy ways to send someone large files over email.
If you use Outlook for your email and calendar, but also use Google Calendar (say one for business and one for personal), you can easily add your Google Calendar to Outlook so you can view all your calendars in one place.
VirtualBox is packed with features that you may have never used, even if you frequently use it to run virtual machines. VMware keeps many of its best features to its paid versions, but all of VirtualBox’s features are completely free.
You have more than enough available space on a given hard disk, so why can’t you park your file there? Read on as we investigate why Windows will deny you even if there is plenty of space to spare.
The deadline for the end of Windows XP support is drawing closer every day now, yet many people and businesses continue to use it. Microsoft is adamant that once April 8th comes and goes, there will be no end-of-life extensions, assisted support options, or online technical content updates of any kind, period. With this in mind, many security experts are expecting malware authors to start stockpiling exploits and vulnerabilities in the lead-up to the cut-off date.
When sending email, you might want to know that your message has been delivered (delivery receipt) and you might want to know whether the message was opened (read receipt). You can request one or both types of receipts easily in Outlook 2013.
Virtual machines generally run guest operating systems and their programs in a single window. However, both VirtualBox and VMware have features that allow you to free virtualized programs from their prison, running them on your host desktop.
Have you ever had your PC turn on in the middle of the night for some unknown reason? It’s probably either network connectivity or someone connecting a USB device.
If you write a lot of legal documents or other types of documents in which you need to reference specific sections, adding line numbers can be useful. We will show you how to add unobtrusive line numbers in the left margin of a Word document.
By default, Hyper-V tries to figure out which Virtual Machines were powered on at the time that your PC had its power cut. It uses this list to automatically turn Virtual Machines back on when your PC powers on. Here is how to change what gets switched back on.
There may be times when you want to change the direction of text in Word. This is easily done using text boxes or shapes or using cells in a table. We will show you both methods for changing the direction of text.
Some compromises had to be made for the Surface Pro and Surface RT’s keyboards. As is the case with many portable devices, space is at a premium, and certain non-essential keys had to be shifted to secondary function positions or dropped altogether.
Sometimes the faithful download progress meter on your browser (or other application) just throws its hands in the air and gives up on displaying the remaining download time. Why does it sometimes nail the projected download time and sometimes fails to report it all together?
Linux users often want to run Windows software on Linux, but Windows users may want to run Linux software, too. Whether you’re looking for a better development environment or powerful command-line tools, you can run Linux software without leaving Windows.
If you’ve used an SD card for more advanced purposes than simply storing digital photos (e.g. running a mobile or micro OS), you’ll find it requires a little more finesse than simply formatting the card to reclaim all the space. Read on as we show you how.
Traditional mechanical disk drives need to be defragmented for optimum performance, although Windows now does a good job of doing this automatically. Some software companies claim that their tools can “optimize” SSDs, just as disk defragmenters could speed up mechanical drives.
There are a million and one remote tech support options out there. We’ll look at the best ones here, whether you need to walk them through downloading one over the phone or want to set up remote access ahead of time.
We have advised you not mess with your drivers if they are not broken in the past, but from time to time issues arise and later versions of a driver may fix an issue that you are experiencing. Here is how to see which version any driver is at, on any recent version of Windows.
We recently covered how to let people use your computer without giving them access to all your stuff using your operating system’s guest mode feature. A faster alternative would be to give them their own, isolated web browser.
Whether you want to store sensitive data on a USB drive, securely email it, or just add an additional layer of security on your hard drive, there are a variety of ways to protect your files with a password.
PCs are all about backwards compatibility, but this can lead to problems. Games designed for DOS or even just earlier versions of Windows may not work properly on modern versions of Windows without some tweaking.
Windows 8.1 RTM is nearly here and Microsoft is continuing to work hard adding polish and improvements to the operating system. The Verge has obtained a copy of the latest leaked build and taken it for a test spin, so if you are curious about the latest round of changes, then here is your opportunity to see what is new!
If you let someone use your computer, they could gain access to your saved passwords, read your email, access all your files, and more. Instead of looking over their shoulder, just use your operating system’s guest account feature.
Have you ever saved a password in your browser — Chrome, Firefox, Internet Explorer, or another one? Then your passwords are likely viewable by anyone with access to your computer while you’re logged in.
People talk about their online accounts being “hacked,” but how exactly does this hacking happen? The reality is that accounts are hacked in fairly simple ways — attackers don’t use black magic.