SEARCH

WINDOWS ARTICLES / EVERYTHING ABOUT MICROSOFT WINDOWS

You can easily access the PC Settings screen in Windows 8.1… by swiping on the right side of the screen, and then clicking on Settings, and then finally clicking on PC Settings at the bottom of the window. Since that’s a pain, here is how to pin it to your Start Screen.

about 1 year ago - by  |  1 Reply

Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of the document.

about 1 year ago - by  |  3 Replies

While doing some cleaning up on a test computer around the office, we realized that we’ve never written about how to block an application from running using a registry hack. It’s easy, so here you go.

about 1 year ago - by  |  3 Replies

Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed.

about 1 year ago - by  |  8 Replies

If you’ve recently made the jump to Windows 8 and you’re puzzled over the seemingly limited thumbnail size choices, read on as we highlight how to get extra large thumbnails back (and some very handy keyboard shortcuts that give you access to a whopping 45 thumbnail size choices).

about 1 year ago - by  |  4 Replies

If you work with Windows long enough, especially with folders and files that have long names, you’ll run into a bizarre error: Windows will report that the folder path or file name is too long to move to a new destination or even delete. What’s the deal?

about 1 year ago - by  |  6 Replies

You recommend a program to a family member, and they proceed to install it along with five other junkware programs that sneak their way on to their computer in the installation process.  Sound familiar?  Unchecky prevents these unnecessary programs from installing themselves by unchecking the appropriate boxes.

about 1 year ago - by  |  23 Replies

A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.

about 1 year ago - by  |  9 Replies

Bill Gates famously said “two years from now, spam will be solved” back in 2004. It’s now ten years later and more than 70% of emails are spam, according to Kaspersky. Why is spam still such a problem?

about 1 year ago - by  |  18 Replies

I’m sure that we are not the only people who carry around multiple devices and only have 1 or 2 mobile data plans. If the device carrying your data plan happens to be your Windows tablet, start celebrating. We’ll show you how you can share that data goodness with your other devices.

about 1 year ago - by  |  1 Reply

Windows 8’s desktop hasn’t seen many improvements for touch use, but even 8-inch Windows tablets have a desktop. If you have to use the desktop with your finger, these tips will help you avoid frustration.

about 1 year ago - by  |  1 Reply

The caller said “I’m calling you from Windows tech support.” The fake tech support scammers made the mistake of calling us today and we played along to learn their tricks just for fun. Here’s what happened.

about 1 year ago - by  |  54 Replies

Spam seems to arrive in every single email account we use, no matter how careful we are. How are spammers getting all our email addresses? And can we do anything to hide our email address from spammers?

about 1 year ago - by  |  5 Replies

It’s important to check various log data and statistics on your server every day, but it grows to be tedious.  Wouldn’t it be nice to receive a single email with all the highlights each day, so you don’t even need to get on the server to check for problems?  This guide will show you how to configure automated emails on Linux and Windows.

about 1 year ago - by  |  1 Reply

If your Taskbar, System Tray, or even the Start Screen starts acting up, you don’t have to power off or reboot your computer. You can usually just restart the Explorer process, and Windows 8.x makes that really easy.

about 1 year ago - by  |  5 Replies

The internet exploded Friday with the news that Google Chrome extensions are being sold and injected with adware. But the little-known and much more important fact is that your extensions are spying on you and selling your browsing history to shady corporations. HTG investigates.

about 1 year ago - by  |  66 Replies

Malware isn’t the only online threat to worry about. Social engineering is a huge threat, and it can hit you on any operating system. In fact, social engineering can also occur over the phone and in face-to-face situations.

about 1 year ago - by  |  1 Reply

A false positive is a mistake that happens occasionally — the antivirus thinks a download is harmful when it’s actually safe. But malicious people may try to trick you into downloading malware with this assurance.

about 1 year ago - by  |  3 Replies

Hooking up a desktop computer to a monitor is simple; you just plug it in and it works.  Connecting a laptop to a television should be just as easy, right?  Well, not always.  Read on as we explain several ways to hook up a laptop to your TV.

about 1 year ago - by  |  7 Replies

Windows 8 was very different from Windows 7, but change is only speeding up — Windows 8.1 has seen quite a few changes since Windows 8. You’ll have new things to learn, whichever which version of Windows you’re upgrading from.

about 1 year ago - by  |  1 Reply

What does every geek do when their computer starts to run slow or give them trouble?  They open the task manager and look at the running processes.  This guide will teach you what to look for and how to prioritize running processes to make your computer run more smoothly.

about 1 year ago - by  |  4 Replies

Chrome 32 now offers a new feature on Windows 8: A full-screen, Chrome OS-style desktop mode. The Chrome app launcher can bring Chrome OS to the Windows desktop, but Chrome can now replace the Windows desktop entirely.

about 1 year ago - by  |  1 Reply

Do you prefer Google Chrome to Microsoft’s Windows 8 apps? Well, you’re in luck, even if you have a Windows 8 PC. You can swap the entire “Modern” environment for the Chrome OS desktop, hiding the Windows 8 interface entirely.

about 1 year ago - by  |  5 Replies

There may be times when you need your PC to retain the same local IP address every time it boots up.  Forwarding ports, sharing content on your network, and other things can all be made easier when your computer’s IP address never changes.

about 1 year ago - by  |  9 Replies

Windows 8 contains a built-in file encryption feature, called BitLocker, but only in the Pro or Enterprise versions. In addition, if your system does not have a Trusted Platform Module (TPM), you must use an external USB flash drive with BitLocker for it to work.

about 1 year ago - by  |  4 Replies