When you delete sensitive files from your Dropbox account, you may think you’ve deleted them permanently. However, the files remain in a hidden cache folder on your hard drive for efficiency and emergency purposes that is cleared automatically every three days.
So you are reading instructions on some article that tells you to reboot into Safe mode. You ask how you do that, and are told to use the F8 key when the computer boots up. But you just can’t seem to get the F8 key to work… so how do you boot into Safe mode?
One of the most common steps when troubleshooting a PC is to boot into safe mode. For a long time this has been achieved by pressing the F8 key, this all changes with Windows 8 and its Automatic Repair mode. But what if we want Safe Mode?
Anytime somebody has hard drive errors, I always recommend that they run chkdsk—what geek wouldn’t? Here’s a full guide to using the Check Disk feature built into every version of Windows.
If you’ve ever hooked up your laptop to a secondary monitor and then disconnected without remembering to move the windows back to the primary desktop, you’ve probably encounted this problem:
Keyboard shortcuts aren’t just for web browsers themselves. Most of those web apps you use — everything from Facebook and Twitter to Gmail and Outlook.com — offer keyboard shortcuts you can use to speed things up.
You are no doubt reading this article because you are wondering what on earth this conhost.exe process is doing in Task Manager, and why it’s running on your shiny new Windows PC. We’ve got the answer for you.
Modern smartphone embed GPS coordinates in each photo they take. Yes, those photos you’re taking have location data embedded in them — at least by default. Many modern digital cameras also do this.
Too many browser tabs! It’s a problem everyone has at some point. For all the window-management tricks built into our desktops, we often just use a single browser window packed with tabs.
uTorrent recently made headlines for bundling cryptocurrency-mining junkware. Out of all the junkware programs bundled with installers, cryptocurrency-miners like Epic Scale are some of the worst.
There is no doubt that valid Product Keys are a valuable commodity and need to be carefully guarded from theft. With that in mind, why is the Product ID so visible to one and all? Does this put your Product Key at risk? Today’s SuperUser Q&A post has the answers to a worried reader’s questions.
Many websites, including How-to Geek, display a mobile version for users that are browsing the site on their phone. This is done to reduce bandwidth and look better on a smaller screen and resolution, but sometimes you really just want the full desktop version of a website. Read on to find out how to view the desktop version of any website on your phone.
Streaming services are so commonplace that we often give little thought to how much data they use until it’s too late. It can be a lot, but you can reduce data use and prevent overages with a few minor changes here and there.
Want to use a VPN? If you’re looking for a VPN provider or setting up your own VPN, you’ll need to choose a protocol. Some VPN providers may even provider you with a choice of protocols.
Once a concern that was the province of the paranoid, years worth of reports and revelations have made it readily apparent that people really can (and do) spy on you through your webcam. Read on as we discuss why you should disable or cover your webcam, how you can do so, and review some handy products that can help make the job simple.
Ctrl+Alt+Delete isn’t just necessary on Windows and other desktop operating systems. Applications can freeze or get stuck in bad states on modern iPhones, iPads, and Android devices too.
Migrating your files, settings, and programs to a new PC can be a little intimidating, especially if you’re not completely organized. These tools and simple tips will help you get started.
Always-listening voice commands are a big thing now. You don’t need an Xbox one or Amazon Echo for this — just make your phone, tablet, or computer always listen for voice commands.
Remember when uTorrent was great? The upstart BitTorrent client was super-lightweight and trounced other popular BitTorrent clients. But that was long ago, before BitTorrent, Inc. bought uTorrent and crammed it full of junkware and scammy advertisements.
The internet went crazy today when somebody figured out that uTorrent was bundling a piece of crapware called EpicScale that uses your computer to mine for Bitcoins, and according to many reports, was silently installed. The even bigger problem is that it doesn’t uninstall clean, so we’re going to show you how to do that today.
Keyboard shortcuts can greatly simplify our work flow, but what do you do when you are told to use a shortcut with an obscure key that you are not even sure is on your keyboard? Today’s SuperUser Q&A post has the answer to help a frustrated reader find the key he is looking for.
All modern smartphone, tablet, and desktop operating systems offer secure ways to give a guest access to your computer. Lock them to a specific app or give them restricted access to your PC. Forget looking over their shoulder!
Sometimes when you set up a dual-boot system, things can get a bit weird with the time and clock settings, so how do you fix the problem? Today’s SuperUser Q&A post has the perfect solution to help a frustrated reader fix his dual-boot clock woes.
Most characters you can type don’t appear on your keyboard, whether you’re using a physical keyboard or a touch one. Here’s how you can type them on your computer or mobile device.
In Windows 7, the System Tray has become the Notification Area and it allows for more customization than was available in Windows XP. You can choose which icons in the Notification Area are visible and which are hidden.