Always-listening voice commands are a big thing now. You don’t need an Xbox one or Amazon Echo for this — just make your phone, tablet, or computer always listen for voice commands.
Remember when uTorrent was great? The upstart BitTorrent client was super-lightweight and trounced other popular BitTorrent clients. But that was long ago, before BitTorrent, Inc. bought uTorrent and crammed it full of junkware and scammy advertisements.
The internet went crazy today when somebody figured out that uTorrent was bundling a piece of crapware called EpicScale that uses your computer to mine for Bitcoins, and according to many reports, was silently installed. The even bigger problem is that it doesn’t uninstall clean, so we’re going to show you how to do that today.
Keyboard shortcuts can greatly simplify our work flow, but what do you do when you are told to use a shortcut with an obscure key that you are not even sure is on your keyboard? Today’s SuperUser Q&A post has the answer to help a frustrated reader find the key he is looking for.
All modern smartphone, tablet, and desktop operating systems offer secure ways to give a guest access to your computer. Lock them to a specific app or give them restricted access to your PC. Forget looking over their shoulder!
Sometimes when you set up a dual-boot system, things can get a bit weird with the time and clock settings, so how do you fix the problem? Today’s SuperUser Q&A post has the perfect solution to help a frustrated reader fix his dual-boot clock woes.
Most characters you can type don’t appear on your keyboard, whether you’re using a physical keyboard or a touch one. Here’s how you can type them on your computer or mobile device.
In Windows 7, the System Tray has become the Notification Area and it allows for more customization than was available in Windows XP. You can choose which icons in the Notification Area are visible and which are hidden.
Virtual desktops were finally added as a built-in feature in Windows 10. If you’ve used Linux or Mac, you know this can be a very useful feature. If you open a lot of programs at once, this feature allows you to keep them organized.
Upgrade to Windows 8 or 10 and you may be surprised to find that you can no longer play video DVDs or Blu-ray. Unlike previous versions of Windows, Windows 8 and 10 don’t include built-in support for playing DVDs.
If you use Google Chrome, there’s a good chance you’ve seen files with the “.crdownload” extension in your Downloads directory. Google Chrome creates one each time you begin downloading a file.
If you just installed Windows 8 or Windows 10 on your laptop and the screen won’t stay at the brightness level you want, it’s probably because the adaptive brightness feature isn’t working right on your system. Here’s how to disable it.
Local media servers have gone out of style. Microsoft no longer makes Windows Home Server and is phasing out Windows Media Center. But there are still great solutions if you want to run a home media server and stream to all your devices.
Even though both Windows and its users have made the jump to the 21st century, there’s still some lingering 1990s-era annoyances hiding out in the OS including Windows’ tenacious desire to create thumbnail files (and then refusing to delete them). Read on as we solve the “File In Use” deletion error problem.
The Internet is supposed to be a global network that links the entire world, but many websites are confined to specific countries. Unsurprisingly, piracy is higher in countries where content isn’t legally available.
Whether it is due to a disability or just a personal preference, sometimes you need to squeeze some unique functionality out of your keyboard. But how do you go about it though? Today’s SuperUser Q&A post has the answer to help a reader in need.
You’ll need a unique product key to reinstall Windows on your PC. This is more confusing than it sounds — you may not be able to re-use the key your computer’s manufacturer used.
We’ve been doing a lot of research into crapware and malware lately, and one of the most troubling things we found was that Google was serving up search results for open source software… with crapware-bundling ads at the top. Now it appears they’ve ended this policy and are pointing to the real download at the top.
Microsoft operates over 100 retail stores across the USA and Canada. They’re not just places to shop — Microsoft Stores will perform basic Windows PC maintenance for you, for free. It doesn’t matter where you bought the PC, as long as it runs Windows.
Windows makes it possible to change the welcome screen that appears when you start your computer without any third-party software, but this setting is well hidden in Windows 7 — although much easier in Windows 8 or 10. You can set any image you like as your background.
It’s a scary time to be a Windows user. Lenovo was bundling HTTPS-hijacking Superfish adware, Comodo ships with an even worse security hole called PrivDog, and dozens of other apps like LavaSoft are doing the same. It’s really bad, but if you want your encrypted web sessions to be hijacked just head to CNET Downloads or any freeware site, because they are all bundling HTTPS-breaking adware now.
Lenovo’s been shipping Superfish on their PCs for months. This is a security disaster, and it shows how little PC manufacturers actually care about your PC’s security. There’s only one way to ensure your new PC is actually safe to use.
Sometimes you may need to jump to a specific location relative to your current location in a Word document. You can easily do this using the “Go To” function to jump forward or back a specified number of pages.
It’s easier than ever to find a PC game’s FPS. Steam now offers a built-in FPS display, and so does NVIDIA via its GeForce Experience software. Fraps is still around to display this for other games — and many games have this built-in, too.
Digitally signed drivers include an electronic fingerprint that indicates which company the driver was produced by as well as an indication as to whether the driver has been modified since the company released it. This increases security, as a signed driver that has been modified will no longer have an intact signature. Drivers are signed using code signing certificates.