Once upon a time Windows natively displayed PSD thumbnails after you installed Photoshop. These days, however, you only get the generic Photoshop icon. How can you get the thumbnails for Photoshop back (and other image and design formats in the process)?
You can easily access the PC Settings screen in Windows 8.1… by swiping on the right side of the screen, and then clicking on Settings, and then finally clicking on PC Settings at the bottom of the window. Since that’s a pain, here is how to pin it to your Start Screen.
Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of the document.
While doing some cleaning up on a test computer around the office, we realized that we’ve never written about how to block an application from running using a registry hack. It’s easy, so here you go.
Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed.
If you’ve recently made the jump to Windows 8 and you’re puzzled over the seemingly limited thumbnail size choices, read on as we highlight how to get extra large thumbnails back (and some very handy keyboard shortcuts that give you access to a whopping 45 thumbnail size choices).
If you work with Windows long enough, especially with folders and files that have long names, you’ll run into a bizarre error: Windows will report that the folder path or file name is too long to move to a new destination or even delete. What’s the deal?
You recommend a program to a family member, and they proceed to install it along with five other junkware programs that sneak their way on to their computer in the installation process. Sound familiar? Unchecky prevents these unnecessary programs from installing themselves by unchecking the appropriate boxes.
A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
Bill Gates famously said “two years from now, spam will be solved” back in 2004. It’s now ten years later and more than 70% of emails are spam, according to Kaspersky. Why is spam still such a problem?
I’m sure that we are not the only people who carry around multiple devices and only have 1 or 2 mobile data plans. If the device carrying your data plan happens to be your Windows tablet, start celebrating. We’ll show you how you can share that data goodness with your other devices.
Windows 8′s desktop hasn’t seen many improvements for touch use, but even 8-inch Windows tablets have a desktop. If you have to use the desktop with your finger, these tips will help you avoid frustration.
The caller said “I’m calling you from Windows tech support.” The fake tech support scammers made the mistake of calling us today and we played along to learn their tricks just for fun. Here’s what happened.
Spam seems to arrive in every single email account we use, no matter how careful we are. How are spammers getting all our email addresses? And can we do anything to hide our email address from spammers?
It’s important to check various log data and statistics on your server every day, but it grows to be tedious. Wouldn’t it be nice to receive a single email with all the highlights each day, so you don’t even need to get on the server to check for problems? This guide will show you how to configure automated emails on Linux and Windows.
If your Taskbar, System Tray, or even the Start Screen starts acting up, you don’t have to power off or reboot your computer. You can usually just restart the Explorer process, and Windows 8.x makes that really easy.
The internet exploded Friday with the news that Google Chrome extensions are being sold and injected with adware. But the little-known and much more important fact is that your extensions are spying on you and selling your browsing history to shady corporations. HTG investigates.
Malware isn’t the only online threat to worry about. Social engineering is a huge threat, and it can hit you on any operating system. In fact, social engineering can also occur over the phone and in face-to-face situations.
A false positive is a mistake that happens occasionally — the antivirus thinks a download is harmful when it’s actually safe. But malicious people may try to trick you into downloading malware with this assurance.
Hooking up a desktop computer to a monitor is simple; you just plug it in and it works. Connecting a laptop to a television should be just as easy, right? Well, not always. Read on as we explain several ways to hook up a laptop to your TV.
Windows 8 was very different from Windows 7, but change is only speeding up — Windows 8.1 has seen quite a few changes since Windows 8. You’ll have new things to learn, whichever which version of Windows you’re upgrading from.
What does every geek do when their computer starts to run slow or give them trouble? They open the task manager and look at the running processes. This guide will teach you what to look for and how to prioritize running processes to make your computer run more smoothly.
Chrome 32 now offers a new feature on Windows 8: A full-screen, Chrome OS-style desktop mode. The Chrome app launcher can bring Chrome OS to the Windows desktop, but Chrome can now replace the Windows desktop entirely.
Do you prefer Google Chrome to Microsoft’s Windows 8 apps? Well, you’re in luck, even if you have a Windows 8 PC. You can swap the entire “Modern” environment for the Chrome OS desktop, hiding the Windows 8 interface entirely.
There may be times when you need your PC to retain the same local IP address every time it boots up. Forwarding ports, sharing content on your network, and other things can all be made easier when your computer’s IP address never changes.