Google made 64-bit builds of Chrome available in the Dev and Canary channels during the early part of June, but as of this week, those 64-bit builds have graduated to the Beta channel. So if you were waiting for a more stable version to try, then now is the time to grab a copy of the new 64-bit build for your system!
Have you ever noticed that little blinking line at the end of whatever you are typing? Of course you have! But did you know that you can make the line darker if you want to? It also makes a fun prank setting to mess with your friends.
Windows is packed full of system tools, and many of them are in the Administrative Tools folder. The tools here are more powerful and complex, so they’re hidden where most Windows users won’t stumble across them.
Set up a new disk on Windows 8.1 or 8 and you’ll be asked whether you want to use MBR or GPT. GPT is the new standard and is gradually replacing MBR.
Windows’ BitLocker encryption defaults to 128-bit AES encryption, but you can choose to use 256-bit AES encryption instead. Using a 256-bit AES key could potentially offer more security against future attempts to access your files.
Unknown devices show up in the Windows Device Manager when Windows can’t identify a piece of hardware and provide a driver for it. An unknown device isn’t just unknown — it’s not functioning until you install the right driver.
It’s happened to everybody at some point—you go to install a new application, and Windows tells you to reboot first. Or reboot after. Or it asks you to close out of every other application first. Why does it do that?
Ask any PC tech person how to make your computer faster, and almost every one of them will tell you to defrag your PC. But do you really need to manually trigger a defrag these days?
Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.
Being able to find your favorite applications using substrings makes your workload just a bit easier to deal with, but what do you do when this useful search feature stops working? Today’s SuperUser Q&A post has the answer to solve a reader’s ‘broken’ search feature problem.
Windows 8.x finally bundled an antivirus utility that used to be called Microsoft Security Essentials and rebranded it as Windows Defender. The only problem is that you can’t easily setup automatic scheduled scans anymore.
BitLocker normally encrypts entire drives and partitions, but you can also create encrypted container files with tools built into Windows. Such encrypted VHD files can easily be moved between systems, backed up, and hidden when not in-use.
Whether you want to use a new font in a Word or just change your operating system’s system font to give it a different look, you’ll first have to install the font on your operating system.
Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don’t wait until you’ve lost your hardware to think about this — these features need to be enabled ahead of time.
Windows can encrypt entire operating system drives and removable devices with its built-in BitLocker encryption. When TrueCrypt controversially closed up shop, they recommended their users transition away from TrueCrypt to BitLocker.
Passwords can be reset or bypassed on every operating system. On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files.
Searching for a singular file or file type is one thing, but what do you do when you need to search for multiple file types at the same time? Today’s SuperUser Q&A post comes to the rescue for one reader’s file search dilemma.
Windows 7 and 8 create a special “System Reserved” partition when you install them on a clean disk. Windows doesn’t assign a drive letter to these partitions, so you’ll only see them when you use Disk Management or similar utility.
When working on a long document or a book in Word, it’s common to divide the document into sections or chapters. A common practice is to start each new section or chapter on an odd page. This is easily accomplished using sections in Word.
Internet connection data caps are becoming more widespread in the US. Internet service providers may claim their data limits are good for “millions of emails,” but emails are small and HD videos on Netflix are much, much larger.
If you use remote desktop, remote file access, or other server software, you may leave your computer on at home or work when you leave the house. This uses more power. Instead, you could simply remotely power on your PC whenever you need to use it.
All mainstream desktop operating systems include powerful search features. They all offer the ability to create a “saved search,” which functions as a virtual folder. The saved search folder appears to contain the files that match your search.
Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can change, or “spoof,” MAC addresses in software.
System images are complete backups of everything on your PC’s hard drive or a single partition. They allow you to take a snapshot of your entire drive, system files and all.
Homegroups and network file sharing make it easy to access your PCs file from another PC on the same local network, but accessing your PC’s files over the Internet takes a bit more setup.