Have you ever noticed that little blinking line at the end of whatever you are typing? Of course you have! But did you know that you can make the line darker if you want to? It also makes a fun prank setting to mess with your friends.
You are no doubt reading this article because you’ve looked in task manager and wondered what on earth all those rundll32.exe processes are, and why they are running… So what are they?
Windows is packed full of system tools, and many of them are in the Administrative Tools folder. The tools here are more powerful and complex, so they’re hidden where most Windows users won’t stumble across them.
Set up a new disk on Windows 8.x or 10 and you’ll be asked whether you want to use MBR or GPT. GPT is the new standard and is gradually replacing MBR.
Windows’ BitLocker encryption defaults to 128-bit AES encryption, but you can choose to use 256-bit AES encryption instead. Using a 256-bit AES key could potentially offer more security against future attempts to access your files.
Unknown devices show up in the Windows Device Manager when Windows can’t identify a piece of hardware and provide a driver for it. An unknown device isn’t just unknown — it’s not functioning until you install the right driver.
It’s happened to everybody at some point—you go to install a new application, and Windows tells you to reboot first. Or reboot after. Or it asks you to close out of every other application first. Why does it do that?
Ask any PC tech person how to make your computer faster, and almost every one of them will tell you to defrag your PC. But do you really need to manually trigger a defrag these days?
Being able to find your favorite applications using substrings makes your workload just a bit easier to deal with, but what do you do when this useful search feature stops working? Today’s SuperUser Q&A post has the answer to solve a reader’s ‘broken’ search feature problem.
Windows 8.x finally bundled an antivirus utility that used to be called Microsoft Security Essentials and rebranded it as Windows Defender. The only problem is that you can’t easily setup automatic scheduled scans anymore.
Sometimes when you plug a USB drive into your machine you won’t see it in Computer or AutoPlay in Windows. Today we take a look at how to change the drive letter so you can can access it.
BitLocker normally encrypts entire drives and partitions, but you can also create encrypted container files with tools built into Windows. Such encrypted VHD files can easily be moved between systems, backed up, and hidden when not in-use.
Whether you want to use a new font in a Word or just change your operating system’s system font to give it a different look, you’ll first have to install the font on your operating system.
Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don’t wait until you’ve lost your hardware to think about this — these features need to be enabled ahead of time.
Windows can encrypt entire operating system drives and removable devices with its built-in BitLocker encryption. When TrueCrypt controversially closed up shop, they recommended their users transition away from TrueCrypt to BitLocker.
Friends and family members seem to ask me all the time whether they are running 32-bit or 64-bit Windows, and I’ve finally realized that it would make more sense to show everybody how to figure it out for themselves. Here’s the two-step process to find out for yourself.
Passwords can be reset or bypassed on every operating system. On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files.
Searching for a singular file or file type is one thing, but what do you do when you need to search for multiple file types at the same time? Today’s SuperUser Q&A post comes to the rescue for one reader’s file search dilemma.
Windows 7, 8, and 10 create a special “System Reserved” partition when you install them on a clean disk. Windows doesn’t assign a drive letter to these partitions, so you’ll only see them when you use Disk Management or similar utility.
When working on a long document or a book in Word, it’s common to divide the document into sections or chapters. A common practice is to start each new section or chapter on an odd page. This is easily accomplished using sections in Word.
Internet connection data caps are becoming more widespread in the US. Internet service providers may claim their data limits are good for “millions of emails,” but emails are small and HD videos on Netflix are much, much larger.
If you use remote desktop, remote file access, or other server software, you may leave your computer on at home or work when you leave the house. This uses more power. Instead, you could simply remotely power on your PC whenever you need to use it.
One of the first things Web Developers using ASP.NET will want to install on Windows 8 is IIS (Internet Information Services). Windows 8 and Windows 10 ships with a new version of IIS, version 8, lets take a look at installing it.
All mainstream desktop operating systems include powerful search features. They all offer the ability to create a “saved search,” which functions as a virtual folder. The saved search folder appears to contain the files that match your search.
Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can change, or “spoof,” MAC addresses in software.