Whether you are an avid Mac programmer using a Windows Machine, or if you find a DMG file on your Windows machine, it can be useful to know what it is and how to open it.
A “text expander” autocorrects short combination of characters you type to longer phrases. They can be used anywhere in any operating system. For example, you could type “bbl” and have this always automatically expand to “I’ll be back later.”
Do you know who’s connected to your router’s Wi-Fi network? Take a look at the list devices connected to your Wi-Fi network from your router or computer to find out.
Windows and PowerShell have built-in security features and default configurations intended to prevent end-users from accidentally launching scripts in the course of their daily activities. However, if your daily activities routinely involve writing and running your own PowerShell scripts, this can be more of a nuisance than a benefit. Here, we’ll show you how to work around these features without completely compromising on security.
For several reasons, mostly security-related, PowerShell scripts aren’t as easily portable and usable as batch scripts can be. However, we can bundle a batch script with our PowerShell scripts to work around these issues. Here, we’ll show you a few of those problem areas, and how to build a batch script to get around them.
Firefox themes — also known as “personas” — can change the way your browser looks, making it more personal. If you like theming the applications you use, there’s no better application to theme than your browser.
When you are creating surveys or forms, with Microsoft Word, it is usually a good idea to add check boxes to make the options easy to read and answer. There are two main methods which you can use. The first method is ideal for documents that you want people to fill out digitally, while the second option is great for printed documents like to-do lists.
Whether you need to hide your recent activity on a computer or if you need to synchronize file dates, using BulkFileChanger is the best way to adjust the creation, access, or modification dates and times of files or folders.
TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.
Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.
Creating forms with Microsoft Word is easy, but the challenge comes in when you decide to create fillable forms with options that you can send to people and have them fill out digitally. Whether you need a form for gathering information about people or if you are trying to take a survey to test out user response to software or a new product, MS Word has the solution for you.
Thanks to bad design decisions, AutoRun was once a huge security problem on Windows. AutoRun helpfully allowed malicious software to launch as soon as you inserted discs and USB drives into your computer.
You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.
In batch scripts, changes to environment variables have a global impact to the current session by default. For PowerShell, the exact opposite is true because scopes are used to isolate a script’s modifications. Here, we’ll explore how scopes affect PowerShell scripts and how to work in and around them.
Apple introduced iCloud Drive in iOS 8 and Mac OS X Yosemite. It’s designed to be a more easily understandable cloud storage location, working more like Dropbox, OneDrive, and Google Drive.
EXIF contains a ton of information about your camera, and potentially where the picture was taken (GPS coordinates). That means, if you’re sharing images, there’s a lot of details others can glean from them.
Some people spend hours — maybe even days — trying to clean an infected Windows system and ensuring it’s actually clean and safe afterward. It’s usually not a good idea to do this — just reinstall Windows and start over.
You may want to switch to another cloud storage service — perhaps moving to Microsoft’s OneDrive to get that now-infinite cloud storage. Yes, you could just download and re-upload all your files, but you can also do this a faster way.
Preserving old world saves, trying out new features, and keeping your Minecraft version in sync with your favorite multiplayer server all require knowing how to adjust and save your Minecraft version number. Read on as we show you how.
Windows has quite a few special folders, and if you add cloud storage, then you probably have more. Regardless, all of them make sense except the Contacts folder. What is the Contacts folder? Does it serve a purpose?
If you frequently send out mass email news letters and keep getting users replying to all recipients, or need to disable the ability to forward an email, Microsoft Exchange and Outlook have you covered.
It’s happened to all of us. You step away from your computer and come back a few minutes later. While you were gone, your computer’s hard drive lights start flashing — but what exactly is it doing? It’s natural to be a bit suspicious.
When you have just received a nice computer without hardware documentation, how do you find out what type of drive it has without opening it up? Today’s SuperUser Q&A post provides some quick and easy solutions to help a reader find the information he needs.
It can be tough porting your videos and music to every device you use. How do you know your Mac, Xbox, and Windows Machine can read your files? Read on to find your perfect USB drive solution.
Outlook and Gmail have separate address books. They don’t sync, which means that if you change your contacts in one or the other, then you have one address book that remains unchanged. Here’s how to keep your address books synced with free, open-source software.