SEARCH

WINDOWS ARTICLES / EVERYTHING ABOUT MICROSOFT WINDOWS

Every Chrome extension that you install on your computer is actually constructed out of a special zip file that contains files and folders of Javascript code and other resources. The great thing is that you can actually look into the source code of an extension and see what it is really doing.

about 24 days ago - by  |  1 Reply

If your computer has been hijacked with an obnoxious malware that won’t let you change your home page, there’s a strong chance you’ve been infected with the Trovi Search Protect malware, which used to be known as Conduit. Here’s how to remove it.

about 24 days ago - by  |  11 Replies

If you’ve ever wished you could create an MP3 from a favorite video file, then today is your lucky day. With simple, open source software, you can strip the audio and convert it to your favorite format in a matter of minutes!

about 24 days ago - by  |  6 Replies

If you’ve ever wanted to convert a video file, but weren’t sure what to use, then Handbrake might be the program for you. Today we’ll show you how to use it to convert video files into different formats.

about 25 days ago - by  |  14 Replies

Whether you need to check what files were recently opened on your computer for backup reasons or if you want to see what someone else was opening on your computer, the OSFV tool comes in handy. Today we will discuss what the tool is and how you can use it to see what files were recently opened in Windows.

about 25 days ago - by  |  6 Replies

Forget the Windows Store. Microsoft is working on a Linux-style package management framework for Windows, and it’s included with Windows 10. It’s being tested with Chocolatey’s existing packages, and allows you to easily install desktop applications and other software.

about 27 days ago - by  |  13 Replies

Many of Windows 10’s best features showed up in Mac OS X years ago, including virtual desktops, Expose-like window management, and a notification center. Mac OS X 10.10 Yosemite has some other ideas Microsoft should copy for version 10 of its own operating system, too.

about 28 days ago - by  |  26 Replies

You’ll see badges like “Norton Secured,” “Microsoft Certified Partner,” and “BBB Accredited Business” all over the web — especially when downloading software. You shouldn’t blindly trust a website that displays such badges — they’re just images anyone can copy and paste.

about 30 days ago - by  |  4 Replies

Firewalls are an important piece of security software, and someone is always trying to sell you a new one. However, Windows has come with its own solid firewall since Windows XP SP2, and it’s more than good enough.

about 30 days ago - by  |  25 Replies

Over the years, we’ve created many Registry hacks to customize and tweak your Windows computer. Today we’re going to give you the keys to making your own registry hack files that you can use on any computer.

about 1 month ago - by  |  15 Replies

f.lux changes the color temperature of your computer’s display depending on the time of day. Everything’s normal during the day, but f.lux users warmer colors after sunset to match your indoor lighting.

about 1 month ago - by  |  9 Replies

Your Internet service provider runs DNS servers for you, but you don’t have to use them. You can use third-party DNS servers instead, which offer a variety of features that your ISP probably doesn’t.

about 1 month ago - by  |  9 Replies

We warned you at the beginning of the year that many of your browser extensions are spying on you, tracking what you are visiting, and even inserting ads into pages. These aren’t just no-name developers either: even Avast, one of the most trusted antivirus vendors was in on the game.

about 1 month ago - by  |  44 Replies

The FBI isn’t happy about the latest versions of iOS and Android using encryption by default. FBI director James Comey has been blasting both Apple and Google. Microsoft is never mentioned — but Windows 8.1 uses encryption by default, too.

about 1 month ago - by  |  19 Replies

Authy is supposed to make two-factor authentication simple and painless by centralizing your accounts into one app. Sounds awesome, but is it safe? Let’s look into it further and find out.

about 1 month ago - by  |  1 Reply

We’ve always been told that backing up our data is a good idea. Well, that same concept can extend to email as well. You may want to archive your email every so often, such as monthly, quarterly, or even yearly.

about 1 month ago - by  |  1 Reply

You’ve probably heard all about how the Java browser plug-in is insecure. 91% of system compromises in 2013 were against that insecure Java plug-in. But Java isn’t the same thing as JavaScript — in fact, they’re not really related.

about 1 month ago - by  |  7 Replies

If you’re thinking about buying a new hard drive because you’re running out of capacity, you can quickly free up a lot of space by offloading large files to the cloud.

about 1 month ago - by  |  5 Replies

Regshot is a great utility that you can use to compare the amount of registry entries that have been changed during an installation or a change in your system settings. While most PC users will never really need to do this, it is a great tool for troubleshooting and monitoring your registry.

about 1 month ago - by  |  9 Replies

Never download a driver-updating utility. Like PC-cleaning programs, they try to charge you money for a service you don’t need. They do this by scaring you with threats of blue screens and system problems.

about 1 month ago - by  |  37 Replies

Do you get too many newsletters and other promotional emails? These emails aren’t technically “spam” — they’re from legitimate organizations. Thanks to the US CAN-SPAM act, every legitimate company offers a consistent way to unsubscribe from their newsletters.

about 1 month ago - by  |  14 Replies

You’ve probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you’ve ever allowed keeps that access forever — or at least until you revoke it.

about 1 month ago - by  |  1 Reply

If you’ve been eyeing the falling prices on spacious solid-state drives but putting off an upgrade because you don’t want the hassle of reinstalling everything, we here to help. Read on as we show you how to clone your old HDD onto a new HDD and get your entire system back up and running in under an hour; no reinstallation of Windows and all your apps necessary.

about 1 month ago - by  |  16 Replies

We recently explained why you should be using IMAP instead of POP3 for your email. If you still have old POP3 emails stored offline, you don’t have to abandon them — import your POP3 emails into an IMAP account.

about 1 month ago - by  |  6 Replies

If a website asks you to download a “codec,” “player,” or “browser update” to play a video, run the other way. You don’t actually need to download this sort of thing — the website is trying to infect your computer with malware.

about 1 month ago - by  |  16 Replies