If you are new to computing, you may wonder if having anti-virus software is really necessary if you keep your system updated. Are updates alone enough to keep a system secure? Today’s SuperUser Q&A post discusses the situation to help a new computer user make the right decision.
Whether you are an avid Mac programmer using a Windows Machine, or if you find a DMG file on your Windows machine, it can be useful to know what it is and how to open it.
A “text expander” autocorrects short combination of characters you type to longer phrases. They can be used anywhere in any operating system. For example, you could type “bbl” and have this always automatically expand to “I’ll be back later.”
Windows and PowerShell have built-in security features and default configurations intended to prevent end-users from accidentally launching scripts in the course of their daily activities. However, if your daily activities routinely involve writing and running your own PowerShell scripts, this can be more of a nuisance than a benefit. Here, we’ll show you how to work around these features without completely compromising on security.
For several reasons, mostly security-related, PowerShell scripts aren’t as easily portable and usable as batch scripts can be. However, we can bundle a batch script with our PowerShell scripts to work around these issues. Here, we’ll show you a few of those problem areas, and how to build a batch script to get around them.
Firefox themes — also known as “personas” — can change the way your browser looks, making it more personal. If you like theming the applications you use, there’s no better application to theme than your browser.
Whether you need to hide your recent activity on a computer or if you need to synchronize file dates, using BulkFileChanger is the best way to adjust the creation, access, or modification dates and times of files or folders.
TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.
Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.
Thanks to bad design decisions, AutoRun was once a huge security problem on Windows. AutoRun helpfully allowed malicious software to launch as soon as you inserted discs and USB drives into your computer.
You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.
In batch scripts, changes to environment variables have a global impact to the current session by default. For PowerShell, the exact opposite is true because scopes are used to isolate a script’s modifications. Here, we’ll explore how scopes affect PowerShell scripts and how to work in and around them.
EXIF contains a ton of information about your camera, and potentially where the picture was taken (GPS coordinates). That means, if you’re sharing images, there’s a lot of details others can glean from them.
Some people spend hours — maybe even days — trying to clean an infected Windows system and ensuring it’s actually clean and safe afterward. It’s usually not a good idea to do this — just reinstall Windows and start over.
You may want to switch to another cloud storage service — perhaps moving to Microsoft’s OneDrive to get that now-infinite cloud storage. Yes, you could just download and re-upload all your files, but you can also do this a faster way.
Preserving old world saves, trying out new features, and keeping your Minecraft version in sync with your favorite multiplayer server all require knowing how to adjust and save your Minecraft version number. Read on as we show you how.
Windows has quite a few special folders, and if you add cloud storage, then you probably have more. Regardless, all of them make sense except the Contacts folder. What is the Contacts folder? Does it serve a purpose?
One of the most common steps when troubleshooting a PC is to boot into safe mode. For a long time this has been achieved by pressing the F8 key, this all changes with Windows 8 and its Automatic Repair mode. But what if we want Safe Mode?
It’s happened to all of us. You step away from your computer and come back a few minutes later. While you were gone, your computer’s hard drive lights start flashing — but what exactly is it doing? It’s natural to be a bit suspicious.
When you have just received a nice computer without hardware documentation, how do you find out what type of drive it has without opening it up? Today’s SuperUser Q&A post provides some quick and easy solutions to help a reader find the information he needs.
It can be tough porting your videos and music to every device you use. How do you know your Mac, Xbox, and Windows Machine can read your files? Read on to find your perfect USB drive solution.
As a parent, you have plenty to worry about; what your kids are doing on their computers shouldn’t be one of them. Today, well show you how to lock down your curiosity-prone kids and really take control of your home network with Microsoft Family Safety.
Once again there are urgent security patches released for Windows, and this time the problems they fix are “potentially catastrophic” issues with the encryption stack. This is why you should have Windows install updates automatically.
There are many different websites for creating web-based surveys, but all you need is a Google account and Google Docs. Easily create a survey with Google Forms, sending the results directly to Google Sheets.
In today’s edition of Stupid Geek Tricks (where we show off little-known tricks to impress your non-geek friends), we’ll learn how to hide data in a text file that can’t be seen by anybody else unless they know the name of the secret compartment.