Internet connection data caps are becoming more widespread in the US. Internet service providers may claim their data limits are good for “millions of emails,” but emails are small and HD videos on Netflix are much, much larger.
If you use remote desktop, remote file access, or other server software, you may leave your computer on at home or work when you leave the house. This uses more power. Instead, you could simply remotely power on your PC whenever you need to use it.
All mainstream desktop operating systems include powerful search features. They all offer the ability to create a “saved search,” which functions as a virtual folder. The saved search folder appears to contain the files that match your search.
Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can change, or “spoof,” MAC addresses in software.
System images are complete backups of everything on your PC’s hard drive or a single partition. They allow you to take a snapshot of your entire drive, system files and all.
Homegroups and network file sharing make it easy to access your PCs file from another PC on the same local network, but accessing your PC’s files over the Internet takes a bit more setup.
Medical conditions sometimes require us to tweak Windows in order to accommodate a particular physical limitation or need. With this in mind, today’s SuperUser Q&A post looks at options available for a reader’s visual monochrome needs.
Hardware drivers are the software that allow your operating system to communicate with your hardware. Windows includes built-in drivers and automatically downloads new ones to make setup easier, but device manufacturers also provide their own driver packages.
Share a folder with Windows’ built-in sharing options and you can access it on an Android device, iPad, or iPhone. This is a convenient way to stream videos from your PC or access other files wirelessly.
Windows, Mac, and Linux can all get along together, sharing files with each other on a network. They can also share printers, allowing you to use a single wired printer for all the computers on your home network.
Most browsers have had an active developer channel for quite some time, but Internet Explorer was not a member of that select group until this week. Microsoft’s browser has now joined the developer channel elite with builds available for Windows 7 SP1 and 8.1 systems!
The Enhanced Mitigation Experience Toolkit is Microsoft’s best-kept security secret. It’s easy to install EMET and quickly secure many popular applications, but there’s a lot more you can do with EMET.
We have all had a computer system or program crash on us at one time or another, but have you ever wondered what is actually happening when a crash occurs? YouTube channel Computerphile looks at what is going on when a crash happens in today’s video.
Home file sharing used to be a nightmare, even between different versions of Windows — never mind Mac and Linux! These operating systems can now talk to each other and share files without any special software.
Creating installation media for your operating system of choice used to be simple. Just download an ISO and burn it to CD or DVD. Now we’re using USB drives, and the process is a little different for each operating system.
Whether it is just a matter of curiosity or a genuine need to know, how do you tell if two DVDs are exactly the same? Today’s SuperUser Q&A looks at some different ways to find out.
Bluetooth mice are conveniently cordless but it’s very frustrating when they lose their connection; read on as we troubleshoot a reader’s Windows laptop and help them keep their mouse awake and in communication with their computer.
While most people will never need to open a .lnk file to edit it, there may be rare occasions when it is necessary or desired. But how do you open and edit a shortcut file? Today’s SuperUser Q&A post has the answers.
OTR stands for “off the record.” It’s a way to have encrypted private instant message conversations online. It uses end-to-end encryption so your network provider, government, and even the instant-messaging service itself can’t see the content of your messages.
Only one cash prize went unclaimed at Pwn2Own 2014. All major browsers were hacked, but hackers were unable to claim the $150,000 grand prize for hacking IE 11 secured with EMET. Secure your own PC with EMET today.
Having a monitor with a very high resolution is awesome, but what do you do when Google Chrome and Internet Explorer refuse to make appropriate use of all that resolution real-estate? Today’s SuperUser Q&A has some possible solutions to one reader’s resolution dilemma.
Sure, maybe your parents don’t need any help with their PC and your kids are better at technology than you are. But many geeks are called upon to be responsible for a relative’s PC — often after it breaks.
Are you looking for the ‘hottest’ combination of Google Chrome and 64-bit Windows systems? Then you will definitely want to give the new 64-bit builds of Google Chrome in the Dev and Canary channels a try! The new builds just became available this week and are ready for all manner of testing fun.
Tools like ping, traceroute, lookup, whois, finger, netstat, ipconfig, and port scanners are available on nearly every operating system you can get your hands on. They’re used for everything from troubleshooting a connection to looking up information.
Microsoft added User Account Control to Windows in Windows Vista, and it’s still used on Windows 7 and 8 today. UAC restricts what programs can do without your permission.