There is a great command line tool that can be used to compare files to see if there are any content or binary code differences that you can access if you are using a PC. File Compare or FC as we will refer to is from here on out, is a simple program that will compare the contents of text or binary files and is capable of comparing both ASCII and Unicode text. You can use this tool to display any lines from two files or two sets of files that do not match up with the others.
If you’re planning on doing a reinstall of Windows but can’t find your product key, you’re in luck because it’s stored in the Windows Registry… it’s just not easy to find, and it’s impossible to read without some help. Luckily, we’re here to help.
Find is another great command line tool that every Windows user should know about because it can be used to search content of files for specific strings of text.
Barely a month had passed after we told you to let Windows Update automatically keep your PC updated before Microsoft decided to make us look bad by releasing a couple of really bad updates that broke people’s computers. So today we’re going to show you how to roll things back should an update break everything.
Most people use their operating system’s included file manager, but many geeks prefer third-party file managers. After all, Windows Explorer doesn’t offer tabs, a dual-pane interface, batch file-renaming tools, and more advanced features.
Screenshots are great, but sometimes you need to create a video recording to really get your point across. You can record your computer’s desktop, your smartphone’s screen, or your tablet’s display.
Animations on a desktop PC, smartphone, or tablet are nice — the first few times. Eventually, you just wish they would hurry up and stop wasting your time.
There are countless ways to copy files between computers, including great sync options like Dropbox, but if you just want to share one of your folders from your Mac to your Windows computer, you can do that easily.
One of the great things about Linux is that you can do the same thing hundreds of different ways—even something as simple as generating a random password can be accomplished with dozens of different commands. Here’s 10 ways you can do it.
If you have a compromised Windows system and want to analyze when services were installed or modified, then how do you do that? Today’s SuperUser Q&A post has the answers to a curious reader’s question.
Screenshots are a great way to prove a point, build a case, or just send someone something interesting on your screen. If you don’t know how to take screenshots, then you’re really missing out.
If you’ve got loads of icons cluttering up your desktop, you might want a quick way to turn them off without using the context menu; here’s a quick and easy way to make a shortcut key to turn them on or off.
If you’re a Windows power user you probably already know how to do this, but for everybody else, it can be useful to see file extensions so that you know for sure what type of file you are dealing with.
The era of the $200 Windows laptop is back, and the HP Stream is just the first of many. These products are definitely better than the much-maligned netbook, but Chromebooks beat them in many ways.
Drivers aren’t something that you need to be terribly worried about anymore unless you’re a gamer, but when you are troubleshooting a problem it can be useful to see what you have installed. But who wants to click through every item in Device Manager?
If someone else is using your computer or if you need to see what changes were made to your files and folders during a specific time, you can use Nirsoft’s handy FolderChangesView application. Nirsoft is a great freeware provider that produces amazing little tools for your PC, and the best part is that they never bundle crapware with their programs like so many other software vendors do.
Windows, Mac OS X, and Linux all allow you to schedule boot-ups, shut-downs, and wake-ups. You can have your computer automatically power up in the morning and automatically shut down at night, if you’d like.
We’ve been touting the benefits of third-party DNS servers for a while now, but one additional benefit that might be of interest is the ability to encrypt all of your DNS requests, further protecting you from anybody spying on you in the middle.
If you are new to computing, you may wonder if having anti-virus software is really necessary if you keep your system updated. Are updates alone enough to keep a system secure? Today’s SuperUser Q&A post discusses the situation to help a new computer user make the right decision.
Whether you are an avid Mac programmer using a Windows Machine, or if you find a DMG file on your Windows machine, it can be useful to know what it is and how to open it.
A “text expander” autocorrects short combination of characters you type to longer phrases. They can be used anywhere in any operating system. For example, you could type “bbl” and have this always automatically expand to “I’ll be back later.”
Windows and PowerShell have built-in security features and default configurations intended to prevent end-users from accidentally launching scripts in the course of their daily activities. However, if your daily activities routinely involve writing and running your own PowerShell scripts, this can be more of a nuisance than a benefit. Here, we’ll show you how to work around these features without completely compromising on security.
For several reasons, mostly security-related, PowerShell scripts aren’t as easily portable and usable as batch scripts can be. However, we can bundle a batch script with our PowerShell scripts to work around these issues. Here, we’ll show you a few of those problem areas, and how to build a batch script to get around them.
Firefox themes — also known as “personas” — can change the way your browser looks, making it more personal. If you like theming the applications you use, there’s no better application to theme than your browser.
Whether you need to hide your recent activity on a computer or if you need to synchronize file dates, using BulkFileChanger is the best way to adjust the creation, access, or modification dates and times of files or folders.