Authy is supposed to make two-factor authentication simple and painless by centralizing your accounts into one app. Sounds awesome, but is it safe? Let’s look into it further and find out.
We’ve always been told that backing up our data is a good idea. Well, that same concept can extend to email as well. You may want to archive your email every so often, such as monthly, quarterly, or even yearly.
If you’re thinking about buying a new hard drive because you’re running out of capacity, you can quickly free up a lot of space by offloading large files to the cloud.
Regshot is a great utility that you can use to compare the amount of registry entries that have been changed during an installation or a change in your system settings. While most PC users will never really need to do this, it is a great tool for troubleshooting and monitoring your registry.
Never download a driver-updating utility. Like PC-cleaning programs, they try to charge you money for a service you don’t need. They do this by scaring you with threats of blue screens and system problems.
Do you get too many newsletters and other promotional emails? These emails aren’t technically “spam” — they’re from legitimate organizations. Thanks to the US CAN-SPAM act, every legitimate company offers a consistent way to unsubscribe from their newsletters.
You’ve probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you’ve ever allowed keeps that access forever — or at least until you revoke it.
If you’ve been eyeing the falling prices on spacious solid-state drives but putting off an upgrade because you don’t want the hassle of reinstalling everything, we here to help. Read on as we show you how to clone your old HDD onto a new HDD and get your entire system back up and running in under an hour; no reinstallation of Windows and all your apps necessary.
We recently explained why you should be using IMAP instead of POP3 for your email. If you still have old POP3 emails stored offline, you don’t have to abandon them — import your POP3 emails into an IMAP account.
If a website asks you to download a “codec,” “player,” or “browser update” to play a video, run the other way. You don’t actually need to download this sort of thing — the website is trying to infect your computer with malware.
It’s hard to wrap our minds around all these Internet catastrophes as they occur, and just as we thought the Internet was secure again after Heartbleed and Shellshock threatened to “end life as we know it,” out comes POODLE.
Wireshark is the Swiss Army knife of network analysis tools. Whether you’re looking for peer-to-peer traffic on your network or just want to see what websites a specific IP address is accessing, Wireshark can work for you.
It’s always fun to find those little hidden tricks whenever a new operating system comes out. In this case, the same trick that worked back in the Windows 7 and Vista days also works in Windows 8 and 10, but it’s been improved.
Ever tried to buy a Windows license from Amazon or Newegg? If only it was so simple. You’ll encounter cheaper System Builder (OEM) and more expensive Full Version (Retail) licenses. But the difference isn’t immediately apparent.
If you have ever had hidden system files set to display on your Windows system, then you have likely noticed a ‘matching’ pair of desktop.ini files on your desktop. Why are there two of them? Today’s SuperUser Q&A post has the answers to a confused reader’s question.
Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets.
Java was responsible for 91 percent of all computer compromises in 2013. Most people not only have the Java browser plug-in enabled — they’re using an out-of-date, vulnerable version. Hey, Oracle — it’s time to disable that plug-in by default.
Microsoft has changed the name of “My Computer” to “Computer” and then to “This PC,” and for those people that prefer it one way or another — or something completely different — you can easily rename it.
Intelligent machines capable of speech are often the stuff of futuristic sci-fi movies, but you can turn any computer into a chatty Cathy. Even though we aren’t yet at the stage with computers where they can interact with us like people, there are a few tools and simple scripts we can write to make any computer that is running Windows speak to us.
Java tries to install the terrible Ask Toolbar and other obnoxious junk — sorry, “sponsored software” — when you install it. Worse yet, Java bundles this junkware with security updates. This registry hack tells Java to never install that stuff.
The extremely useful Snap feature — introduced as “Aero Snap” in Windows 7 — is much-improved in Windows 10. Snap Assist, 2×2 snapping, and vertical snap features help make you more productive on the desktop.
Last year, Google announced plans to lock down Chrome so that extensions can’t be side-loaded by crapware installers. Sadly they’ve found a way to trick users into installing lousy extensions, although in this case these spyware and adware extensions do exist in the Chrome Web Store.
Flushing your DNS cache can be a useful tool to resolve any host connection errors that you may experience with Google Chrome or other browsers. It is very simple to do and can be done directly in Chrome or from an Elevated Command Prompt window in Windows 7 or 8.
A new focus on the desktop brings new keyboard shortcuts for desktop users, so rejoice! Here are all the new keyboard shortcuts you need to know in the Windows 10 Technical Preview.