Being able to send out e-mail using your own domain name can be very nice, but what do you do when someone starts spewing out spam mail using your domain name? Today’s SuperUser Q&A post discusses the matter to help a frustrated reader.
iPads and iPhones give you control over how your kids can use your devices. You can quickly lock your device to a certain app before handing it over or lock down an entire device with comprehensive parental controls.
Authy is supposed to make two-factor authentication simple and painless by centralizing your accounts into one app. Sounds awesome, but is it safe? Let’s look into it further and find out.
If you’re thinking about buying a new hard drive because you’re running out of capacity, you can quickly free up a lot of space by offloading large files to the cloud.
Regshot is a great utility that you can use to compare the amount of registry entries that have been changed during an installation or a change in your system settings. While most PC users will never really need to do this, it is a great tool for troubleshooting and monitoring your registry.
Never download a driver-updating utility. Like PC-cleaning programs, they try to charge you money for a service you don’t need. They do this by scaring you with threats of blue screens and system problems.
Do you get too many newsletters and other promotional emails? These emails aren’t technically “spam” — they’re from legitimate organizations. Thanks to the US CAN-SPAM act, every legitimate company offers a consistent way to unsubscribe from their newsletters.
One of the benefits of the widespread adoption of high-definition television sets and HD capable media players like Blu Ray players and HD-capable streaming boxes has been a push for film and television studios to re-release old content in beautiful HD. But how exactly are they producing HD content 20+ years after the fact?
You’ve probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you’ve ever allowed keeps that access forever — or at least until you revoke it.
Reading your smartphone or tablet in the dark is probably bad for you. That’s unlikely to stop you, so beyond quitting cold turkey, what are the easiest ways to fix your bedtime reading device so it doesn’t put so much strain on your eyes?
If you’ve been eyeing the falling prices on spacious solid-state drives but putting off an upgrade because you don’t want the hassle of reinstalling everything, we here to help. Read on as we show you how to clone your old HDD onto a new HDD and get your entire system back up and running in under an hour; no reinstallation of Windows and all your apps necessary.
We recently explained why you should be using IMAP instead of POP3 for your email. If you still have old POP3 emails stored offline, you don’t have to abandon them — import your POP3 emails into an IMAP account.
If you don’t like the new transparent window effects in OS X Yosemite, you can easily disable them… or at least tone them down quite a bit.
The release of Android 4.4 KitKat brought a wide array of improvements included enhanced security. While the security might be tighter, the messages can still be a bit cryptic. What exactly does the persistent “Network May Be Monitored” warning mean, should you be concerned, and what can you do to get rid of it?
If a website asks you to download a “codec,” “player,” or “browser update” to play a video, run the other way. You don’t actually need to download this sort of thing — the website is trying to infect your computer with malware.
One of the biggest obstacles to keeping digital notes and to-do lists (beyond getting used to not using pen and paper), is finding an app you like. Google Keep is free, lightweight, easy-to-use, and might just be the notes app you’ve been seeking.
When you are adding RAM to a computer, does it really matter if the sticks have unequal amounts of memory or do you always need them to have equal amounts of memory? Today’s SuperUser Q&A post has the answers to a curious reader’s questions.
It’s hard to wrap our minds around all these Internet catastrophes as they occur, and just as we thought the Internet was secure again after Heartbleed and Shellshock threatened to “end life as we know it,” out comes POODLE.
Wireshark is the Swiss Army knife of network analysis tools. Whether you’re looking for peer-to-peer traffic on your network or just want to see what websites a specific IP address is accessing, Wireshark can work for you.
Minecraft runs just fine on Linux, but it’s probably not available for easy installation in your Linux distribution’s package manager. Here’s how to get your Linux system ready for Minecraft.
Recently an email has been making the rounds, scaring people like my mom by claiming that the flashlight app on their smartphone is stealing their information and sending it to China. This, of course, isn’t exactly true, and for the iPhone’s built-in flashlight, is patently false.
It’s always fun to find those little hidden tricks whenever a new operating system comes out. In this case, the same trick that worked back in the Windows 7 and Vista days also works in Windows 8 and 10, but it’s been improved.
Wireshark has quite a few tricks up its sleeve, from capturing remote traffic to creating firewall rules based on captured packets. Read on for some more advanced tips if you want to use Wireshark like a pro.
Ever tried to buy a Windows license from Amazon or Newegg? If only it was so simple. You’ll encounter cheaper System Builder (OEM) and more expensive Full Version (Retail) licenses. But the difference isn’t immediately apparent.