SEARCH

Over the years, we’ve created many Registry hacks to customize and tweak your Windows computer. Today we’re going to give you the keys to making your own registry hack files that you can use on any computer.

about 11 hours ago - by  |  15 Replies

If you have a computer with a hefty amount of RAM, would you gain any benefits from disabling the page file or should you just leave well enough alone? Today’s SuperUser Q&A discusses the topic to help satisfy a reader’s curiosity.

about 12 hours ago - by  |  Leave a reply

Although we live in the age of HD video that doesn’t mean all of us have upgraded our old DVDs to HD content. Let’s look at how you can improve the appearance of standard definition content on your high definition television.

about 15 hours ago - by  |  Leave a reply

f.lux changes the color temperature of your computer’s display depending on the time of day. Everything’s normal during the day, but f.lux users warmer colors after sunset to match your indoor lighting.

about 21 hours ago - by  |  3 Replies

Your Internet service provider runs DNS servers for you, but you don’t have to use them. You can use third-party DNS servers instead, which offer a variety of features that your ISP probably doesn’t.

about 1 day ago - by  |  9 Replies

We warned you at the beginning of the year that many of your browser extensions are spying on you, tracking what you are visiting, and even inserting ads into pages. These aren’t just no-name developers either: even Avast, one of the most trusted antivirus vendors was in on the game.

about 2 days ago - by  |  23 Replies

Outputting your computer to your HDTV via HDMI works well. Unfortunately, your computer’s location depends upon the length of your cable. With Google Chromecast, however, you can literally mirror any browser tab or even your desktop, from anywhere, in just a few clicks.

about 2 days ago - by  |  4 Replies

The FBI isn’t happy about the latest versions of iOS and Android using encryption by default. FBI director James Comey has been blasting both Apple and Google. Microsoft is never mentioned — but Windows 8.1 uses encryption by default, too.

about 2 days ago - by  |  17 Replies

Being able to send out e-mail using your own domain name can be very nice, but what do you do when someone starts spewing out spam mail using your domain name? Today’s SuperUser Q&A post discusses the matter to help a frustrated reader.

about 2 days ago - by  |  1 Reply

iPads and iPhones give you control over how your kids can use your devices. You can quickly lock your device to a certain app before handing it over or lock down an entire device with comprehensive parental controls.

about 3 days ago - by  |  1 Reply

Authy is supposed to make two-factor authentication simple and painless by centralizing your accounts into one app. Sounds awesome, but is it safe? Let’s look into it further and find out.

about 3 days ago - by  |  Leave a reply

You’ve probably heard all about how the Java browser plug-in is insecure. 91% of system compromises in 2013 were against that insecure Java plug-in. But Java isn’t the same thing as JavaScript — in fact, they’re not really related.

about 3 days ago - by  |  4 Replies

If you’re thinking about buying a new hard drive because you’re running out of capacity, you can quickly free up a lot of space by offloading large files to the cloud.

about 4 days ago - by  |  4 Replies

Regshot is a great utility that you can use to compare the amount of registry entries that have been changed during an installation or a change in your system settings. While most PC users will never really need to do this, it is a great tool for troubleshooting and monitoring your registry.

about 4 days ago - by  |  8 Replies

Never download a driver-updating utility. Like PC-cleaning programs, they try to charge you money for a service you don’t need. They do this by scaring you with threats of blue screens and system problems.

about 4 days ago - by  |  33 Replies

Do you get too many newsletters and other promotional emails? These emails aren’t technically “spam” — they’re from legitimate organizations. Thanks to the US CAN-SPAM act, every legitimate company offers a consistent way to unsubscribe from their newsletters.

about 4 days ago - by  |  10 Replies

One of the benefits of the widespread adoption of high-definition television sets and HD capable media players like Blu Ray players and HD-capable streaming boxes has been a push for film and television studios to re-release old content in beautiful HD. But how exactly are they producing HD content 20+ years after the fact?

about 5 days ago - by  |  10 Replies

You’ve probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you’ve ever allowed keeps that access forever — or at least until you revoke it.

about 5 days ago - by  |  Leave a reply

Reading your smartphone or tablet in the dark is probably bad for you. That’s unlikely to stop you, so beyond quitting cold turkey, what are the easiest ways to fix your bedtime reading device so it doesn’t put so much strain on your eyes?

about 5 days ago - by  |  5 Replies

If you’ve been eyeing the falling prices on spacious solid-state drives but putting off an upgrade because you don’t want the hassle of reinstalling everything, we here to help. Read on as we show you how to clone your old HDD onto a new HDD and get your entire system back up and running in under an hour; no reinstallation of Windows and all your apps necessary.

about 6 days ago - by  |  15 Replies

We recently explained why you should be using IMAP instead of POP3 for your email. If you still have old POP3 emails stored offline, you don’t have to abandon them — import your POP3 emails into an IMAP account.

about 6 days ago - by  |  5 Replies

If you don’t like the new transparent window effects in OS X Yosemite, you can easily disable them… or at least tone them down quite a bit.

about 7 days ago - by  |  1 Reply

The release of Android 4.4 KitKat brought a wide array of improvements included enhanced security. While the security might be tighter, the messages can still be a bit cryptic. What exactly does the persistent “Network May Be Monitored” warning mean, should you be concerned, and what can you do to get rid of it?

about 7 days ago - by  |  Leave a reply

If a website asks you to download a “codec,” “player,” or “browser update” to play a video, run the other way. You don’t actually need to download this sort of thing — the website is trying to infect your computer with malware.

about 7 days ago - by  |  14 Replies

One of the biggest obstacles to keeping digital notes and to-do lists (beyond getting used to not using pen and paper), is finding an app you like. Google Keep is free, lightweight, easy-to-use, and might just be the notes app you’ve been seeking.

about 7 days ago - by  |  14 Replies
Page 1 of 18712345678Next »...Last »