SEARCH

Flushing your DNS cache can be a useful tool to resolve any host connection errors that you may experience with Google Chrome or other browsers. It is very simple to do and can be done directly in Chrome or from an Elevated Command Prompt window in Windows 7 or 8.

about 11 days ago - by  |  13 Replies

You’ve protected a PDF file containing sensitive information with a long, secure password so only the intended party can open it. However, you don’t want to enter that password every time you access the document, so you want to remove the password from your copy.

about 18 days ago - by  |  1 Reply

If you’ve configured Windows to automatically log you in rather than having to enter a password, you might find it annoying that you still need to enter a password when your PC comes out of sleep mode. Here’s the quick fix.

about 1 month ago - by  |  3 Replies

Command line interfaces can be downright boring and always seem to miss out on the fresh coats of paint liberally applied to the rest of Windows.  Here’s how to add a splash of color to Command Prompt and make it unique.

about 1 month ago - by  |  8 Replies

It’s important to note that this will not actually conceal your data from somebody who knows what they are doing.

about 2 months ago - by  |  12 Replies

If you want really quick access to launch a frequently used application without putting extra icons on your desktop, you can add that application to the context menu for the desktop with a simple registry hack. Here’s how to do it.

about 2 months ago - by  |  9 Replies

Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.

about 2 months ago - by  |  16 Replies

A free OneDrive account provides 15 GB of online storage and allows you to access files from multiple devices, such as a PC, a smartphone, and a tablet. You can easily copy files to your OneDrive account using the Send To menu in Windows Explorer.

about 3 months ago - by  |  2 Replies

Has your Internet connection become slower than it should be? There may be a chance that you have some malware, spyware, or adware that is using your Internet connection in the background without your knowledge. Here’s how to see what’s going on under the hood.

about 3 months ago - by  |  6 Replies

It’s happened to everybody at some point—you go to install a new application, and Windows tells you to reboot first. Or reboot after. Or it asks you to close out of every other application first. Why does it do that?

about 3 months ago - by  |  4 Replies

Ask any PC tech person how to make your computer faster, and almost every one of them will tell you to defrag your PC. But do you really need to manually trigger a defrag these days?

about 3 months ago - by  |  9 Replies

Taking ownership of system files or folders in Windows is not a simple task. Whether you use the GUI or the command line, it takes far too many steps. This method works in Windows Vista, 7, 8, and 8.1, and it maybe works in XP, though you won’t need it there.

about 11 months ago - by  |  Comments (327)

The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image.

about 11 months ago - by  |  Comments (91)

The more software you install on your computer, the longer it may seem to take to start up Windows. Many programs add themselves to the list of programs started when you boot your computer, and that list can get long.

about 11 months ago - by  |  Comments (29)

I’ve previously written about a way to enable or disable UAC from the command line. This is an easier method that you can use to do the same thing from the GUI interface in either Windows 7, 8, 8.1, or Vista. To recap my earlier article, UAC is ANNOYING.

about 11 months ago - by  |  Comments (244)

When organizing your home network it’s easier to assign each computer it’s own IP address than using DHCP. Here we will take a look at doing it in XP, Vista, Windows 7, Windows 8 and Windows 8.1.

about 12 months ago - by  |  Comments (36)

On occasion you will need to edit the hosts file on your machine. Sometimes because of an attack or prank, and others so that you can simply and freely control access to websites and network traffic.

about 1 year ago - by  |  Comments (19)

Have you ever downloaded a file only to find it has a strange .rar file extension? By the end of this article you will be able to view the file no matter if you are running Windows or Mac OSX.

about 1 year ago - by  |  Comments (21)

If you live in an apartment complex you’ve probably noticed more than just the passive-aggressive network IDs that your neighbors use—very likely you’ve had problems with your wireless connections dropping out, or just not being as fast as you’d like. Here’s a quick fix.

about 1 year ago - by  |  Comments (43)

Did you have someone else set up the wireless network in your house, and can’t for the life of you remember the password? If so read on to see how you may still be able to recover it.

about 1 year ago - by  |  Comments (14)

Changing this in XP was extremely simple, but in Windows 7, Windows 8, or Vista it’s buried behind a few more menus. Here are three routes you can take to open up System Properties:

about 1 year ago - by  |  Comments (126)

Windows 7, 8, and Vista hide important files and folders from view to keep users from deleting or otherwise modifying files they shouldn’t, but a simple checkbox can change that behavior.

about 2 years ago - by  |  Comments (105)

Windows 7 makes it possible to change the welcome screen that appears when you start your computer without any third-party software, but this setting is well hidden. You can set any image you like as your background.

about 2 years ago - by  |  Comments (56)

Windows has the built-in ability to function as VPN server, although this option is hidden. This trick works on both Windows 7 and Windows 8. The server uses the point-to-point tunneling protocol (PPTP.)

about 2 years ago - by  |  Comments (10)

Do you need to send someone sensitive information through email? Regular email is sent “in the clear” and therefore is subject to interception by hackers. However, there are many options for sending private, sensitive information securely through email.

about 2 years ago - by  |  Comments (13)
Page 1 of 3612345678Next »...Last »