Command line interfaces can be downright boring and always seem to miss out on the fresh coats of paint liberally applied to the rest of Windows. Here’s how to add a splash of color to Command Prompt and make it unique.
It’s important to note that this will not actually conceal your data from somebody who knows what they are doing.
If you want really quick access to launch a frequently used application without putting extra icons on your desktop, you can add that application to the context menu for the desktop with a simple registry hack. Here’s how to do it.
Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.
A free OneDrive account provides 15 GB of online storage and allows you to access files from multiple devices, such as a PC, a smartphone, and a tablet. You can easily copy files to your OneDrive account using the Send To menu in Windows Explorer.
Has your Internet connection become slower than it should be? There may be a chance that you have some malware, spyware, or adware that is using your Internet connection in the background without your knowledge. Here’s how to see what’s going on under the hood.
It’s happened to everybody at some point—you go to install a new application, and Windows tells you to reboot first. Or reboot after. Or it asks you to close out of every other application first. Why does it do that?
Ask any PC tech person how to make your computer faster, and almost every one of them will tell you to defrag your PC. But do you really need to manually trigger a defrag these days?
Taking ownership of system files or folders in Windows is not a simple task. Whether you use the GUI or the command line, it takes far too many steps. This method works in Windows Vista, 7, 8, and 8.1, and it maybe works in XP, though you won’t need it there.
The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image.
The more software you install on your computer, the longer it may seem to take to start up Windows. Many programs add themselves to the list of programs started when you boot your computer, and that list can get long.
I’ve previously written about a way to enable or disable UAC from the command line. This is an easier method that you can use to do the same thing from the GUI interface in either Windows 7, 8, 8.1, or Vista. To recap my earlier article, UAC is ANNOYING.
When organizing your home network it’s easier to assign each computer it’s own IP address than using DHCP. Here we will take a look at doing it in XP, Vista, Windows 7, Windows 8 and Windows 8.1.
On occasion you will need to edit the hosts file on your machine. Sometimes because of an attack or prank, and others so that you can simply and freely control access to websites and network traffic.
Have you ever downloaded a file only to find it has a strange .rar file extension? By the end of this article you will be able to view the file no matter if you are running Windows or Mac OSX.
Did you have someone else set up the wireless network in your house, and can’t for the life of you remember the password? If so read on to see how you may still be able to recover it.
Changing this in XP was extremely simple, but in Windows 7, Windows 8, or Vista it’s buried behind a few more menus. Here are three routes you can take to open up System Properties:
Windows 7, 8, and Vista hide important files and folders from view to keep users from deleting or otherwise modifying files they shouldn’t, but a simple checkbox can change that behavior.
Windows 7 makes it possible to change the welcome screen that appears when you start your computer without any third-party software, but this setting is well hidden. You can set any image you like as your background.
Windows has the built-in ability to function as VPN server, although this option is hidden. This trick works on both Windows 7 and Windows 8. The server uses the point-to-point tunneling protocol (PPTP.)
Do you need to send someone sensitive information through email? Regular email is sent “in the clear” and therefore is subject to interception by hackers. However, there are many options for sending private, sensitive information securely through email.
We’ve covered virtual private networks and when you might want to use them before. Connecting to a VPN is easy, as Windows and most other operating systems offer built-in VPN support.
Need to send sensitive information through email? Normal email messages can be intercepted or hacked before reaching the recipient. However, you can use a free extension for Google Chrome, called SafeGmail, that allows you to send encrypted emails to anyone.
If you are a command line junkie like me, and have been testing out Windows 7 or Vista… one of the first things you’ll notice is that there is no way to run a command from the run box in “Administrator” mode. Until now.
The Windows Aero Glass interface for Windows 7 or Vista requires a decent video card, you won’t be able to use it on an old clunker computer. For those worried about performance, sometimes squeezing every last drop requires disabling Aero.