Each device on your network has a private IP address only seen by other devices on the local network. But your ISP assigns you a public IP address that other devices on the Internet can see. Here’s how that works and how you can find those IP addresses.
Your Mac’s serial number is a unique identifier that distinguishes your Mac from all others. You have to provide your Mac’s serial number when requesting warranty service. You may also want to look up your Mac’s serial number if you’re reporting it stolen.
Windows doesn’t display your PC’s serial number anywhere in its interface, and neither do popular system information tools. But you can often find a PC’s serial number with a simple command, a peek in your BIOS, or on the hardware itself.
If you dig through Windows 10’s settings, you may come across something called “Developer Mode”. When put into Developer Mode, Windows allows you to more easily test apps you’re developing, use the Ubuntu Bash shell environment, change a variety of developer-focused settings, and do other such things.
Every electronic device you own—your phone, laptop, mouse, keyboard, and every other piece of tech—has a unique serial number. But are those numbers best kept private, like passwords, or is it alright if someone else sees them?
Chromium is an open-source browser project that forms the basis for the Chrome web browser. But let’s take a little deeper look at what that means.
FPS isn’t just for bragging rights. If it’s too low, your gameplay suffers. If it’s consistently high, you might be able to bump up your settings for a more visually pleasing experience. Here are several ways you can check your PC game’s FPS.
Modern web browsers allow websites to ask for your location through a prompt. If you’re tired of seeing these prompts, you can disable them and websites won’t be able to ask for your location anymore.
Chromebooks aren’t like traditional laptops. While they’re much simpler, they still have various useful features you may not know about. From accessing remote computers and printing to wiping your personal data, recovering Chrome OS, and installing desktop Linux, these tricks will help you get the most out of your Chromebook.
If you’ve ever needed to access your router’s setup page to make some configuration changes, you know you need your router’s IP address gain access. If you’ve forgotten what that IP address is, here’s how to find it on just about every platform.
When you configure a proxy server for a Wi-Fi network, your iPhone or iPad will use it when accessing that network. This is sometimes required to access the Internet on a business or school network, for example. Your network traffic will be sent through the proxy you configure.
It’s been over four years since Microsoft first released the PC Settings interface with Windows 8, but the Control Panel and Settings app are still a confusing, split experience. There still isn’t a single interface, as there is on other operating systems, and Microsoft is seriously dragging their feet on consolidating them.
Your computer’s BIOS is the first thing that loads when you start your computer. It initializes your hardware before booting an operating system from your hard drive or another device. Many low-level system settings are only available in your BIOS.
Chromebooks, Chromeboxes, and other Chrome OS devices allow you to set a proxy server through which you can route your traffic.This may be required to access the Internet on some networks—for example, on business or school networks.
You’ll sometimes see MD5, SHA-1, or SHA-256 hashes displayed alongside downloads during your internet travels, but not really known what they are. These seemingly random strings of text allow you to verify files you download aren’t corrupted or tampered with. You can do this with the commands built into Windows, macOS, and Linux.
When you configure a proxy server on your Mac, applications will send their network traffic through the proxy server before going to their destination. This may be required by your employer to bypass a firewall, or you may want to use a proxy to bypass geoblocking and access websites that aren’t available in your country.
Some Windows 10 devices ship with “Device Encryption”, but other PCs require you to pay another $99 to get BitLocker on Windows Pro for full-disk encryption. If you’d rather not, you can use the free and open-source VeraCrypt software to get full-disk encryption on any version of Windows.
An SSH client connects to a Secure Shell server, which allows you to run terminal commands as if you were sitting in front of another computer. But an SSH client also allows you to “tunnel” a port between your local system and a remote SSH server.
If you want to send your web browser traffic—and only your browser traffic—through a proxy, Mozilla Firefox is a great option. It uses your system-wide proxy settings by default, but you can configure separate proxy settings for Firefox only.
Amazon offers free music streaming with Prime, a paid music service for an additional monthly fee, direct MP3 sales, a way to get MP3s when you purchase audio CDs, and a music locker you can upload your own songs to. That’s a lot to keep track of! Here are all of Amazon’s confusing music services, explained.
BitLocker’s full-disk encryption normally requires a computer with a Trusted Platform Module (TPM). Try to enable BitLocker on a PC without a TPM, and you’ll be told your administrator must set a system policy option.
Set up a new disk on Windows 8.x or 10 and you’ll likely be asked whether you want to use the MBR or GPT partition structures. If you’ve ever wanted to know more about these, then keep reading.
Norton, like most other antivirus tools, is rather intrusive. It installs a toolbar in your web browser, pops up notifications even when you download safe files, and shows you various special offers and reports. But you can set Norton to only notify you when there’s an actual problem.
If you’ve been experiencing system or application crashes in Windows, it’s possible system files have become corrupt or that other system damage has occurred. Here’s what you can do about it.
McAfee, like most other modern antivirus programs, doesn’t stay out of your way. It installs browser extensions and shows various alert messages you might not want to see. If McAfee came with your PC, you may regularly see messages that your subscription is expired. Here’s how to get rid of that noise.