NVIDIA’s GameStream technology lets you stream games from a GeForce-powered Windows PC to another device. It only officially supports NVIDIA’s own Android-based SHIELD devices, but with a third-party open-source GameStream client known as Moonlight, you can stream games to Windows PCs, Macs, Linux PCs, iPhones, iPads, and non-SHIELD Android devices.
Windows sets all PCs to a “Balanced” power plan by default. But there are also “Power saver” and “High performance” plans. Your PC manufacturer may have even created their own power plans. What’s the difference between them all, and should you bother switching?
Everything has DRM these days, and while Netflix, Amazon Video, Hulu, and even DVDs and Blu-rays “just work” on most systems, Linux users always have to do a little more work. Here’s how penguin lovers can get all those services working on their machines.
Windows offers an on-screen keyboard that lets you type even if you don’t have access to a physical keyboard. It’s particularly useful with a touch screen, but you can also use it to type with a mouse–or even to type with a game controller from your couch.
This week, Microsoft made Windows 10 a “recommended update” that will automatically download for many Windows 7 and 8.1 users. This is just Microsoft’s latest move in aggressively pushing Windows 10–here’s how we got to this point.
Microsoft Security Essentials (Windows Defender on Windows 8) was once on top. Over the years, it’s slid in the test results, but Microsoft argued the tests weren’t meaningful. Now, Microsoft is advising Windows users to use a third-party antivirus instead.
Rooting your Android device gives you access to a wider variety of apps and a deeper access to the Android system. But some apps–like Google’s Android Pay–won’t work at all on a rooted device.
A mouse and keyboard isn’t always the most convenient way to control a PC, especially a media center PC you control from the couch. You can try to control your desktop with a game controller, but your smartphone will do the trick as well.
Compared to a PC, phones and tablets are fairly locked-down devices. Jailbreaking, rooting, and unlocking are all ways of bypassing their limitations, and doing things that manufacturers and carriers don’t want you to do.
Use the Nexus Root Toolkit to quickly root your Nexus devices, whether you’ve got a Nexus 7, Galaxy Nexus, or even a Nexus S. Rooting allows you to use powerful apps that don’t work in Android’s default sandbox.
USB Type-C brings a new universal connector to laptops and smartphones, and many devices are already starting to use it. But beware: many USB-C cables aren’t designed properly and could potentially damage your hardware.
We’ve written about rooting your Android smartphones and tablets before, but why don’t they come rooted? Google argues that rooting is a mistake for security reasons, as it subverts Android’s security model.
Many Android tweaking and hacking guides warn that you’ll void your warranty by continuing. But will you actually be denied repair service if you’ve rooted or unlocked your bootloader?
Commercial DVDs and Blu-ray discs are encrypted. The Digital Rights Management (DRM) is designed to prevent you from ripping them, copying them, and watching them on unsupported players. You can get around this protection to watch DVDs and Blu-rays on Linux, but it’ll take some tweaking.
If you have your PC set up as a living room gaming PC and media center, why use a mouse for everything when you could just use your game controller?
Apple’s iPhones and iPads use its own Lightning connector for charging and data transmission. You can purchase third-party cables and accessories, but they must be certified. If a cable or accessory wasn’t certified by Apple, you’ll see a warning message when you connect it. However, this message can sometimes appear incorrectly, too.
Most modern browsers support extensions, which add additional features to your browser. But the fewer extensions you have installed, the speedier your browser should be. Here’s how to uninstall or disable extensions you don’t use.
Most antivirus programs–or “security suites”, as they call themselves–want you to install their browser extensions. They promise these toolbars will help keep you safe online, but they usually just exist to make the company some money. Worse yet, these extensions are often hideously vulnerable to attack.
The Xbox controller has become the gold standard for PC gaming. It works out of the box better than just about any controller on the market, and if you plan on gaming with a controller, you should get one.
If you recently built or bought a new PC, you may be wondering if you can just transfer your old hard drive into the new computer–thus migrating your entire installation in one fell swoop. But it’s not as easy as it seems.
Nintendo’s Wii U has apps for watching Netflix, YouTube, Hulu, and all kinds of other streaming video. But Nintendo doesn’t offer an app that will play media files from an external drive or media server. Here’s a little trick that will let you stream videos from your home network to your TV with your Wii U.
Hulu doesn’t work out-of-the-box on modern Linux distributions. While Netflix “just works” if you’re using Google Chrome, Hulu’s DRM has gotten old and clunky. You can get Hulu to work on Linux, but it’ll take a little tweaking.
Windows can create “system image backups,” which are essentially complete images of your hard drive and all the files on it. Once you’ve got a system image backup, you can restore your system exactly as it was when you backed up, even if your installation is badly corrupted or completely gone.
One of Android’s most powerful features is the ability to select your default apps for browsing the web, sending emails, and other tasks — even the launcher that appears when you press the Home button. On Android 6.0, there’s now an easy interface for managing your default apps.
Dangerous root certificates are a serious problem. From Lenovo’s Superfish to Dell’s eDellRoot and a number of other certificates installed by adware programs, your computer’s manufacturer or a program you installed may have added a certificate that opens you to attack. Here’s how to check if your certificates are clean.