Facebook has several useful tools for disasters, including a way to let others know you’re safe, and find out if others are safe, too. You can even connect with people who need or are offering help, or donate to existing fundraisers. If you want to raise money for your own cause, you can set up a fundraiser through Facebook’s Safety Check.
Google’s new WEBP image format is pretty cool: its unique compression systems can display images at approximately two thirds the size of the same image rendered in JPEG or PNG format.
CCleaner, the incredibly popular PC maintenance utility, has been hacked to include malware. Here’s how to tell if you were affected, and what you should do.
Windows 10’s taskbar clock can display the precise time down to the second. This feature requires a registry hack to enable, and only works on Windows 10. Windows 7 users will instead need a third-party utility like T-Clock Redux to do this instead.
From Enhance Pointer Precision to DPI and pointer speed, there are a lot of options that affect how your mouse pointer moves in Windows. The below tips will help you move your mouse pointer more accurately—and even allow you to move it pixel by pixel.
The more smarthome products you pile onto your house, the more complicated it gets to integrate all of them together and seamlessly control them. If you’re in this situation, here are the best ways you can control all of your smarthome devices.
If you’re concerned a file might be malicious, you don’t need to download it and rely on your antivirus. You can scan the file for malware with over 60 antivirus engines before you download it—all with one single tool.
There’s more than one way to shutdown and restart your Synology NAS, including physical interaction with the NAS, software, and scheduled events. Let’s look at all three methods now.
Controlling your smart thermostat remotely from your phone is cool and all, but don’t forget that you can also make it even easier on yourself and control it with your voice using Alexa. Here’s how to set it up.
Hacking in the movies is crazy exciting: fingers fly across the keyboard, and the screen is an ever flashing array of cryptic characters. It’s all so…interesting. Real hacking, sadly, isn’t that intense. However illegal what you’re doing may be, you’re still just someone sitting at a computer. Most the time you’re just trying to get people to use a fake Google sign-in page.
Another year, another new iPhone, and it’s time to wade through the mess of confusing financing plans, early upgrades, and pay-to-own schemes. All the different prices, plans, and carriers supporting the iPhone are enough to make our heads spin, so we’re here to help you decide whether it’s better to lease or own.
While the iPhone X’s design is its biggest talking point, the thing that really caught my eye watching the announcement was the new camera.
Internet music service Spotify offers an API that lets other websites and applications access your music and customer data. That can be a really cool feature if you’re using it to integrate music with other tools, like Shazam or Sonos. But, when you’re finished with whatever you’re doing, it’s probably a good idea to restrict access to only the most essential apps. Here’s how you do it.
With wireless charging making its way into the new iPhones, there are undoubtedly a lot of questions floating around about how this technology works in practical application. The biggest question I’ve heard so far is: will it work with a case?
Sometimes you want to find out what’s within a certain number of miles of a specific location. Maybe you want to know what area a cell tower covers or what would happen if a nuclear bomb got dropped on your in-laws’ house.
Wireless charging is set to become more popular with the adoption of Qi wireless charging in Apple’s iPhone 8, iPhone 8 Plus, and iPhone X. It’s also found on some Android phones, like Samsung’s Galaxy Note 8, Galaxy S8, and Galaxy S7.
The Ring Doorbell works like any other doorbell, but has a video camera built in that can alert you to motion and button presses. While it’s a pretty basic device for the most part, there are definitely some features and tricks that you might not have known about.
There are a lot of bots on Twitter. Some are trying to sell things, some are stage one in an elaborate scam, and some are run by international intelligence agencies for any number of reasons.
Netflix knows that you aren’t the only person using your account. The company has turned a mostly blind eye to password sharing, but you may still want to know who’s been logging into your account—especially if you think someone got access without your approval. Here’s how to find out who has logged in using your credentials.
Look, Apple is making wireless charging cool again with the iPhone 8, 8 Plus, and X. I’m glad! But there are things you should know about this technology—like how fast it’s going to charge your phone. You know, practical stuff.