Apple’s iOS, Google’s Android, and Microsoft’s Windows 10 all keep a list of apps you’ve purchased and downloaded from their stores—even if you no longer have those apps installed. This list will become cluttered over time, especially if you download and try out a lot of free apps. But you can clean this list up, at least on iOS and Android.
On some volumes, you may see a new folder called FOUND.000 with a file in it using the .CHK extension. Here’s where those come from, and what they’re for.
Big home appliances definitely aren’t cheap, but they can last for a really long time if you take care of them and perform the proper maintenance at regular intervals.
Deleting your Amazon account is the only way to completely erase your purchase history. If you want to delete your account for good, here’s how to give yourself a clean slate.
Web apps have been replacing desktop apps for everything from email and document-editing to playing videos and music. You don’t have to keep your web apps confined to a browser window—they can become first-class citizens on your desktop.
Most people don’t replace their routers that often, and there are so many important settings, it’s easy to overlook a few and forget how your old one was set up. Here are the first five things you need to do right after powering up your new router.
The lost+found folder is a part of Linux, macOS, and other UNIX-like operating systems. Each file system—that is, each partition—has its own lost+found directory. You’ll find recovered bits of corrupted files here.
Windows PCs should shut down fairly quickly—unless there’s a problem causing a shutdown delay. Here’s how to make your computer shut down faster.
Ubuntu adopted the new version of the Grub boot manager in version 9.10, getting rid of the old problematic menu.lst. Today we look at how to change the boot menu options in Grub2.
Windows uses a page file to store data that can’t be held by your computer’s random-access memory when it fills up. While you can tweak the page file settings, Windows can manage the page file fine on its own.
Windows uses a paging file, also known as a page file, as additional virtual memory when your RAM fills up. Windows can clear your page file every time you shut down, ensuring no sensitive data is left in the page file on the drive.
If you’re looking for a simple and powerful way to encrypt everything from system drives to backup discs to everything in between, VeraCrypt is an open-source tool that will help you lock up your files. Read on as we show you how to get started.
On every Windows drive—even external USB drives—you’ll find a “System Volume Information” folder. You’ll only see it if you have Windows set to show hidden files and folders, but it’s always there. So what is it for?
When you shut down your computer, Windows doesn’t shut down immediately. Instead, it gives running applications and services some time to close first. You can control how long Windows waits—and whether it automatically closes running applications or not.
DoS (Denial of Service) and DDoS (Distributed Denial of Service) attacks are becoming increasingly common and potent. Denial of Service attacks come in many forms, but share a common purpose: stopping users from accessing a resource, whether it’s a web page, email, the phone network, or something else entirely. Let’s look at the most common types of attacks against web targets, and how DoS can become DDoS.
You love technology, but not everyone does. For many people computers are confusing, even scary. Malevolent actors know this, and try to deliberately trick people online. From ads that look like download buttons to ransomware pop-ups, the web is full of deception-based design, intended to take advantage of the less technically inclined.
Newer isn’t always better, and the wget command is proof. First released back in 1996, this application is still one of the best download managers on the planet. Whether you want to download a single file, an entire folder, or even mirror an entire website, wget lets you do it with just a few keystrokes.
It’s that shop-til-you-drop time of year again, and retailers have already spent most of November with teaser sales and ads for Black Friday and Cyber Monday. Here’s how to score the best deals and avoid getting ripped off.
Phone call scams are too common. But they’re easier to spot than you might think. If someone calls you and claims to be from the IRS, your bank, Microsoft, or any other company or government agency, it’s probably a scam. Companies and government agencies will almost never call you out of nowhere.
If you have cellular service in the US, then there’s a good chance you’re on one of the big four carriers: AT&T, Verizon, Sprint, or T-Mobile. But what if I told you that you could save a significant amount of money without sacrificing coverage by switching to a smaller carrier with the same great service?
If you want the latest Kindle features right this second (or you missed a past update), the best way to get an immediate update for your Kindle is to do it manually. Read on as we show you how to easily update your Kindle.
Microsoft’s free Windows 10 upgrade offer is over–or is it? There’s still a way to activate Windows 10 with a Windows 7, 8, or 8.1 key, in addition to Microsoft’s accessibility offer.
To make things even more confusing, manufacturers often don’t call this feature “HDMI-CEC”. Like with Miracast, every manufacturer wants to call it their own branded name, even though it’s an interoperable standard.
Modern robocalls aren’t just telemarketers trying to sell you something. They’re often scammers trying to trick you into parting with your money or identity information. So how do you stop them from coming in?
Product keys are becoming less and less common these days, but if you have a piece of software on your computer—and can’t find its product key—this simple program can help you extract it.