Your Internet service provider runs DNS servers for you, but you don’t have to use them. You can use third-party DNS servers instead, which offer a variety of features that your ISP probably doesn’t.
We warned you at the beginning of the year that many of your browser extensions are spying on you, tracking what you are visiting, and even inserting ads into pages. These aren’t just no-name developers either: even Avast, one of the most trusted antivirus vendors was in on the game.
The FBI isn’t happy about the latest versions of iOS and Android using encryption by default. FBI director James Comey has been blasting both Apple and Google. Microsoft is never mentioned — but Windows 8.1 uses encryption by default, too.
iPads and iPhones give you control over how your kids can use your devices. You can quickly lock your device to a certain app before handing it over or lock down an entire device with comprehensive parental controls.
Never download a driver-updating utility. Like PC-cleaning programs, they try to charge you money for a service you don’t need. They do this by scaring you with threats of blue screens and system problems.
Do you get too many newsletters and other promotional emails? These emails aren’t technically “spam” — they’re from legitimate organizations. Thanks to the US CAN-SPAM act, every legitimate company offers a consistent way to unsubscribe from their newsletters.
You’ve probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you’ve ever allowed keeps that access forever — or at least until you revoke it.
Reading your smartphone or tablet in the dark is probably bad for you. That’s unlikely to stop you, so beyond quitting cold turkey, what are the easiest ways to fix your bedtime reading device so it doesn’t put so much strain on your eyes?
If you’ve been eyeing the falling prices on spacious solid-state drives but putting off an upgrade because you don’t want the hassle of reinstalling everything, we’re here to help. Read on as we show you how to clone your old HDD onto a new HDD and get your entire system back up and running in under an hour; no reinstallation of Windows and all your apps necessary.
We recently explained why you should be using IMAP instead of POP3 for your email. If you still have old POP3 emails stored offline, you don’t have to abandon them — import your POP3 emails into an IMAP account.
If a website asks you to download a “codec,” “player,” or “browser update” to play a video, run the other way. You don’t actually need to download this sort of thing — the website is trying to infect your computer with malware.
It’s hard to wrap our minds around all these Internet catastrophes as they occur, and just as we thought the Internet was secure again after Heartbleed and Shellshock threatened to “end life as we know it,” out comes POODLE.
Wireshark is the Swiss Army knife of network analysis tools. Whether you’re looking for peer-to-peer traffic on your network or just want to see what websites a specific IP address is accessing, Wireshark can work for you.
Minecraft runs just fine on Linux, but it’s probably not available for easy installation in your Linux distribution’s package manager. Here’s how to get your Linux system ready for Minecraft.
Recently an email has been making the rounds, scaring people like my mom by claiming that the flashlight app on their smartphone is stealing their information and sending it to China. This, of course, isn’t exactly true, and for the iPhone’s built-in flashlight, is patently false.
Ever tried to buy a Windows license from Amazon or Newegg? If only it was so simple. You’ll encounter cheaper System Builder (OEM) and more expensive Full Version (Retail) licenses. But the difference isn’t immediately apparent.
Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets.
Java was responsible for 91 percent of all computer compromises in 2013. Most people not only have the Java browser plug-in enabled — they’re using an out-of-date, vulnerable version. Hey, Oracle — it’s time to disable that plug-in by default.
Java tries to install the terrible Ask Toolbar and other obnoxious junk — sorry, “sponsored software” — when you install it. Worse yet, Java bundles this junkware with security updates. This registry hack tells Java to never install that stuff.
The extremely useful Snap feature — introduced as “Aero Snap” in Windows 7 — is much-improved in Windows 10. Snap Assist, 2×2 snapping, and vertical snap features help make you more productive on the desktop.
Last year, Google announced plans to lock down Chrome so that extensions can’t be side-loaded by crapware installers. Sadly they’ve found a way to trick users into installing lousy extensions, although in this case these spyware and adware extensions do exist in the Chrome Web Store.
iOS 8 added support for third-party keyboards. Now iPhone and iPad users can finally swap out their keyboards and use some of the same keyboards available on Android devices. Swipe-to-type is now an option for iPhone users, too.
It’s a tale nearly as old as computers themselves. You pull your trusty old video game console or vintage 1980s computer and it’s yellow, greenish, or some combination there of instead of the gray or beige it once was. What gives? Why does your old tech turn yellow? And further, what can you do about it?
The default folder-merge behavior in Mac OS X is to erase the existing folder, deleting all its files rather than offering to merge them intelligently. Windows and Linux file managers have offered folder-merging for decades, but Macs still don’t.