Laptop manufacturers spend a lot of time tuning their device drivers for Windows battery life. Linux usually doesn’t get the same attention. Linux may perform just as well as Windows on the same hardware, but it won’t necessarily have as much battery life.
When you delete sensitive files from your Dropbox account, you may think you’ve deleted them permanently. However, the files remain in a hidden cache folder on your hard drive for efficiency and emergency purposes that is cleared automatically every three days.
Once you start digging into a Linux system, you may find some confusing or unexpected things, like /usr/bin/false, for example. Why is it there and what is its purpose? Today’s SuperUser Q&A post has the answer to a curious reader’s questions.
If you’ve tried to install Google Chrome in Ubuntu Linux, you may have noticed that it’s not available in the Ubuntu Software Center. However, it’s easy to download a package file for Google Chrome and install it on your system, and we’ll show you how.
Most Linux distributions include the bash shell by default, but you could also switch to another shell environment. Zsh is a particularly popular alternative, and there are other shells, like ash, dash, fish, and tcsh. But what’s the difference, and why are there so many?
You’ve been emailed a document, and you have to sign it and send it back. You could print out the document, sign it, and then scan it back in and email it. But there’s a better, faster way.
Are you getting notifications about a full Time Machine drive? Do you feel like your backups are taking too long? A bigger, faster hard drive might be the best solution, but you can also help by excluding particular folders from your backups.
When formatting partitions on a Linux PC, you’ll see a wide variety of file system options. These options don’t need to be overwhelming. If you’re not sure which Linux file system to use, there’s a simple answer.
On the first day of 2016, Mozilla terminated support for a weakening security technology called SHA-1 in the Firefox web browser. Almost immediately, they reversed their decision, as it would cut access to some older websites. But in February 2017, their fears finally came true: researchers broke SHA-1 by creating the first real-world collision attack. Here’s what all that means.
Chromium is an open-source browser project that forms the basis for the Chrome web browser. But let’s take a little deeper look at what that means.
If you love Microsoft’s “Ribbon” interface but prefer the free and open source LibreOffice, you can get the best of both worlds…if you’re willing to put up with an experimental feature. While not officially an alternative to the Ribbon, LibreOffice’s “Notebookbar” bears an uncanny resemblance, and it’s a big improvement on LibreOffice’s old-timey toolbars.
Chromebooks aren’t like traditional laptops. While they’re much simpler, they still have various useful features you may not know about. From accessing remote computers and printing to wiping your personal data, recovering Chrome OS, and installing desktop Linux, these tricks will help you get the most out of your Chromebook.
If you’ve ever needed to access your router’s setup page to make some configuration changes, you know you need your router’s IP address gain access. If you’ve forgotten what that IP address is, here’s how to find it on just about every platform.
If you are just getting started with rsync for the first time and have multiple large hard drives to make backups of, is it safe to actually use one or more of them during the long process? Today’s SuperUser Q&A post has the answer to a worried reader’s question.
You’ll sometimes see MD5, SHA-1, or SHA-256 hashes displayed alongside downloads during your internet travels, but not really known what they are. These seemingly random strings of text allow you to verify files you download aren’t corrupted or tampered with. You can do this with the commands built into Windows, macOS, and Linux.
An SSH client connects to a Secure Shell server, which allows you to run terminal commands as if you were sitting in front of another computer. But an SSH client also allows you to “tunnel” a port between your local system and a remote SSH server.
Set up a new disk on Windows 8.x or 10 and you’ll likely be asked whether you want to use the MBR or GPT partition structures. If you’ve ever wanted to know more about these, then keep reading.
Since iOS 7, Apple devices have had limited support for opening ZIP files in Messages and Mail, while a few other third-party apps provide methods for opening ZIP files. But what if you’re on the other end and want to share multiple files with someone in a zipped file?
If you’ve done even some casual searching for digital comics online, you’ve certainly come across plenty of files with the .CBR and .CBZ file extensions. Let’s take a look at these ubiquitous comic formats, why they’re so popular, and how you can read them.
If you need to install Windows or Linux and you don’t have access to a CD/DVD drive, a bootable USB drive is the solution. You can boot to the USB drive, using it to run the OS setup program, just like a CD or DVD.
Want to try out Ubuntu, but not sure where to start? There are lots of ways to try out Ubuntu – you can even install it on Windows and uninstall it from your Control Panel if you don’t like it.
VLC’s developers have been working on Chromecast support for some time, and it’s finally available…sort of. It still hasn’t made it to the stable release of VLC yet, but if you run the bleeding edge nightly builds on Windows, you can stream video and audio files from VLC media player on your PC to your Chromecast.
When Google introduced Google Drive in April 24, 2012, they promised Linux support “coming soon.” That was nearly five years ago. Google still hasn’t released an official version of Google Drive for Linux, but there are other tools to fill the gap.
Creating bootable CDs and DVDs tends to be a simple, straightforward process, but why is it more complex when creating bootable flash drives? Is there really that much difference between the two? Today’s SuperUser Q&A post has the answer to a curious reader’s question.
U2F is an emerging standard for physical authentication tokens. Current U2F keys are all small USB devices. To log in, you won’t need to enter an authentication code provided from an app or SMS—just insert the USB security key and press a button. Here’s how they work.