You’ve protected a PDF file containing sensitive information with a long, secure password so only the intended party can open it. However, you don’t want to enter that password every time you access the document, so you want to remove the password from your copy.
If you’ve configured Windows to automatically log you in rather than having to enter a password, you might find it annoying that you still need to enter a password when your PC comes out of sleep mode. Here’s the quick fix.
Command line interfaces can be downright boring and always seem to miss out on the fresh coats of paint liberally applied to the rest of Windows. Here’s how to add a splash of color to Command Prompt and make it unique.
It’s important to note that this will not actually conceal your data from somebody who knows what they are doing.
If you want really quick access to launch a frequently used application without putting extra icons on your desktop, you can add that application to the context menu for the desktop with a simple registry hack. Here’s how to do it.
Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.
A free OneDrive account provides 15 GB of online storage and allows you to access files from multiple devices, such as a PC, a smartphone, and a tablet. You can easily copy files to your OneDrive account using the Send To menu in Windows Explorer.
Has your Internet connection become slower than it should be? There may be a chance that you have some malware, spyware, or adware that is using your Internet connection in the background without your knowledge. Here’s how to see what’s going on under the hood.
It’s happened to everybody at some point—you go to install a new application, and Windows tells you to reboot first. Or reboot after. Or it asks you to close out of every other application first. Why does it do that?
Ask any PC tech person how to make your computer faster, and almost every one of them will tell you to defrag your PC. But do you really need to manually trigger a defrag these days?
Friends and family members seem to ask me all the time whether they are running 32-bit or 64-bit Windows, and I’ve finally realized that it would make more sense to show everybody how to figure it out for themselves. Here’s the two-step process to find out for yourself.
If you’re already running a full anti-malware suite, you might not even realize that Windows Defender is already installed with Windows, and is probably wasting precious resources. Here’s how to get rid of it.
If you’ve used Windows Vista for more than 3.7 minutes, you know what UAC (User Account Control) is.. it’s the obnoxious, nagging popup window that will be your life for the next 3-5 years unless you switch back to XP in frustration, or to a better OS like… OS X, Suse, Ubuntu, or even XP.
The new backup utilities in Windows are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image.
I’ve previously written about a way to enable or disable UAC from the command line. This is an easier method that you can use to do the same thing from the GUI interface in either Windows 7, 8, 8.1, 10 or Vista. To recap my earlier article, UAC is ANNOYING.
When organizing your home network it’s easier to assign each computer it’s own IP address than using DHCP. Here we will take a look at doing it in XP, Vista, Windows 7, Windows 8.x, and Windows 10.
Forgetting your password is never any fun, but luckily there’s a really easy way to reset the password. All you need is a copy of the Windows installation disk and one simple command line trick.
Have you ever downloaded a file only to find it has a strange .rar file extension? By the end of this article you will be able to view the file no matter if you are running Windows or Mac OSX.
If you live in an apartment complex you’ve probably noticed more than just the passive-aggressive network IDs that your neighbors use—very likely you’ve had problems with your wireless connections dropping out, or just not being as fast as you’d like. Here’s a quick fix.
Did you have someone else set up the wireless network in your house, and can’t for the life of you remember the password? If so read on to see how you may still be able to recover it.
You’re no doubt reading this article because there’s a gigantic hiberfil.sys file sitting in the root of your drive, and you want to get rid of it to free up some space… but you can’t!
Windows has the built-in ability to function as VPN server, although this option is hidden. This trick works on both Windows 7 and Windows 8. The server uses the point-to-point tunneling protocol (PPTP.)
Do you need to send someone sensitive information through email? Regular email is sent “in the clear” and therefore is subject to interception by hackers. However, there are many options for sending private, sensitive information securely through email.
We’ve covered virtual private networks and when you might want to use them before. Connecting to a VPN is easy, as Windows and most other operating systems offer built-in VPN support.
Need to send sensitive information through email? Normal email messages can be intercepted or hacked before reaching the recipient. However, you can use a free extension for Google Chrome, called SafeGmail, that allows you to send encrypted emails to anyone.