Skip to content
MrHow
MrHowMrHow
  • Home
  • Office
    • Word
    • Excel Cơ Bản
    • Excel Nâng Cao
    • Outlook
  • Windows
  • Internet
  • Phần mềm
  • Bảo mật
  • Thủ Thuật
Search:
  • Home
  • Office
    • Word
    • Excel Cơ Bản
    • Excel Nâng Cao
    • Outlook
  • Windows
  • Internet
  • Phần mềm
  • Bảo mật
  • Thủ Thuật

privacyandsecurity-link-2

Block Spying and Tracking while Browsing with the Privacy Badger Extension

Block Spying and Tracking while Browsing with the Privacy Badger Extension

If there is one thing we are all tired of, it is being constantly tracked and spied on while we are browsing the Internet. With this in mind, the Electronic Frontier Foundation has been hard at work on an extension for Firefo…

Akemi Iwaya
Jul 23rd, 2014


How to Create an Encrypted Container File With BitLocker on Windows

How to Create an Encrypted Container File With BitLocker on Windows


BitLocker normally encrypts entire drives and partitions, but you can also create encrypted container files with tools built into Windows. Such encrypted VHD files can easily be moved between systems, backed up, and hidden wh…


Chris Hoffman
Jul 16th, 2014



How to Track, Disable, and Wipe a Lost iPhone, iPad, or Mac

How to Track, Disable, and Wipe a Lost iPhone, iPad, or Mac


Apple’s phone, tablet, and computer-tracking tools are the best in the business. You can remotely locate your device, disable it with a lock and message that persists through factory resets — the so-called “kill switch” — a…


Chris Hoffman
Jul 12th, 2014


Why does My Browser Say a Secure Website is not Fully Secure?

Why does My Browser Say a Secure Website is not Fully Secure?

With all the trouble one can run into on the Internet, it is always a good idea to have as secure of a connection as possible. But what do you do when your browser says a secure website is not fully secure? Today’s SuperUser …

Akemi Iwaya
Jul 8th, 2014

How to Show/Hide All Hidden Startup Applications in Ubuntu 14.10

How to Show/Hide All Hidden Startup Applications in Ubuntu 14.10

We’ve recently showed you how to manage startup applications in Ubuntu 14.04, just like you can in Windows. However, when you access the Startup Applications Preferences tool not all startup applications are listed. Some ar…


Lori Kaufman
Jun 30th, 2014

How to Find Out if Java is Installed in Ubuntu and How to Install It

How to Find Out if Java is Installed in Ubuntu and How to Install It

By default, Ubuntu does not come with Java (or the Java Runtime Environment, JRE) installed. However, you may need it for some programs or games like Minecraft. We will show you how to quickly and easily check if Java is inst…


Lori Kaufman
Jun 25th, 2014


How an Attacker Could Crack Your Wireless Network Security

How an Attacker Could Crack Your Wireless Network Security


It’s important to secure your wireless network with WPA2 encryption and a strong passphrase. But what sorts of attacks are you actually securing it against? Here’s how attackers crack encrypted wireless networks….


Chris Hoffman
Jun 24th, 2014


How do You Re-Enable Non-Web Store Extensions in the Stable and Beta Channels of Chrome?

How do You Re-Enable Non-Web Store Extensions in the Stable and Beta Channels of Chrome?

Google recently made a significant change to the stable and beta channels of Chrome, one that disabled any extension that did not come from the Web Store. While this will help improve security for many of Chrome’s users, how …

Akemi Iwaya
Jun 17th, 2014


6 Advanced Tips for Securing the Applications on Your PC With EMET

6 Advanced Tips for Securing the Applications on Your PC With EMET


The Enhanced Mitigation Experience Toolkit is Microsoft’s best-kept security secret. It’s easy to install EMET and quickly secure many popular applications, but there’s a lot more you can do with EMET….


Chris Hoffman
Jun 17th, 2014



Android’s App Permissions Were Just Simplified — Now They’re Much Less Secure

Android’s App Permissions Were Just Simplified — Now They’re Much Less Secure


Google just made a huge change to the way app permissions work on Android. Apps already on your device can now gain dangerous permissions with automatic updates. Future apps can gain dangerous permissions without asking you, …


Chris Hoffman
Jun 11th, 2014



How (and Why) to Use OTR For Private Instant Messaging

How (and Why) to Use OTR For Private Instant Messaging


OTR stands for “off the record.” It’s a way to have encrypted private instant message conversations online. It uses end-to-end encryption so your network provider, government, and even the instant-messaging service itself can…


Chris Hoffman
Jun 9th, 2014


How to Prevent Other Users From Accessing Your Home Directory in Ubuntu 14.04

How to Prevent Other Users From Accessing Your Home Directory in Ubuntu 14.04

If you share your Ubuntu machine with other people, you probably have multiple users set up, thinking that the other users log into their own accounts and only have access to their own home directories. However, by default, a…


Lori Kaufman
Jun 6th, 2014


Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)

Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)


Only one cash prize went unclaimed at Pwn2Own 2014. All major browsers were hacked, but hackers were unable to claim the $150,000 grand prize for hacking IE 11 secured with EMET. Secure your own PC with EMET today….


Chris Hoffman
Jun 6th, 2014



How to Secure and Manage a Relative’s Computer

How to Secure and Manage a Relative’s Computer


Sure, maybe your parents don’t need any help with their PC and your kids are better at technology than you are. But many geeks are called upon to be responsible for a relative’s PC — often after it breaks….


Chris Hoffman
Jun 5th, 2014



Beginner Geek: Why is User Account Control Bugging Me?

Beginner Geek: Why is User Account Control Bugging Me?


Microsoft added User Account Control to Windows in Windows Vista, and it’s still used on Windows 7 and 8 today. UAC restricts what programs can do without your permission.


Chris Hoffman
Jun 2nd, 2014



How to Share Files Between User Accounts on Windows, Linux, or OS X

How to Share Files Between User Accounts on Windows, Linux, or OS X


Your operating system provides each user account with its own folders when you set up several different user accounts on the same computer. Shared folders allow you to share files between user accounts….


Chris Hoffman
May 25th, 2014



How Can I Start an Incognito/Private Browsing Window from a Shortcut?

How Can I Start an Incognito/Private Browsing Window from a Shortcut?


Sometimes you just want to pop the browser open for a quick web search without reloading all your saved tabs; read on as we show a fellow reader how to make a quick private-browsing shortcut.


Jason Fitzpatrick
May 23rd, 2014



Why We Hate Recommending Software Downloads To Our Readers

Why We Hate Recommending Software Downloads To Our Readers


Windows software downloads are a mess. Many programs try to drag adware and other malicious junk onto your computer. Even safe programs we test sometimes turn to the dark side and start bundling junk later….


Chris Hoffman
May 15th, 2014



How to Use a Custom Firmware on Your Router and Why You Might Want To

How to Use a Custom Firmware on Your Router and Why You Might Want To


Routers are basically little computers. By default, they run a manufacture-provided operating system, or firmware, to route network traffic and provide you with various settings and features. But you can often replace this fi…


Chris Hoffman
May 13th, 2014



Symantec Says “Antivirus Software Is Dead”, But What Does That Mean For You?

Symantec Says “Antivirus Software Is Dead”, But What Does That Mean For You?


Have you heard? Antivirus software is dead — at least according to Symantec, maker of Norton Antivirus. But they’re still making Norton Antivirus and want to sell it to you, so what does this statement even mean?…


Chris Hoffman
May 10th, 2014



How to Tell if An Android App is Potentially Dangerous

How to Tell if An Android App is Potentially Dangerous


Yes, some Android apps can be malicious — Apple, Microsoft, and the media seem happy to remind us about this. Take a few basic precautions and you can avoid these potentially dangerous apps.


Chris Hoffman
May 7th, 2014


Should You Install Internet Explorer Updates even Though it is Disabled?

Should You Install Internet Explorer Updates even Though it is Disabled?

Internet Explorer has had a bit of a reputation problem over the years and some people prefer to disable it on their systems. But if you have disabled it, should you continue to install security updates for it regardless? Tod…

Akemi Iwaya
May 6th, 2014

Protect Your Data in the Cloud with TrueCrypt

Protect Your Data in the Cloud with TrueCrypt

With news of the NSA, GCHQ, big corporations, and anyone else with an Internet connection snooping through your online data these days, you can’t be too careful when it comes to protecting the stuff you put in the cloud. Th…

Jacob Zinicola
May 6th, 2014


Everything You Need to Know About Signing Into Windows 8.1

Everything You Need to Know About Signing Into Windows 8.1


Windows 8.1 and 8 brought big changes to Windows. Even the process of logging in and setting up user accounts is extremely different, with new types of user accounts and login options.


Chris Hoffman
May 5th, 2014



How to Modify Permissions for Individual Websites in All Browsers

How to Modify Permissions for Individual Websites in All Browsers


Web browsers are gaining more and more features websites can use, and with them come permission options. Your web browser has a variety of permissions you can apply to individual websites, restricting them in various ways….


Chris Hoffman
May 5th, 2014


  • « Previous
  • 1
  • …
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • …
  • 96
  • Next »


Why No One Uses Encrypted Email Messages

Why No One Uses Encrypted Email Messages


With so much concern about government surveillance, corporate espionage, and everyday identity theft, it may seem surprising that so few people use encrypted email messages. Try using encrypted email and you’ll find it to be …


Chris Hoffman
Apr 30th, 2014



7 Windows Desktop Settings Only Available in PC Settings on Windows 8.1

7 Windows Desktop Settings Only Available in PC Settings on Windows 8.1


If you use Windows 8.1 on the desktop, you can’t ignore the new “Windows 8-style” interface entirely. There are some important options you can only access from the PC Settings app, not the desktop Control Panel….


Chris Hoffman
Apr 19th, 2014



How to Scan and Repair an Infected Computer From Outside Windows

How to Scan and Repair an Infected Computer From Outside Windows


If a Windows system is badly infected with malware, running an antivirus from inside Windows often won’t help. You can more easily find and purge malware by scanning from outside Windows.


Chris Hoffman
Apr 17th, 2014



Hard Disk Passwords Explained: Should You Set One to Secure Your Files?

Hard Disk Passwords Explained: Should You Set One to Secure Your Files?


Many computers give you the option to set a “hard disk password” along with operating system passwords and BIOS passwords. This is different from encryption — a hard disk password doesn’t actually encrypt your files….


Chris Hoffman
Apr 14th, 2014


How do You Convince a Family Member to Upgrade an Old (and Possibly Compromised) System?

How do You Convince a Family Member to Upgrade an Old (and Possibly Compromised) System?

This week saw the arrival of Windows XP’s EOL date, yet many are holding onto it, and on occasion, even older systems still. How do you convince a stubborn family member that updating their unsupported system to a newer, more…

Akemi Iwaya
Apr 10th, 2014


How to Secure Your Computer With a BIOS or UEFI Password

How to Secure Your Computer With a BIOS or UEFI Password


A Windows, Linux, or Mac password just prevents people from logging into your operating system. It doesn’t prevent people from booting other operating systems, wiping your drive, or using a live CD to access your files….


Chris Hoffman
Apr 3rd, 2014



Security Questions Are Insecure: How to Protect Your Accounts

Security Questions Are Insecure: How to Protect Your Accounts


We all know we should create secure passwords. But, for all the time we spend worrying about our passwords, there’s a backdoor we never think about. Security questions are often easy to guess and can often bypass passwords….


Chris Hoffman
Mar 28th, 2014


Is it Really Possible for Most Enthusiasts to Hack Wi-Fi Networks?

Is it Really Possible for Most Enthusiasts to Hack Wi-Fi Networks?

While most of us will most likely never have to worry about someone hacking our Wi-Fi network, just how hard would it be for an enthusiast to hack a person’s Wi-Fi network? Today’s SuperUser Q&A post has answers to one re…

Akemi Iwaya
Mar 25th, 2014

Malwarebytes Anti-Malware 2.0 now Available for Download

Malwarebytes Anti-Malware 2.0 now Available for Download

Malwarebytes Anti-Malware is a dependable work-horse when it comes to eradicating malware, and definitely a recommended app for anyone’s security setup. This week Malwarebytes has released a new stable version that features a…

Akemi Iwaya
Mar 25th, 2014


The Digital Locker Hollywood Wants You To Use: UltraViolet Explained

The Digital Locker Hollywood Wants You To Use: UltraViolet Explained


UltraViolet is a “digital locker” for your movies designed by the big movie studios. It’s a response to iTunes — studios don’t want all their customers using iTunes with Apple being the single company in control….


Chris Hoffman
Mar 24th, 2014



Why is There a Useless Games Folder in Windows 7’s Start Menu?

Why is There a Useless Games Folder in Windows 7’s Start Menu?


Microsoft’s Games Explorer — also known as the Games folder — is only a single click away every time you open Windows 7’s Start menu. It’s Microsoft’s interface to your PC games, but not every game appears here — and what …


Chris Hoffman
Mar 24th, 2014



8 Tips and Tricks for Browsing with Safari on iPad and iPhone

8 Tips and Tricks for Browsing with Safari on iPad and iPhone


Safari is easy to use, but you may never find all of its useful features unless you go looking for them. iPads have many useful navigation tricks you may never stumble across, and Safari has its own tricks….


Chris Hoffman
Mar 19th, 2014



Your Home Router May Also Be a Public Hotspot — Don’t Panic!

Your Home Router May Also Be a Public Hotspot — Don’t Panic!


More Internet service providers are now providing their customers with modems that function as routers — and those units may also be public hotspots. This sort of feature is common in Europe, but it’s now arriving in North A…


Chris Hoffman
Mar 17th, 2014



How to Encrypt Your Mac’s System Drive, Removable Devices, and Individual Files

How to Encrypt Your Mac’s System Drive, Removable Devices, and Individual Files


To protect your files from hackers and thieves, Macs offer excellent encryption features built-in. You can encrypt your entire hard drive, encrypt an external drive, or just create an encrypted container for your most importa…


Chris Hoffman
Mar 17th, 2014


Upgrading From Windows XP? Here’s What You Need to Know About Windows 7

Upgrading From Windows XP? Here’s What You Need to Know About Windows 7

With Windows XP reaching the end of its long support life, many businesses and individuals are avoiding Windows 8 and upgrading to Windows 7 instead. If you’re a latecomer to Windows 7, here are the basics you need to know….


Chris Hoffman
Mar 13th, 2014

How can You Find Out if Someone has Logged into Your Account in Windows?

How can You Find Out if Someone has Logged into Your Account in Windows?

Most of the time, sharing a computer with others works out fine, but what do you do if you suspect someone is logging into your account behind your back? How do you find out or check to see if someone has successfully comprom…

Akemi Iwaya
Mar 11th, 2014

Windows XP End of Support is on April 8th, 2014: Why Windows is Warning You

Windows XP End of Support is on April 8th, 2014: Why Windows is Warning You

Microsoft won’t be releasing new security patches for Windows XP come April 8th, 2014, and they’re making sure all Windows XP users know it. You’re on your own after this point — no more security updates for Windows XP!…


Chris Hoffman
Mar 10th, 2014

How do You Prevent ‘Secondary’ Accounts from Shutting Windows 8 Down?

How do You Prevent ‘Secondary’ Accounts from Shutting Windows 8 Down?

Sharing of a family computer works out well most of the time, but what happens if someone shuts the computer down via their account while you still have work documents open in yours? Is there a way to prevent other accounts f…

Akemi Iwaya
Feb 25th, 2014

What are the Security Implications if a Password is Submitted in the Username Field?

What are the Security Implications if a Password is Submitted in the Username Field?

Suppose you are having a bad day and in a hurry to login to a favorite website, then accidentally submit your password in the username text box instead. Should you be worried and change your password for that website, or is i…

Akemi Iwaya
Feb 18th, 2014

What is the Link Between Processors and Security?

What is the Link Between Processors and Security?

Newer processors are able to contribute to the security of your system, but what exactly do they do to help? Today’s Super User Q&A post looks at the link between processors and system security.

Akemi Iwaya
Feb 13th, 2014


5 Serious Problems with HTTPS and SSL Security on the Web

5 Serious Problems with HTTPS and SSL Security on the Web


HTTPS, which uses SSL, provides identity verification and security, so you know you’re connected to the correct website and no one can eavesdrop on you. That’s the theory, anyway. In practice, SSL on the web is kind of a mess…


Chris Hoffman
Feb 13th, 2014


The Non-Beginner’s Guide to Syncing Data with Rsync

The Non-Beginner’s Guide to Syncing Data with Rsync

The rsync protocol can be pretty simple to use for ordinary backup/synchronization jobs, but some of its more advanced features may surprise you.  In this article, we’re going to show how even the biggest data hoarders and…

Korbin Brown
Feb 11th, 2014

The Beginner’s Guide to iptables, the Linux Firewall

The Beginner’s Guide to iptables, the Linux Firewall

Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s probably some way that iptables can be a great use to you. Read on as…

Korbin Brown
Feb 6th, 2014

What are the Dangers of an Untrusted USB Drive?

What are the Dangers of an Untrusted USB Drive?

Using trusted USB drives that you own on your up-to-date, well-secured operating system is one thing, but what if your best friend stops by with their USB drive and wants you to copy some files to it? Does your friend’s USB d…

Akemi Iwaya
Feb 4th, 2014


Do You Know What Sites & Apps Have Access to Your Google Account?

Do You Know What Sites & Apps Have Access to Your Google Account?


While doing our regular security audit of all the accounts tied to the HTG site, we noticed something interesting: Inside your Google account settings there is a list of any site or app that you’ve given access to, and the li…


Lowell Heddings
Feb 4th, 2014


  • « Previous
  • 1
  • …
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • …
  • 96
  • Next »


How to Remove The Hidden Personal Information Microsoft Office Adds to Your Documents

How to Remove The Hidden Personal Information Microsoft Office Adds to Your Documents


Microsoft Office saves hidden metadata in your Office documents, including how long you’ve been working on them, the name of everyone who’s worked on the document, when the document was created, and even previous versions of …


Chris Hoffman
Jan 30th, 2014


How to Block an Application or .EXE from Running in Windows

While doing some cleaning up on a test computer around the office, we realized that we’ve never written about how to block an application from running using a registry hack. It’s easy, so here you go.


Lowell Heddings
Jan 29th, 2014


What is the Malicious Software Removal Tool and Do I Need It?

What is the Malicious Software Removal Tool and Do I Need It?


Once a month, a new version of the Malicious Software Removal tool appears in Windows Update. This tool removes some malware from Windows systems, particularly those systems without antivirus programs installed….


Chris Hoffman
Jan 29th, 2014



How to Avoid Junkware Offers with Unchecky

How to Avoid Junkware Offers with Unchecky


You recommend a program to a family member, and they proceed to install it along with five other junkware programs that sneak their way on to their computer in the installation process.  Sound familiar?  Unchecky prevents t…

Korbin Brown
Jan 27th, 2014



Keyloggers Explained: What You Need to Know

Keyloggers Explained: What You Need to Know


A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type….


Chris Hoffman
Jan 27th, 2014



Warning: Your Browser Extensions Are Spying On You

Warning: Your Browser Extensions Are Spying On You


The internet exploded Friday with the news that Google Chrome extensions are being sold and injected with adware. But the little-known and much more important fact is that your extensions are spying on you and selling your br…


Lowell Heddings
Jan 20th, 2014



How To Tell If a Virus Is Actually a False Positive

How To Tell If a Virus Is Actually a False Positive


A false positive is a mistake that happens occasionally — the antivirus thinks a download is harmful when it’s actually safe. But malicious people may try to trick you into downloading malware with this assurance….


Chris Hoffman
Jan 20th, 2014


Why Does a Browser Automatically Contact Unknown Third-Party Websites?

Why Does a Browser Automatically Contact Unknown Third-Party Websites?

While we may not think about it very much, there is quite a bit more going on ‘behind the scenes’ than we might realize when browsing the internet. We explore the reasons why our browsers are busy contacting unknown third-par…

Akemi Iwaya
Jan 16th, 2014

How to Force Your PC to Keep Its Private IP Address

How to Force Your PC to Keep Its Private IP Address

There may be times when you need your PC to retain the same local IP address every time it boots up.  Forwarding ports, sharing content on your network, and other things can all be made easier when your computer’s IP address…

Korbin Brown
Jan 15th, 2014

How to Encrypt Files and Folders in Windows 8.1 Pro Using EFS

How to Encrypt Files and Folders in Windows 8.1 Pro Using EFS

Windows 8 contains a built-in file encryption feature, called BitLocker, but only in the Pro or Enterprise versions. In addition, if your system does not have a Trusted Platform Module (TPM), you must use an external USB flas…


Lori Kaufman
Jan 15th, 2014


Beginner Geek: How to Configure Your Router

Beginner Geek: How to Configure Your Router


If you have Internet access, you probably have a router — and your router has its own settings screens full of options. Everyone should know how to use their router’s web interface, if only to configure their Wi-Fi security …


Chris Hoffman
Jan 13th, 2014


How to Enable Family Options (aka Parental Controls) In Your Steam Client

How to Enable Family Options (aka Parental Controls) In Your Steam Client

Earlier this week, Steam released Family Options, their version of parental controls, for the Steam game client. Read on as we show you how to lock down adult games, online content, and purchasing options to make your Steam c…


Jason Fitzpatrick
Jan 12th, 2014

How to Force an MSI Package to Install Using Administrator Mode

How to Force an MSI Package to Install Using Administrator Mode

When you need to install a program as an administrator, you can right-click on the .exe file and select Run as administrator. However, that option isn’t available for MSI packages. We will show you how to add an Install as …


Lori Kaufman
Jan 10th, 2014


Why Browser Plug-Ins Are Going Away and What’s Replacing Them

Why Browser Plug-Ins Are Going Away and What’s Replacing Them


Browser plug-ins are on their way out. Apple’s iOS has never supported plug-ins, Flash is long-discontinued for Android, and the new version of IE for Windows 8 doesn’t support most plug-ins. Chrome will soon be blocking trad…


Chris Hoffman
Jan 8th, 2014


3 Tips for the mRemoteNG Remote Connections Manager

3 Tips for the mRemoteNG Remote Connections Manager

Have you ever found yourself manually opening WinSCP to the same server you’ve just SSHed into with mRemoteNG? Or wishing you were able to extract the password from the mRemoteNG connection? HTG will guide you on how to unlo…


Aviad
Jan 6th, 2014


Lock Down Your Wi-Fi Network With Your Router’s Wireless Isolation Option

Lock Down Your Wi-Fi Network With Your Router’s Wireless Isolation Option


Some routers have a Wireless isolation, AP Isolation, Station Isolation, or Client Isolation feature that allows you to lock down your Wi-Fi network. This feature is ideal for businesses with public Wi-Fi networks or anyone w…


Chris Hoffman
Jan 6th, 2014



Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites

Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites


There are a few big problems with using a public Wi-Fi network. The open nature of the network allows for snooping, the network could be full of compromised machines, or  — most worryingly — the hotspot itself could be mal…


Chris Hoffman
Jan 2nd, 2014



Stock Android Isn’t Perfect: 3 Things It Does Badly

Stock Android Isn’t Perfect: 3 Things It Does Badly


Google’s stock Android often gets a free ride from Android geeks who flock to Nexus and Google Play Edition devices, avoiding devices running Samsung’s TouchWiz, HTC’s Sense, and other manufacturer skins. But stock Android is…


Chris Hoffman
Dec 30th, 2013


What are the Benefits of Using a Proxy?

What are the Benefits of Using a Proxy?

You have likely heard other people discussing the use of a proxy to bypass web filters at work, or to browse the internet anonymously, but wondered if a proxy would actually be that useful to you or not. Today’s post looks at…

Akemi Iwaya
Dec 26th, 2013

Enable or Disable UAC From the Windows Command Line

Enable or Disable UAC From the Windows Command Line

If you’ve used Windows Vista for more than 3.7 minutes, you know what UAC (User Account Control) is.. it’s the obnoxious, nagging popup window that will be your life for the next 3-5 years unless you switch back to XP in frus…


Lowell Heddings
Dec 26th, 2013

How to Turn Off Gmail’s Automatic Image Loading for Increased Privacy and Speedier Loading

How to Turn Off Gmail’s Automatic Image Loading for Increased Privacy and Speedier Loading

This month Gmail rolled out a new feature: after years of setting images to load only when prompted, they now load automatically. That might seem like a convenient feature, but it also means that image-based trackers from mar…


Jason Fitzpatrick
Dec 24th, 2013


Use Supervised Users to Set Up Parental Controls on a Chromebook (or Just in Chrome)

Use Supervised Users to Set Up Parental Controls on a Chromebook (or Just in Chrome)


Google is now providing integrated parental controls in Chrome, allowing parents to control their kids’ Chrome browser usage. This feature works best on a Chromebook, where it allows you to lock down an entire user account….


Chris Hoffman
Dec 23rd, 2013



Android’s Permissions System Is Broken and Google Just Made It Worse

Android’s Permissions System Is Broken and Google Just Made It Worse


Mobile apps are harvesting entire address books and uploading them to ad servers, tracking users’ movements via GPS, and doing other nasty things. But Android’s permission system doesn’t do enough to help users fight this….


Chris Hoffman
Dec 19th, 2013



Chrome Brings Apps to Your Desktop: Are They Worth Using?

Chrome Brings Apps to Your Desktop: Are They Worth Using?


Do you use Windows, Mac, or Linux applications? Google wants you to replace them with Chrome apps in the future. Google Chrome is now an app platform, complete with a Chrome app launcher for Windows and Mac….


Chris Hoffman
Dec 18th, 2013



iOS Has App Permissions, Too: And They’re Arguably Better Than Android’s

iOS Has App Permissions, Too: And They’re Arguably Better Than Android’s


Android has a permissions system for individual apps, but so do iPhones and iPads. Android gives you a single prompt when you install an app, but iOS allows you to make more decisions.


Chris Hoffman
Dec 15th, 2013


  • « Previous
  • 1
  • …
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • …
  • 96
  • Next »

How to Securely Transfer Files to Someone Else with SFTP

How to Securely Transfer Files to Someone Else with SFTP

We’ve previously written about hosting your own FTP server, but data is transferred in cleartext, making it unsuitable for confidential file transfers.  In this guide we’ll go over the secure version of FTP – SFTP, and why i…

Korbin Brown
Dec 12th, 2013


What Parents Need to Know About Web Filtering and Parental Controls

What Parents Need to Know About Web Filtering and Parental Controls


It’s easy to set up parental controls and filter the web. These features are built into everything from Windows to the iPad. But none of these filtering solutions is perfect.


Chris Hoffman
Dec 11th, 2013


What Stops Every Router on the Internet from Sniffing My Traffic?

What Stops Every Router on the Internet from Sniffing My Traffic?

The information you send from your computer, be it an email, instant message, or request for a web page, passes through dozens of internet routers. What’s stopping them from sniffing all your traffic?


Jason Fitzpatrick
Dec 10th, 2013


4 Geeky Tricks That Reduce An Android Phone’s Security

4 Geeky Tricks That Reduce An Android Phone’s Security


Android geeks often unlock their devices’ bootloaders, root them, enable USB debugging, and allow software installation from outside the Google Play Store. But there are reasons why Android devices don’t come with all these t…


Chris Hoffman
Dec 10th, 2013


How to Use mRemoteNG to Manage All Your Remote Connections

How to Use mRemoteNG to Manage All Your Remote Connections

Have you ever had a need to connect to multiple machines of multiple types (RDP,SSH,VNC & more) simultaneously? Have you found that retyping the credentials is a pain? Take the HTG tour of mRemoteNG….


Aviad
Dec 9th, 2013

How Risky Is It to Run a Home Server Secured Behind SSH?

How Risky Is It to Run a Home Server Secured Behind SSH?

When you need to open something on your home network to the greater internet, is an SSH tunnel a secure enough way to to do it?


Jason Fitzpatrick
Dec 5th, 2013

How to “Forget” a Wired (or Wireless) Network in Windows 8.1

How to “Forget” a Wired (or Wireless) Network in Windows 8.1

A funny thing happened after a recent move – after setting up my wireless router in a new apartment, no matter how I tried, I couldn’t change the name of the device’s wired network connection on any of the Windows 8 machine…


Matt Klein
Dec 5th, 2013


How to Run a Last Pass Security Audit (and Why It Can’t Wait)

How to Run a Last Pass Security Audit (and Why It Can’t Wait)


If you’re practicing lax password management and hygiene, it’s only a matter of time until one of the increasingly numerous large-scale security breaches burns you. Stop being thankful you dodged the past security breach bull…


Jason Fitzpatrick
Dec 5th, 2013


The Top 12 PC Settings in Windows 8.1 You Should Know

The Top 12 PC Settings in Windows 8.1 You Should Know

Since Windows 8.1 has launched, a lot that has changed. Not so much with the Control Panel, but the Metro-themed “PC settings” that have definitely taken on more and more responsibilities; many control panels have finally…


Matt Klein
Dec 4th, 2013


HTG Reviews the Netgear Nighthawk: A Nextgen Router with Blistering Speed

HTG Reviews the Netgear Nighthawk: A Nextgen Router with Blistering Speed


If you’re in the market for a router upgrade, the next generation of home routers offers features unheard of even a few years ago: dual-core processors, blazing fast Wi-Fi, USB 3.0 mounting for NAS storage, and more. Read on …


Jason Fitzpatrick
Dec 3rd, 2013



Tell Your Relatives: No, Microsoft Won’t Call You About Your Computer

Tell Your Relatives: No, Microsoft Won’t Call You About Your Computer


This cold-calling telephone scam has been going on since 2008, but shows no sign of going away. If you have any relatives who might fall for it, be sure to let them know Microsoft won’t actually call them….


Chris Hoffman
Dec 1st, 2013



Ubuntu Developers Say Linux Mint is Insecure. Are They Right?

Ubuntu Developers Say Linux Mint is Insecure. Are They Right?


Linux Mint is insecure, according to a Canonical-employed Ubuntu developer who says he wouldn’t do his online banking on a Linux Mint PC. The developer alleges that Linux Mint “hacks out” important updates. Is this a real pro…


Chris Hoffman
Nov 30th, 2013



Why Configuration Profiles Can Be As Dangerous As Malware on iPhones and iPads

Why Configuration Profiles Can Be As Dangerous As Malware on iPhones and iPads


Apple’s iOS is nowhere near as vulnerable to malware as Windows is, but it’s not completely impervious. “Configuration profiles” are one possible way to infect an iPhone or iPad just by downloading a file and agreeing to a pr…


Chris Hoffman
Nov 25th, 2013



Wi-FI Protected Setup (WPS) is Insecure: Here’s Why You Should Disable It

Wi-FI Protected Setup (WPS) is Insecure: Here’s Why You Should Disable It


WPA2 with a strong password is secure as long as you disable WPS. You’ll find this advice in guides to securing your Wi-Fi all over the web. Wi-Fi Protected Setup was a nice idea, but using it is a mistake….


Chris Hoffman
Nov 24th, 2013



How to Install and Use the Google Experience Launcher on Any Android Device

How to Install and Use the Google Experience Launcher on Any Android Device


Google’s working on a new launcher for Android, one that seamlessly integrates Google Now. The Google Experience Launcher is officially exclusive to the Nexus 5, but you can easily use it on any other Android smartphone or ta…


Chris Hoffman
Nov 23rd, 2013



How to Boot and Install Linux on a UEFI PC With Secure Boot

How to Boot and Install Linux on a UEFI PC With Secure Boot


New Windows PCs come with UEFI firmware and Secure Boot enabled. Secure Boot prevents operating systems from booting unless they’re signed by a key loaded into UEFI — out of the box, only Microsoft-signed software can boot….


Chris Hoffman
Nov 15th, 2013


Can Google Employees See My Saved Google Chrome Passwords?

Can Google Employees See My Saved Google Chrome Passwords?

Storing your passwords in your web browser seems like a great time saver, but are the passwords secure and inaccessible to others (even employees of the browser company) when squirreled away?


Jason Fitzpatrick
Nov 12th, 2013


How to Use An Antivirus Boot Disc or USB Drive to Ensure Your Computer is Clean

How to Use An Antivirus Boot Disc or USB Drive to Ensure Your Computer is Clean


If your computer is infected with malware, running an antivirus within Windows may not be enough to remove it. If your computer has a rootkit, the malware may be able to hide itself from your antivirus software….


Chris Hoffman
Nov 9th, 2013



How to Reuse Your Old Wi-Fi Router as a Network Switch

How to Reuse Your Old Wi-Fi Router as a Network Switch


Just because your old Wi-Fi router has been replaced by a newer model doesn’t mean it needs to gather dust in the closet. Read on as we show you how to take an old and underpowered Wi-Fi router and turn it into a respectable …


Jason Fitzpatrick
Nov 5th, 2013



8 Reasons Why Even Microsoft Agrees the Windows Desktop is a Nightmare

8 Reasons Why Even Microsoft Agrees the Windows Desktop is a Nightmare


Let’s be honest: The Windows desktop is a mess. Sure, it’s extremely powerful and has a huge software library, but it’s not a good experience for average people. It’s not even a good experience for geeks, although we tolerate…


Chris Hoffman
Nov 3rd, 2013



How to Recover From a Virus Infection: 3 Things You Need to Do

How to Recover From a Virus Infection: 3 Things You Need to Do


If your computer becomes infected with a virus or another piece of malware, removing the malware from your computer is only the first step. There’s more you need to do to ensure you’re secure.


Chris Hoffman
Nov 2nd, 2013



Refreshing Your PC Won’t Help: Why Bloatware is Still a Problem on Windows 8

Refreshing Your PC Won’t Help: Why Bloatware is Still a Problem on Windows 8


Bloatware is still a big problem on new Windows 8 and 8.1 PCs. Some websites will tell you that you can easily get rid of manufacturer-installed bloatware with Windows 8’s Reset feature, but they’re generally wrong….


Chris Hoffman
Oct 29th, 2013


How Can I Safely Destroy Sensitive Data CDs/DVDs?

How Can I Safely Destroy Sensitive Data CDs/DVDs?

You have a pile of DVDs with sensitive information on them and you need to safely and effectively dispose of them so no data recovery is possible. What’s the most safe and efficient way to get the job done?…


Jason Fitzpatrick
Oct 24th, 2013

What Keeps You from Changing Your Public IP Address and Wreaking Havoc on the Internet?

What Keeps You from Changing Your Public IP Address and Wreaking Havoc on the Internet?

What exactly is preventing you (or anyone else) from changing their IP address and causing all sorts of headaches for ISPs and other Internet users?


Jason Fitzpatrick
Oct 22nd, 2013


Secure Your Wireless Router: 8 Things You Can Do Right Now

Secure Your Wireless Router: 8 Things You Can Do Right Now


A security researcher recently discovered a backdoor in many D-Link routers, allowing anyone to access the router without knowing the username or password. This isn’t the first router security issue and won’t be the last….


Chris Hoffman
Oct 19th, 2013


  • « Previous
  • 1
  • …
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • …
  • 96
  • Next »


Windows 8.1 Will Start Encrypting Hard Drives By Default: Everything You Need to Know

Windows 8.1 Will Start Encrypting Hard Drives By Default: Everything You Need to Know


Windows 8.1 will automatically encrypt the storage on modern Windows PCs. This will help protect your files in case someone steals your laptop and tries to get at them, but it has important ramifications for data recovery….


Chris Hoffman
Oct 12th, 2013



Keep It Simple: Here Are The Only 4 System and Security Tools You Need on Windows

Keep It Simple: Here Are The Only 4 System and Security Tools You Need on Windows


Windows is complicated and needs many different system utilities and security tools to run well — or does it? We recently covered the many types of system tools you don’t need. Here are the few utilities you actually do need…


Chris Hoffman
Sep 28th, 2013



10 Types of System Tools and Optimization Programs You Don’t Need on Windows

10 Types of System Tools and Optimization Programs You Don’t Need on Windows


Windows users see advertisements for all sorts of system tools and optimization utilities. It’s easy for companies to tell you that you absolutely have to run these tools, but you don’t need most of the junk on offer….


Chris Hoffman
Sep 27th, 2013



Take a Secure Desktop Everywhere: Everything You Need to Know About Linux Live CDs and USB Drives

Take a Secure Desktop Everywhere: Everything You Need to Know About Linux Live CDs and USB Drives


Computers normally run an operating system installed on their hard drives, whether it’s Windows, OS X, or Linux. But they can also boot from removable media devices, allowing you to boot a Linux desktop from a USB drive or CD…


Chris Hoffman
Sep 25th, 2013



How to Play Old LAN Games Over the Internet

How to Play Old LAN Games Over the Internet


On a PC, you can still play old games — which isn’t true for consoles. You may even find yourself actively buying these old games as they show up on great sales on Steam and elsewhere.


Chris Hoffman
Sep 23rd, 2013


How Much Does Anti-Virus Slow Down Your PC’s Boot Time?

How Much Does Anti-Virus Slow Down Your PC’s Boot Time?

Have you ever wondered how much time is added to the boot process by your anti-virus solution? This handy chart shows you the answer, with some surprising results.


Lowell Heddings
Sep 18th, 2013


Why You Don’t Need an Outbound Firewall On Your Laptop or Desktop PC

Why You Don’t Need an Outbound Firewall On Your Laptop or Desktop PC


Windows has a built-in firewall that blocks inbound connections. If a program wants to act as a server, Windows will prompt you. Some geeks don’t like the built-in firewall because it doesn’t offer the same prompts for outgoi…


Chris Hoffman
Sep 17th, 2013



How to Fix Browser Settings Changed By Malware or Other Programs

How to Fix Browser Settings Changed By Malware or Other Programs


Malware, adware, and pushy software installers all love changing your browser settings, giving you new home pages, default search engines, and obnoxious toolbars. It’s easy to forget to uncheck these options while installing …


Chris Hoffman
Sep 15th, 2013



Why Secure File Deletion Tools Aren’t Foolproof

Why Secure File Deletion Tools Aren’t Foolproof


To actually erase files from a magnetic hard drive, you would have to overwrite the file with useless data. Some tools attempt to make this easier, offering to “securely delete” a file by deleting it and overwriting its secto…


Chris Hoffman
Sep 14th, 2013



Macros Explained: Why Microsoft Office Files Can Be Dangerous

Macros Explained: Why Microsoft Office Files Can Be Dangerous


Microsoft Office documents containing built-in macros can be dangerous. Macros are essentially bits of computer code, and historically they’ve been vehicles for malware. Luckily, modern versions of Office contain security fea…


Chris Hoffman
Sep 11th, 2013



10 Android Tweaks That Still Require Root

10 Android Tweaks That Still Require Root


Many features that once required root have been added to Android over the years. However, many advanced tricks still require rooting your Android smartphone or tablet.


Chris Hoffman
Sep 10th, 2013


Will You Take the Risk and Use Windows XP Beyond April 2014?

Will You Take the Risk and Use Windows XP Beyond April 2014?

The deadline for the end of Windows XP support is drawing closer every day now, yet many people and businesses continue to use it. Microsoft is adamant that once April 8th comes and goes, there will be no end-of-life extensio…

Akemi Iwaya
Aug 27th, 2013


Use VirtualBox’s Seamless Mode or VMware’s Unity Mode to Seamlessly Run Programs From a Virtual Machine

Use VirtualBox’s Seamless Mode or VMware’s Unity Mode to Seamlessly Run Programs From a Virtual Machine


Virtual machines generally run guest operating systems and their programs in a single window. However, both VirtualBox and VMware have features that allow you to free virtualized programs from their prison, running them on yo…


Chris Hoffman
Aug 27th, 2013


Early Preview of Supervised Accounts Feature Now Available in Chrome Canary Channel

Early Preview of Supervised Accounts Feature Now Available in Chrome Canary Channel

Are you a huge fan of Google Chrome, but looking for a way to lock things down or supervise what your children access when browsing the internet with Chrome? Then you will definitely be pleased with the latest feature to be i…

Akemi Iwaya
Aug 19th, 2013


5 Ways to Set Up a Separate Web Browsing Environment for Guest Users

5 Ways to Set Up a Separate Web Browsing Environment for Guest Users


We recently covered how to let people use your computer without giving them access to all your stuff using your operating system’s guest mode feature. A faster alternative would be to give them their own, isolated web browser…


Chris Hoffman
Aug 18th, 2013



8 Clever Uses for Your Smartphone’s Camera (Aside From Taking Pictures)

8 Clever Uses for Your Smartphone’s Camera (Aside From Taking Pictures)


Sure, your smartphone’s camera can be used for photos and video chats, but it can do much more than that. Your phone’s camera is a powerful tool you can use for everything from finding better prices to navigation and translat…


Chris Hoffman
Aug 17th, 2013



Share Your Android Tablet (and Keep Your Privacy) with a Guest Account

Share Your Android Tablet (and Keep Your Privacy) with a Guest Account


Tablets are great devices to leave on a coffee table and share, but they’re intensely personal. They provide direct access to your email, signed-in apps, and even your Chrome browser history from your PC….


Chris Hoffman
Aug 13th, 2013



How to Prevent People From Viewing Your Browser’s Saved Passwords

How to Prevent People From Viewing Your Browser’s Saved Passwords


Have you ever saved a password in your browser — Chrome, Firefox, Internet Explorer, or another one? Then your passwords are likely viewable by anyone with access to your computer while you’re logged in….


Chris Hoffman
Aug 11th, 2013



How Attackers Actually “Hack Accounts” Online and How to Protect Yourself

How Attackers Actually “Hack Accounts” Online and How to Protect Yourself


People talk about their online accounts being “hacked,” but how exactly does this hacking happen? The reality is that accounts are hacked in fairly simple ways — attackers don’t use black magic.


Chris Hoffman
Aug 10th, 2013



How to Ensure Your Router, Cameras, Printers, and Other Devices Aren’t Accessible on the Internet

How to Ensure Your Router, Cameras, Printers, and Other Devices Aren’t Accessible on the Internet


Some people’s networked printers, cameras, routers, and other hardware devices are accessible from the Internet. There are even search engines designed to search such exposed devices. If your devices are secure, you won’t hav…


Chris Hoffman
Aug 5th, 2013



Myths: Does Deleting the Cache Actually Speed Up Your PC?

Myths: Does Deleting the Cache Actually Speed Up Your PC?


Deleting the cache is definitely something you’ll want to do if you are worried about your privacy. Just keep in mind that deleting the cache will only sorta delete those files — unless you overwrite the free space, you are…


Lowell Heddings
Aug 2nd, 2013



Beginner Geek: Everything You Need To Know About Browser Extensions

Beginner Geek: Everything You Need To Know About Browser Extensions


Browser extensions extend your web browser with additional features, modify web pages, and integrate your browser with the other services you use. This guide will introduce you to the world of browser extensions and help you …


Chris Hoffman
Aug 1st, 2013



How to Jailbreak Your Kindle Paperwhite for Screensavers, Apps, and More

How to Jailbreak Your Kindle Paperwhite for Screensavers, Apps, and More


We’ve shown you how to jailbreak your Kindle in the past, but the new Paperwhite (with a beautiful higher resolution screen that begs for custom screensavers) requires a brand new bag of tricks to jailbreak. Read on as we jai…


Jason Fitzpatrick
Jul 31st, 2013



How to Avoid Installing Junk Programs When Downloading Free Software

How to Avoid Installing Junk Programs When Downloading Free Software


The web is littered with traps for novice users when downloading software, from fake “Download” buttons that are actually advertisements to installers full of bundled toolbars and other junk software. Learning how to avoid th…


Chris Hoffman
Jul 27th, 2013



4 Ways to Set Up Parental Controls On Your Home Network

4 Ways to Set Up Parental Controls On Your Home Network


Parental controls can filter the web, blocking inadvertent access to inappropriate websites. There are a variety of ways to do this, from configuring network-wide parental controls on your router to using the parental control…


Chris Hoffman
Jul 15th, 2013


  • « Previous
  • 1
  • …
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • …
  • 96
  • Next »

Are Short Passwords Really That Insecure?

Are Short Passwords Really That Insecure?

SuperUser reader user31073 is curious whether he should really heed those short-password warnings:


Jason Fitzpatrick
Jul 11th, 2013


How to Setup Your Laptop with Tracking Software in Case You Ever Lose It

How to Setup Your Laptop with Tracking Software in Case You Ever Lose It


Apple offers a “Find My Mac” service to track a lost or stolen stolen Mac computer. However, Microsoft doesn’t provide an equivalent service for Windows PCs — not even for tablets running Windows 8.


Chris Hoffman
Jul 11th, 2013



Brute-Force Attacks Explained: How All Encryption is Vulnerable

Brute-Force Attacks Explained: How All Encryption is Vulnerable


Brute-force attacks are fairly simple to understand, but difficult to protect against. Encryption is math, and as computers become faster at math, they become faster at trying all the solutions and seeing which one fits….


Chris Hoffman
Jul 6th, 2013



How to Optimize and Tune-Up Your PC Without Paying an Electronics Store

How to Optimize and Tune-Up Your PC Without Paying an Electronics Store


Stores like Best Buy will charge you $49.99 to “optimize” and “tune up” your PC — either in-store or online. These services are generally a complete waste of money — you can easily do this all yourself for free….


Chris Hoffman
Jul 4th, 2013



Why Most Web Services Don’t Use End-to-End Encryption

Why Most Web Services Don’t Use End-to-End Encryption


Recent revelations about government surveillance have raised the question: why don’t cloud services encrypt your data? Well, they generally do encrypt your data, but they have the key so they can decrypt it any time they like…


Chris Hoffman
Jul 2nd, 2013



How to Use KeePass In Your Browser, Across Your Computers, and On Your Phone

How to Use KeePass In Your Browser, Across Your Computers, and On Your Phone


If you’re using a password manager and it’s not the cloud-based LastPass, it’s probably KeePass. KeePass is a completely open-source password manager that stores all your sensitive data locally. However, this means that it is…


Chris Hoffman
Jun 29th, 2013



How to Prepare Your Android Smartphone Ahead of Time (in Case You Lose It)

How to Prepare Your Android Smartphone Ahead of Time (in Case You Lose It)


One day, you could misplace your phone or have it stolen — smartphone thefts are on the rise. Prepare your Android phone for the day you lose it and losing it will be a much less traumatic experience….


Chris Hoffman
Jun 24th, 2013


How to View That Forgotten Wireless Network Password in Windows

How to View That Forgotten Wireless Network Password in Windows

Did you have someone else set up the wireless network in your house, and can’t for the life of you remember the password? If so read on to see how you may still be able to recover it.


Taylor Gibb
Jun 22nd, 2013


Why the 64-bit Version of Windows is More Secure

Why the 64-bit Version of Windows is More Secure


Most new PCs have been shipping with the 64-bit version of Windows — both Windows 7 and 8 — for years now. 64-bit bit versions of Windows aren’t just about taking advantage of additional memory. They’re also more secure tha…


Chris Hoffman
Jun 17th, 2013


How to Erase Windows 8’s Sync Data From the Cloud

How to Erase Windows 8’s Sync Data From the Cloud

The ability to sync data and settings between computers running Windows 8 is great, but it does mean that your information – possibly personal – is stored in the cloud. If you have changed your mind about syncing and want to …


Mark Wyciślik-Wilson
Jun 17th, 2013


15 System Tools You Don’t Have To Install on Windows Anymore

15 System Tools You Don’t Have To Install on Windows Anymore


Windows includes its own versions of many widely used system utilities. A variety of new utilities were added to Windows 8, but many of these utilities are available on Windows 7, too.


Chris Hoffman
Jun 14th, 2013



Here’s Why Firefox is Still Years Behind Google Chrome

Here’s Why Firefox is Still Years Behind Google Chrome


Firefox has a problem. It has fallen behind, with development stalled on the most crucial, most difficult problems. Many of the most significant improvements in Firefox over the past few years have simply been copying changes…


Chris Hoffman
Jun 13th, 2013



How a Chromebook is Locked Down to Protect You

How a Chromebook is Locked Down to Protect You


Chromebooks aren’t like traditional laptops. They’re locked down by default, only booting Google-approved operating systems in their default state. They’re much more limited than traditional Windows, Mac, or Linux laptops….


Chris Hoffman
Jun 9th, 2013


How to Use Facebook Trusted Contacts to Gain Access to Your Locked Account

How to Use Facebook Trusted Contacts to Gain Access to Your Locked Account

Online services are becoming increasingly concerned with security, with two-factor authentication now being the flavor of the day. Extra security at login is great, but what if you forget your password? Facebook’s Trusted Con…


Mark Wyciślik-Wilson
Jun 4th, 2013


How and Why to Back Up Your Cloud Data

How and Why to Back Up Your Cloud Data


So you’ve got all your data stored on servers somewhere — your emails at Gmail, photos on Facebook, and passwords in LastPass. But what if one of these services failed and lost your data?


Chris Hoffman
May 29th, 2013


IT Geek: How to Keep Files with the Same Name in Sync

IT Geek: How to Keep Files with the Same Name in Sync

You have most likely heard of services, such as Dropbox, which are used to keep files in sync across multiple machines. However, what if you want to perform this operation on a single machine? That is, keep files which have t…


Jason Faulkner
May 28th, 2013

How to Network Boot (PXE) an Automated Installation of Citrix Xen

How to Network Boot (PXE) an Automated Installation of Citrix Xen

Have you ever wished your Hypervisor could be installed at the push of a button, without the tedious searching for the install CD and answering the same boring installation questions? HTG explains how to PXE an automated ins…


Aviad
May 13th, 2013

How to Enable Two-Step Authentication For Increased Security on Windows 8 and the Web

How to Enable Two-Step Authentication For Increased Security on Windows 8 and the Web

Microsoft recently rolled out two-factor authentication for Windows Live accounts, and here’s how to enable it.


Taylor Gibb
May 11th, 2013

If I Buy a Computer with Windows 8 and Secure Boot Can I Still Install Linux?

If I Buy a Computer with Windows 8 and Secure Boot Can I Still Install Linux?

The new UEFI Secure Boot system in Windows 8 has caused more than its fair share of confusion, especially among dual booters. Read on as we clear up the misconceptions about dual booting with Windows 8 and Linux….


Jason Fitzpatrick
May 9th, 2013


QR Codes Explained: Why You See Those Square Barcodes Everywhere

QR Codes Explained: Why You See Those Square Barcodes Everywhere


QR codes are plastered on advertisements, billboards, business windows, and products. They appear to be very popular among marketers, although it’s rare to see anyone actually scanning one.


Chris Hoffman
May 6th, 2013



What ActiveX Controls Are and Why They’re Dangerous

What ActiveX Controls Are and Why They’re Dangerous


ActiveX controls are Internet Explorer’s version of plug-ins. For example, Internet Explorer’s Flash player is an ActiveX control. Unfortunately, ActiveX controls have been a significant source of security problems….


Chris Hoffman
May 5th, 2013


Why Don’t All File Search Tools Use the Master File Table for Instant Results?

Why Don’t All File Search Tools Use the Master File Table for Instant Results?

Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.


Jason Fitzpatrick
May 2nd, 2013

How DNSSEC Will Help Secure the Internet and How SOPA Almost Made It Illegal

How DNSSEC Will Help Secure the Internet and How SOPA Almost Made It Illegal

Domain Name System Security Extensions (DNSSEC) is a security technology that will help patch up one of the Internet’s weak points. We’re lucky SOPA didn’t pass, because SOPA would have made DNSSEC illegal….


Chris Hoffman
Apr 29th, 2013


How to Enable a Guest Access Point on Your Wireless Network

How to Enable a Guest Access Point on Your Wireless Network


Sharing your Wi-Fi with guests is just the polite thing to do, but that doesn’t mean you want to give them wide open access to your entire LAN. Read on as we show you how to set up your router for dual SSIDs and create a sepa…


Jason Fitzpatrick
Apr 22nd, 2013



Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats

Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats


Hackers aren’t inherently bad — the word “hacker” doesn’t mean “criminal” or “bad guy.”  Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. These terms define different groups of hackers…


Chris Hoffman
Apr 20th, 2013


  • « Previous
  • 1
  • …
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • …
  • 96
  • Next »


Why You Don’t Need to Run Manual Antivirus Scans (And When You Do)

Why You Don’t Need to Run Manual Antivirus Scans (And When You Do)


Do you regularly open your antivirus program and run scans? Microsoft Security Essentials and other antivirus programs think you need to, warning you that your computer may be at risk if you haven’t done so in a while….


Chris Hoffman
Apr 19th, 2013


How to Control Internet Access and More With Windows 8’s Parental Controls

How to Control Internet Access and More With Windows 8’s Parental Controls

Any parent will know that giving their children access to the internet is a double-edged sword. Access to the world’s biggest free library is invaluable, but there are plenty of unpleasant corners of the web that young eyes…


Mark Wyciślik-Wilson
Apr 9th, 2013


How to Test Your Antivirus, Firewall, Browser, and Software Security

How to Test Your Antivirus, Firewall, Browser, and Software Security


So you have an antivirus guarding your system, your firewall is up, your browser plug-ins are all up-to-date, and you’re not missing any security patches. But how can be sure your defenses are actually working as well as yo…


Chris Hoffman
Apr 9th, 2013



How to Prevent Your Kids From Spending Thousands of Dollars on In-App Purchases

How to Prevent Your Kids From Spending Thousands of Dollars on In-App Purchases


More than $5000. That’s how much one man’s child ran up on his credit card by playing “free” games on his iPad. Many games may be advertised as free, but they actually try to push expensive “in-app purchases.”…


Chris Hoffman
Apr 8th, 2013


How to Protect Your Apple ID with Two-Step Verification

How to Protect Your Apple ID with Two-Step Verification

To help keep online accounts secure, two-step verification is becoming increasingly common. Apple is the latest firm to introduce this extra level of authentication, meaning that logging into your account requires more than j…


Mark Wyciślik-Wilson
Apr 4th, 2013

How to Use Google Chrome to Remotely Access Your Computer

How to Use Google Chrome to Remotely Access Your Computer

We have looked at some of the various ways in which remote access of your computer can be achieved, including using TeamViewer and VNC, but if you have Chrome installed you can do the same with nothing more than a browser e…


Mark Wyciślik-Wilson
Mar 31st, 2013


Geek School: Learn How to Automate Windows with PowerShell

Geek School: Learn How to Automate Windows with PowerShell


In this edition of Geek School, we will be helping you understand the powerful PowerShell scripting language that is built right into Windows, and is extremely useful to know in an IT environment.


Taylor Gibb
Mar 25th, 2013


How to Opt Out of the Microsoft Office Customer Experience Improvement Program

How to Opt Out of the Microsoft Office Customer Experience Improvement Program

When you install any recent version of Microsoft Office, Microsoft assumes that you want to sign up for the Customer Experience Improvement Program (CEIP). There’s a check box during installation that’s selected by defaul…


Lori Kaufman
Mar 23rd, 2013

Geek School: Learning Windows 7 – Resource Access

Geek School: Learning Windows 7 – Resource Access

In this installation of Geek School, we take a look at Folder Virtualization, SIDs and Permission, as well as the Encrypting File System.


Taylor Gibb
Mar 21st, 2013

Can Third Parties Read the Full URL When Browsing via HTTPS?

Can Third Parties Read the Full URL When Browsing via HTTPS?

Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.


Jason Fitzpatrick
Mar 21st, 2013

How to View That Forgotten Wireless Password on Your Android Device

How to View That Forgotten Wireless Password on Your Android Device

Have you ever been in a situation where someone in your family hooked your phone or tablet up to the wireless and now you don’t know the password to connect your other devices?


Taylor Gibb
Mar 21st, 2013

Create a Shortcut to Avoid User Account Control Popups the Easy Way

Create a Shortcut to Avoid User Account Control Popups the Easy Way

There are numerous applications which, when launched, result in a UAC (User Account Control) warning being displayed. There are reasons why this security measure is a good idea, but it can also be extremely irritating. Eleva…


Mark Wyciślik-Wilson
Mar 20th, 2013

Geek School: Learning Windows 7 – Monitoring, Performance and Keeping Windows Up To Date

Geek School: Learning Windows 7 – Monitoring, Performance and Keeping Windows Up To Date

In today’s edition of Geek School, we look at the tools we can use to monitor the performance and reliability of our computers.


Taylor Gibb
Mar 20th, 2013

How to Recover Bit Locker Encrypted Disks Should You Forget Your Password

How to Recover Bit Locker Encrypted Disks Should You Forget Your Password

If you followed our guide to encrypting your removable disks with Bit Locker, you will recall that we saved our recovery key to the cloud, which is a new feature in Windows 8. The first thing we need to do is go and retrieve …


Taylor Gibb
Mar 20th, 2013

Geek School: Learning Windows 7 – Remote Access

Geek School: Learning Windows 7 – Remote Access

In the last part of the series we looked at how you can manage and use your Windows computers from anywhere as long as you are on the same network. But what if you are not?


Taylor Gibb
Mar 19th, 2013

How to Edit the Hosts File on Android (and Block Web Sites)

How to Edit the Hosts File on Android (and Block Web Sites)

Whether you want to prevent your child from accessing Facebook or are simply sick of the advertisements that litter webpages, a custom hosts file can come in handy.


Taylor Gibb
Mar 19th, 2013

Geek School: Learning Windows 7 – Remote Administration

Geek School: Learning Windows 7 – Remote Administration

In this installation of Geek School, we look at how we can administer our machines remotely using Remote Assistance, Remote Desktop, Windows Remote Management also known as WinRM, and PowerShell.


Taylor Gibb
Mar 18th, 2013

How to Quit Facebook, Twitter, Google+ and Other Social Networks

How to Quit Facebook, Twitter, Google+ and Other Social Networks

There can be few computer users who do not have at least one social networking account – the likes of Facebook and Twitter are just so prevalent these days. But while it’s easy to sign up for an account, closing one down …


Mark Wyciślik-Wilson
Mar 17th, 2013

Geek School: Learning Windows 7 – Windows Firewall

Geek School: Learning Windows 7 – Windows Firewall

Come and join us as we make a the world a safer place using our Windows Firewall in this edition of Geek School.


Taylor Gibb
Mar 15th, 2013

How to Hide and Password Protect Applications You Want to Keep Private

How to Hide and Password Protect Applications You Want to Keep Private

If you open a lot of programs at one time in Windows, your desktop can get quite chaotic and messy. One of those many windows may be displaying private data, and it’s easy to lose track of it and accidentally leave it visib…


Lori Kaufman
Mar 15th, 2013


Geek School: Learning Windows 7 – Networking

Geek School: Learning Windows 7 – Networking


Last time we looked at the theory behind IP addresses, subnet masks and name resolution, and we ended the installment with a practical guide on how to change your network settings. This time we take that knowledge and extend …


Taylor Gibb
Mar 13th, 2013


How to Host an FTP Server on Windows with FileZilla

How to Host an FTP Server on Windows with FileZilla

In this guide we’ll take you through the steps to setup a folder on your Windows computer as an FTP repository, using a free program called FileZilla. FTP can be used to easily transfer a lot of files between computers; the…

Korbin Brown
Mar 13th, 2013

Geek School: Learning Windows 7 – Managing Internet Explorer

Geek School: Learning Windows 7 – Managing Internet Explorer

Internet Explorer is a complex piece of software and hasn’t always been the browser choice of us geeks, but the truth is that it has gotten a lot better over the years so come and see what it has to offer….


Taylor Gibb
Mar 11th, 2013


Securely Access Online Banking and Email on Untrusted Computers

Securely Access Online Banking and Email on Untrusted Computers


Entering your online-banking or email passwords on an untrusted computer – particularly one in a public place – is risky. If you had a USB drive with Linux installed on it, you could log into your accounts without fear….


Chris Hoffman
Mar 10th, 2013


How to Encrypt and Password Protect Your USB Drives Without Extra Software

How to Encrypt and Password Protect Your USB Drives Without Extra Software

BitLocker is a lesser-known technology included in Windows that allows you to both password protect and encrypt the contents of your storage mediums.


Taylor Gibb
Mar 9th, 2013

  • « Previous
  • 1
  • …
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • …
  • 96
  • Next »


How to View and Disable Installed Plug-ins in Any Browser

How to View and Disable Installed Plug-ins in Any Browser


Browser plug-ins like Flash and Java add additional features web pages can use. However, they can also slow things down when in use or add extra security holes, particularly in the case of Java.


Chris Hoffman
Mar 9th, 2013



Geek School: Learning Windows 7 – Managing Applications

Geek School: Learning Windows 7 – Managing Applications


Have you ever wondered why your favorite game from Windows 95 just doesn’t seem to run on Windows 7 but other applications do? Well we have the answer for you, as well as a few solutions for how to fix it….


Taylor Gibb
Mar 8th, 2013


How Can I Secure a Laptop with no Security Cable Slot?

How Can I Secure a Laptop with no Security Cable Slot?

Historically laptops included a slot in the side for attaching security cables–as seen in the photo here–but increasingly more slender laptops like ultrabooks are omitting the lock-slot from their case design. How do you pr…


Jason Fitzpatrick
Mar 7th, 2013


How to Turn An Old Android Phone into a Networked Security Camera

How to Turn An Old Android Phone into a Networked Security Camera


If the idea of a networked security camera that you can remotely view and receive alerts from appeals to you (but the $$$ of a commercial model does not), read on as we show you how to turn older generation Android phones int…


Jason Fitzpatrick
Mar 3rd, 2013


The 10 Best Group Policy Editor Tweaks for Windows 8

The 10 Best Group Policy Editor Tweaks for Windows 8

There are a number of ways you can tweak Windows, whether you are looking to improve performance, iron out irritations, improve security or change the appearance of something you dislike. Some settings can be changed through …


Mark Wyciślik-Wilson
Feb 26th, 2013


How You Can Be Infected via Your Browser and How to Protect Yourself

How You Can Be Infected via Your Browser and How to Protect Yourself


In a perfect world, there would be no way for your computer to be infected via your browser. Browsers are supposed to run web pages in an untrusted sandbox, isolating them from the rest of your computer. Unfortunately, this d…


Chris Hoffman
Feb 26th, 2013



The Shameful Saga of Uninstalling the Terrible Ask Toolbar

The Shameful Saga of Uninstalling the Terrible Ask Toolbar


If you managed to get infected with the absolutely terrible Ask Toolbar on your computer, don’t be ashamed – it could happen to anybody. Especially considering that is bundled with the equally awful Java runtime. Those pe…


Lowell Heddings
Feb 19th, 2013


How to Easily Add Websites to the Flash Whitelist on Windows RT

How to Easily Add Websites to the Flash Whitelist on Windows RT

Microsoft’s Surface RT and other Windows RT-based machines include the Flash browser plugin, but it only runs on websites Microsoft has whitelisted. We have covered how you can add any website to the Flash whitelist, but no…


Chris Hoffman
Feb 18th, 2013

How To Overwrite Free Space Securely in Windows

How To Overwrite Free Space Securely in Windows

Your data is important, but just because you have emptied your recycle bin doesn’t mean that the file can’t be recovered.


Taylor Gibb
Feb 15th, 2013

50+ File Extensions That Are Potentially Dangerous on Windows

50+ File Extensions That Are Potentially Dangerous on Windows

Most people know that .exe files are potentially dangerous, but that isn’t the only file extension to beware of on Windows. There are a variety of other potentially dangerous file extensions – more than you might expect….


Chris Hoffman
Feb 12th, 2013


How to Quickly Set Permissions for a Web Site in Google Chrome

How to Quickly Set Permissions for a Web Site in Google Chrome


Google Chrome has a very useful feature that most people probably don’t know about – You can quickly set per-site permissions and disable plugins, Javascript, images, and more with only a single click….


Lowell Heddings
Feb 7th, 2013


The Best Free Ways to Send Encrypted Email and Secure Messages

The Best Free Ways to Send Encrypted Email and Secure Messages

Do you need to send someone sensitive information through email? Regular email is sent “in the clear” and therefore is subject to interception by hackers. However, there are many options for sending private, sensitive inf…


Lori Kaufman
Feb 2nd, 2013

Could KGB Archiver Be the Best Compression Tool Available? Or Just the Slowest?

Could KGB Archiver Be the Best Compression Tool Available? Or Just the Slowest?

File compression is so ubiquitous that it is now built into many operating systems as a standard feature. Zip files are generally the default archival format – occasionally replaced by RARs – but KGB Archiver is a tool t…


Mark Wyciślik-Wilson
Jan 31st, 2013

How Do I Disable the User Account Control Prompt in Windows 8?

How Do I Disable the User Account Control Prompt in Windows 8?

If you frequently use applications that prompt you to engage administrative privileges, it can put a kink in your workflow. Is it possible to disable the administrative nagging in Windows 8?


Jason Fitzpatrick
Jan 31st, 2013

New Security Hole Found in Wi-Fi Routers: Disable UPnP to Protect Yourself

New Security Hole Found in Wi-Fi Routers: Disable UPnP to Protect Yourself

There’s some 81 million unique IP addresses that expose UPnP functionality from the internet, and more than 6900 different devices are potentially vulnerable, at least, to being hacked from the outside. This means, theoretica…


Lowell Heddings
Jan 30th, 2013


How to Protect Yourself From Java Security Problems if You Can’t Uninstall It

How to Protect Yourself From Java Security Problems if You Can’t Uninstall It


For years, Java has been the top source of browser exploits. Even after a recent emergency patch, Java is still vulnerable. To protect ourselves, we should assume that Java is always going to be vulnerable….


Chris Hoffman
Jan 21st, 2013


How to Change the Length of the Add-ons Install Countdown in Firefox

How to Change the Length of the Add-ons Install Countdown in Firefox

When you install an add-on in Firefox, a confirmation dialog box displays with a countdown on the Install button. Many people find this annoying and would like to disable the countdown. However, it is there for good security …


Lori Kaufman
Jan 18th, 2013


How to Scan Your Computer With Multiple Antivirus Programs

How to Scan Your Computer With Multiple Antivirus Programs


You should only run a single antivirus application at a time, but none of them are perfect. Some antiviruses may catch malware that other antiviruses miss. Luckily, you don’t just have to rely on a single antivirus program….


Chris Hoffman
Jan 16th, 2013


Send Encrypted Emails Through Gmail Using a Chrome Extension

Send Encrypted Emails Through Gmail Using a Chrome Extension

Need to send sensitive information through email? Normal email messages can be intercepted or hacked before reaching the recipient. However, you can use a free extension for Google Chrome, called SafeGmail, that allows you to…


Lori Kaufman
Jan 9th, 2013

How to Make Windows 8’s Built-in Anti-Virus Scan Removable Drives

How to Make Windows 8’s Built-in Anti-Virus Scan Removable Drives

Windows Defender doesn’t scan removable drives by default, like USB drives or SD cards, but you can quickly change a setting to make that happen automatically.


Taylor Gibb
Jan 7th, 2013


Don’t Have a False Sense of Security: 5 Insecure Ways to Secure Your Wi-Fi

Don’t Have a False Sense of Security: 5 Insecure Ways to Secure Your Wi-Fi


You’ve got WEP encryption enabled, your network’s SSID is hidden, and you’ve enabled MAC address filtering so no one else can connect. Your Wi-Fi network is secure, right? Not really.


Chris Hoffman
Jan 2nd, 2013


How to Clean Up the List of Apps that Have Access to Your Accounts

How to Clean Up the List of Apps that Have Access to Your Accounts

Facebook, Twitter, Google, Dropbox, and all the other web services out there can be accessed by various applications and other services. Here’s a couple of links that you can use to quickly remove anything that has access….


Lowell Heddings
Jan 1st, 2013


The Top 25 How-To Geek Articles of 2012

The Top 25 How-To Geek Articles of 2012


We at How-To Geek appreciate all our readers and hope you have learned new and interesting things from our many articles. We’ve collected the top 25 articles published on How-To Geek in 2012.


Lori Kaufman
Dec 29th, 2012



If One of My Passwords Is Compromised Are My Other Passwords Compromised Too?

If One of My Passwords Is Compromised Are My Other Passwords Compromised Too?


If one of your passwords is compromised, does that automatically mean that your other passwords are also compromised? While there are quite a few variables at play, the question is an interesting look at what makes a password…


Jason Fitzpatrick
Dec 20th, 2012


How Scan any File or Folder Using Windows 8’s Built-in Anti-Virus

How Scan any File or Folder Using Windows 8’s Built-in Anti-Virus

Windows 8 includes a built-in antivirus solution that runs in the background. You might, however, be surprised that there is no obvious way to scan an item on demand. Here’s how to launch the Windows Defender GUI as well as…


Taylor Gibb
Dec 15th, 2012

  • « Previous
  • 1
  • …
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • …
  • 96
  • Next »


Secure Yourself by Using Two-Step Verification on These 16 Web Services

Secure Yourself by Using Two-Step Verification on These 16 Web Services


Two-factor authentication, also known as 2-step verification, provides additional security for your online accounts. Even if someone discovers your password, they’ll need a special one-time code to log in after you enable t…


Chris Hoffman
Dec 12th, 2012


How to Move Your Google Authenticator Credentials to a New Android Phone or Tablet

How to Move Your Google Authenticator Credentials to a New Android Phone or Tablet

Most of the app data on your Android is probably synced online will automatically sync to a new phone or tablet. However, your Google Authenticator credentials won’t — they aren’t synchronized for obvious security reason…


Chris Hoffman
Dec 7th, 2012

4 Alternatives to Google Drive for Linux

4 Alternatives to Google Drive for Linux

We’ve covered using Google Drive on Linux with third-party software, but why bother jumping through those hoops? You can use a cloud storage service that officially supports Linux instead – several of Google Drive’s com…


Chris Hoffman
Dec 4th, 2012

How to Use a PIN Instead of a Password in Windows 8

How to Use a PIN Instead of a Password in Windows 8

Entering your full password on a touch screen device can really become a pain in the neck, luckily for us we can link a short 4 digit PIN to our user account and log in with that instead.


Taylor Gibb
Dec 3rd, 2012

Does Email Address Obfuscation Actually Prevent Spam?

Does Email Address Obfuscation Actually Prevent Spam?

Many people obfuscate their email addresses–typing out someguy (at) somedomain (dot) com, for example–to project themselves from SPAM bots. Do such obfuscation techniques actually work?


Jason Fitzpatrick
Nov 29th, 2012

4 Places To Find Up-To-Date Antivirus Test Results Online

4 Places To Find Up-To-Date Antivirus Test Results Online

Do you know how effective your antivirus programs is? A variety of organizations regularly compare antivirus programs, throwing a large amount of malware samples at them, seeing how they perform, and ranking them in compariso…


Chris Hoffman
Nov 24th, 2012


How To Sideload Modern Apps on Windows 8

How To Sideload Modern Apps on Windows 8


The average Windows 8 user can only download apps that Microsoft has approved from the Windows Store. Windows 8 offers two ways to sideload unapproved apps, which are intended for developers and businesses with internal apps….


Chris Hoffman
Nov 23rd, 2012


7 Ways Modern Windows 8 Apps Are Different From Windows Desktop Apps

7 Ways Modern Windows 8 Apps Are Different From Windows Desktop Apps


Chris Hoffman
Nov 19th, 2012

How To Use Google Authenticator and Other Two-Factor Authentication Apps Without a Smartphone

How To Use Google Authenticator and Other Two-Factor Authentication Apps Without a Smartphone

Google, Dropbox, LastPass, Battle.net, Guild Wars 2 – all these services and more offer two-factor authentication apps that work on smartphones. If you don’t have a supported device, you can run an alternative application…


Chris Hoffman
Nov 18th, 2012

How to See Who Is Downloading Files From Your Network Shares in Windows 8

How to See Who Is Downloading Files From Your Network Shares in Windows 8

Have you ever been connected to a network and wanted to know if you could see who is copying stuff from your PC? Here’s how to do it with the built in Windows tools.


Taylor Gibb
Nov 18th, 2012

How Can I Track the Modifications a Program’s Installer Makes?

How Can I Track the Modifications a Program’s Installer Makes?

What exactly are those installation apps doing as the progress bar whizzes by? If you want to keep a close eye on things, you’ll need the right tools.


Jason Fitzpatrick
Nov 15th, 2012

How to Delete or Disable Search Charm History in Windows 8

How to Delete or Disable Search Charm History in Windows 8

When you use the Search Charm in Windows 8 it remembers everything you search for, which is very useful, but if you share your PC with someone you may want to delete your history or even disable it. Here’s how to do it….


Taylor Gibb
Nov 14th, 2012

How to Enable Do Not Track in Google Chrome for Increased Privacy

How to Enable Do Not Track in Google Chrome for Increased Privacy

The “Do Not Track” option is enabled by default in Windows 8’s Internet Explorer 10 and available in Firefox, Safari, and Opera. Notice one of the major browsers missing, like perhaps Chrome? Well it finally got the fea…


Taylor Gibb
Nov 9th, 2012

Learn Where Windows 8 Stores SmartScreen Filter Information for Downloaded Files

Learn Where Windows 8 Stores SmartScreen Filter Information for Downloaded Files

In previous versions of Windows the SmartScreen filter was a feature of Internet Explorer, with Windows 8 it becomes part of the Windows file system. But how does it know which files have been downloaded and which ones origi…


Taylor Gibb
Nov 8th, 2012

How to Deauthorize Flash Content Before You Sell Your PC

How to Deauthorize Flash Content Before You Sell Your PC

When it comes to selling your old digital equipment you usually should wipe it of all digital traces with something like DBAN, however if you can’t there are some precautions you should take–here’s one related to Flash con…


Taylor Gibb
Nov 7th, 2012


6 Ways Windows 8 Is More Secure Than Windows 7

6 Ways Windows 8 Is More Secure Than Windows 7


Whatever you think of it, Windows 8 isn’t just a new interface slapped on top of Windows 7. Windows 8 has seen a lot of security improvements, including an integrated antivirus, an application reputation system, and protect…


Chris Hoffman
Nov 6th, 2012



10 Awesome Improvements For Desktop Users in Windows 8

10 Awesome Improvements For Desktop Users in Windows 8


It’s easy to focus on how Windows 8’s new interface doesn’t feel at home on a traditional desktop PC or laptop. But that’s only one part of Windows 8 – the Windows 8 desktop includes a variety of useful improvements…


Chris Hoffman
Nov 5th, 2012


What You Said: Desktop vs. Web-based Email Clients

What You Said: Desktop vs. Web-based Email Clients

We clearly tapped into a subject you all have a strong opinion about with this week’s Ask the Readers post; read on to see how your fellow readers manage their email on, off, and across desktops and devices….


Jason Fitzpatrick
Nov 2nd, 2012

How to Make Windows 8 Index Encrypted Files

How to Make Windows 8 Index Encrypted Files

If you have files that are encrypted with the Encrypting File System, you will probably have noticed that they don’t get indexed by Windows, and therefore don’t show up in search results. Here’s how to fix that….


Taylor Gibb
Nov 1st, 2012

Beginner Geek: How to Stop Websites From Requesting Your Location in the Metro Internet Explorer

Beginner Geek: How to Stop Websites From Requesting Your Location in the Metro Internet Explorer

These days nearly every website on the web is trying to gather every piece of information they can about you and your browsing habits. Here’s how you can prevent them from getting perhaps the most sensitive piece of informati…


Taylor Gibb
Oct 31st, 2012

What You Said: How You Set Up a Novice-Proof Computer

What You Said: How You Set Up a Novice-Proof Computer

Earlier this week we asked you to share your tips and tricks for setting up a novice-proof computer; read on to see how your fellow readers ensure friends and relatives have a well protected computer.


Jason Fitzpatrick
Oct 26th, 2012


How Hackers Can Disguise Malicious Programs With Fake File Extensions

How Hackers Can Disguise Malicious Programs With Fake File Extensions


File extensions can be faked – that file with an .mp3 extension may actually be an executable program. Hackers can fake file extensions by abusing a special Unicode character, forcing text to be displayed in reverse order….


Chris Hoffman
Oct 22nd, 2012


8 New Features in Ubuntu 12.10, Quantal Quetzal

8 New Features in Ubuntu 12.10, Quantal Quetzal

Ubuntu 12.10 has been released and you can download it now. From better integration with web apps and online services to improvements in Unity, there are quite a few changes – although none of them are huge or groundbreakin…


Chris Hoffman
Oct 20th, 2012

How To Enable Do Not Track In Every Web Browser

How To Enable Do Not Track In Every Web Browser


Chris Hoffman
Oct 17th, 2012

Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked

Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked

The “Do Not Track” option is enabled by default in Windows 8’s Internet Explorer 10 and available in Firefox, Safari, and Opera. Google is even adding it to Chrome. There’s just one problem: it doesn’t actually prev…


Chris Hoffman
Oct 16th, 2012

  • « Previous
  • 1
  • …
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • …
  • 96
  • Next »

From the Tips Box: Xbox Output on Two Screens, High Tech Halloween Props, and Old Flash Drives as Password Reset Disks

From the Tips Box: Xbox Output on Two Screens, High Tech Halloween Props, and Old Flash Drives as Password Reset Disks

Once a week we round up some great reader tips and share them with everyone, this week we’re looking at outputting your Xbox 360 to two screens, spooky high-tech Halloween props, and recycling old flash drives as password res…


Jason Fitzpatrick
Oct 11th, 2012

Easily Tweak Windows 7 and Vista by Adding Tabs to Explorer, Creating Context Menu Entries, and More

Easily Tweak Windows 7 and Vista by Adding Tabs to Explorer, Creating Context Menu Entries, and More

If the User Account Control dialog box displays, click Yes to continue.


Lori Kaufman
Oct 11th, 2012

How to Enable Click To Play Plugins in Firefox

How to Enable Click To Play Plugins in Firefox

Have you ever opened a webpage only to have all sorts of multimedia on the page just start playing? Firefox has a hidden feature that was designed to prevent situations just like that. Read on to find out how to enable it….


Taylor Gibb
Oct 8th, 2012

The Best How-To Geek Articles for September 2012

The Best How-To Geek Articles for September 2012

Last month we covered topics such as whether or not ReadyBoost is worth using, if should you leave your laptop plugged in all the time or not, 14 special Google searches that show instant answers, and more. Join us as we look…

Akemi Iwaya
Oct 1st, 2012


How To Check If Your Account Passwords Have Been Leaked Online and Protect Yourself From Future Leaks

How To Check If Your Account Passwords Have Been Leaked Online and Protect Yourself From Future Leaks


Security breaches and password leaks happen constantly on today’s Internet. LinkedIn, Yahoo, Last.fm, eHarmony — the list of compromised websites is long. If you want to know whether your account information was leaked, ther…


Chris Hoffman
Sep 30th, 2012


The Most Common and Least Used 4-Digit PIN Numbers [Security Analysis Report]

The Most Common and Least Used 4-Digit PIN Numbers [Security Analysis Report]

How ‘secure’ is your 4-digit PIN number? Is your PIN number a far too common one or is it a bit more unique in comparison to others? The folks over at the Data Genetics blog have put together an interesting analysis report th…

Akemi Iwaya
Sep 27th, 2012


How to Get Pro Features in Windows Home Versions with Third Party Tools

How to Get Pro Features in Windows Home Versions with Third Party Tools


Some of the most powerful Windows features are only available in Professional or Enterprise editions of Windows. However, you don’t have to upgrade to Windows Professional to use these powerful features – use these free a…


Chris Hoffman
Sep 12th, 2012


How to Open an InPrivate Tab in the Metro Version of Internet Explorer

How to Open an InPrivate Tab in the Metro Version of Internet Explorer

Internet Explorer has a secret mode called InPrivate which is pretty much the same as Chrome’s incognito mode. It can be accessed on the desktop by right-clicking on the Internet Explorer icon on the taskbar, but how do you…


Taylor Gibb
Sep 10th, 2012

The Best Tips and Tricks for Getting the Most out of Internet Explorer 10

The Best Tips and Tricks for Getting the Most out of Internet Explorer 10

Now that Windows 8 is available, you might have started playing around with Internet Explorer 10. It comes in two different versions: the minimalist Modern UI/Metro version accessed from the Start screen and the traditional, …


Lori Kaufman
Sep 8th, 2012

How To Get Email Notifications Whenever Someone Logs Into Your Computer

How To Get Email Notifications Whenever Someone Logs Into Your Computer

Do you have a computer that you don’t want other people accessing – perhaps a server? You can have Windows email you whenever someone logs into your computer (assuming it’s connected to the Internet), giving you peace o…


Chris Hoffman
Sep 4th, 2012

The Best How-To Geek Articles for August 2012

The Best How-To Geek Articles for August 2012

This past month we covered topics such as how to make Mozilla Firefox fast again, 11 ways to make your LastPass account even more secure, how to install extensions from outside the Chrome web store, and more. Join us as we lo…

Akemi Iwaya
Sep 1st, 2012

What You Said: Your Favorite Remote Desktop Access Tools and Tips

What You Said: Your Favorite Remote Desktop Access Tools and Tips

Earlier this week we asked you to share your favorite remote desktop access tools and tips; now we’re back to highlight your favorite tools and how you use them.


Jason Fitzpatrick
Aug 31st, 2012


Java is Insecure and Awful, It’s Time to Disable It, and Here’s How

Java is Insecure and Awful, It’s Time to Disable It, and Here’s How


As usual, there’s yet another security hole in the Java Runtime Environment, and if you don’t disable your Java plugin, you’re at risk for being infected with malware. Here’s how to do it.


Lowell Heddings
Aug 28th, 2012


How to Forward Ports to a Virtual Machine and Use It as a Server

How to Forward Ports to a Virtual Machine and Use It as a Server

VirtualBox and VMware both create virtual machines with the NAT network type by default. If you want to run server software inside a virtual machine, you’ll need to change its network type or forward ports through the virtu…


Chris Hoffman
Aug 26th, 2012

How to Block Websites in Windows 8’s Hosts File

How to Block Websites in Windows 8’s Hosts File

Windows 8 takes a new approach to the hosts file by default – it won’t allow you to block Facebook and other websites by modifying your hosts file. Luckily, there’s a way to bypass this restriction….


Chris Hoffman
Aug 23rd, 2012


How to Monitor and Control Your Children’s Computer Usage on Windows 8

How to Monitor and Control Your Children’s Computer Usage on Windows 8


Windows 8’s Family Safety features allow you to monitor your children’s computer usage, get weekly reports, set time limits for computer use, filter inappropriate websites, block children from using certain applications, …


Chris Hoffman
Aug 22nd, 2012


How to Stop Apps Spying On Your Location in Windows 8

How to Stop Apps Spying On Your Location in Windows 8

Depending on the settings you chose when you originally set up Windows 8 you may have given apps access to your location. While it may help in some situations like using the Maps app a lot of people prefer privacy. Read on to…


Taylor Gibb
Aug 22nd, 2012


How to Quickly Forward Ports on Your Router from a Desktop Application

How to Quickly Forward Ports on Your Router from a Desktop Application


UPnP is a convenient way for programs to forward ports without you having to pull up your router’s web interface and forward ports manually. Unfortunately, some programs that require port forwarding don’t support UPnP –…


Chris Hoffman
Aug 21st, 2012


How to Encrypt Cloud Storage on Linux and Windows with EncFS

How to Encrypt Cloud Storage on Linux and Windows with EncFS

Do you store sensitive files on Dropbox or another cloud storage service? Encrypt them with EncFS for Linux, an encrypting file system that transparently encrypts and decrypts each individual file with your encryption key. Th…


Chris Hoffman
Aug 15th, 2012


How to Route All Your Android Traffic Through a Secure Tunnel

How to Route All Your Android Traffic Through a Secure Tunnel


There are few security problems a healthy dose of paranoia and know-how can’t take care of. Today we’re looking at how to secure your Android phone’s mobile data connection against intrusion using free software and a si…


Jason Fitzpatrick
Aug 14th, 2012


How to Secure SSH with Google Authenticator’s Two-Factor Authentication

How to Secure SSH with Google Authenticator’s Two-Factor Authentication

Want to secure your SSH server with easy-to-use two-factor authentication? Google provides the necessary software to integrate Google Authenticator’s time-based one-time password (TOTP) system with your SSH server. You’ll…


Chris Hoffman
Aug 14th, 2012


11 Ways to Make Your LastPass Account Even More Secure

11 Ways to Make Your LastPass Account Even More Secure


LastPass offers a lot of security options for locking down your account and protecting your valuable data. We’re fans of LastPass here at How-To Geek – it’s a great service that a lot of you already use….


Chris Hoffman
Aug 9th, 2012


How To Clean a Windows PC on Your Network Remotely with CCleaner

How To Clean a Windows PC on Your Network Remotely with CCleaner

Have you ever needed to clean someone’s PC but you wanted to do it from your computer instead of theirs? Here’s how you can remotely execute CCleaner on any Windows PC you have network access to.


Taylor Gibb
Jul 31st, 2012

Use Opera’s Advanced Tab Features to Enhance Your Web Browsing Experience

Use Opera’s Advanced Tab Features to Enhance Your Web Browsing Experience

Tabbed browsing is a fairly new concept. Not that long ago, if you wanted to view a website, but didn’t want to leave the website you were currently viewing, you had to open a new window. Firefox was the first to make tabbe…


Lori Kaufman
Jul 26th, 2012

How to Create a Secretly Disguised Folder Without Extra Software

How to Create a Secretly Disguised Folder Without Extra Software

Almost anyone knows how to make a “hidden” folder in Windows, most people also know how to make Explorer show hidden folders. Instead, if your folder looked like an innocent shortcut no one would know you have data in the…


Taylor Gibb
Jul 26th, 2012

  • « Previous
  • 1
  • …
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • …
  • 96
  • Next »

How to Hide Zip Files Inside a Picture Without any Extra Software in Windows

How to Hide Zip Files Inside a Picture Without any Extra Software in Windows

Since images are read from the header down, and zip files are read from the footer up, you can easily merge them as one single file , and no one will ever know. Read on to find out how.


Taylor Gibb
Jul 25th, 2012

VPN vs. SSH Tunnel: Which Is More Secure?

VPN vs. SSH Tunnel: Which Is More Secure?

VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand h…


Chris Hoffman
Jul 5th, 2012

How to Disable Ubuntu’s Guest Session Account

How to Disable Ubuntu’s Guest Session Account

Ubuntu and Linux Mint come with a “Guest Session” account, which anyone can log into from the login screen – no password required. If you’d rather restrict access to your computer, you can disable the guest account….


Chris Hoffman
Jul 3rd, 2012

The Best How-To Geek Articles for June 2012

The Best How-To Geek Articles for June 2012

This past month we covered topics such as why you only have to wipe a disk once to erase it, what RSS is and how you can benefit from using it, how websites are tracking you online, and more. Join us as we look back at the be…

Akemi Iwaya
Jul 1st, 2012

Find Out Which Websites are Tracking You Across the Web

Find Out Which Websites are Tracking You Across the Web

Have you ever wondered where the websites you visit send your information? Well, if you have, read on to find out about this new extension from Mozilla that will tell you how you are tracked across websites….


Taylor Gibb
Jun 27th, 2012

Generate a Strong Password using Mac OS X Lion’s Built-in Utility

Generate a Strong Password using Mac OS X Lion’s Built-in Utility

You might’ve heard of the LinkedIn and last.fm security breaches that took place recently. Not to mention the thousands of websites that have been hacked till now. Nothing is invulnerable to hacking. And when something like t…

Usman
Jun 21st, 2012

8 Ways to Tweak and Configure Sudo on Ubuntu

8 Ways to Tweak and Configure Sudo on Ubuntu

Like most things on Linux, the sudo command is very configurable. You can have sudo run specific commands without asking for a password, restrict specific users to only approved commands, log commands run with sudo, and more….


Chris Hoffman
Jun 18th, 2012

The Best Tips and Tweaks for Getting the Most Out of Internet Explorer 9

The Best Tips and Tweaks for Getting the Most Out of Internet Explorer 9

If you use Internet Explorer 9, we have many tips and tricks for you to improve your web surfing experience, from customizing the interface to using the many features, and to make your time online more secure with IE9’s man…


Lori Kaufman
Jun 16th, 2012

5 Tips and Tricks to Get the Most Out of Steam

5 Tips and Tricks to Get the Most Out of Steam

If you’re a PC gamer, there’s a good chance you’re familiar with Valve’s Steam and use it regularly. Steam includes a variety of cool features that you might not notice if you’re just using it to install and launch …


Chris Hoffman
Jun 16th, 2012

How to Recover an Encrypted Home Directory on Ubuntu

How to Recover an Encrypted Home Directory on Ubuntu

Access an encrypted home directory when you’re not logged in – say, from a live CD – and all you’ll see is a README file. You’ll need a terminal command to recover your encrypted files.


Chris Hoffman
Jun 11th, 2012

How to Disable Home Folder Encryption After Installing Ubuntu

How to Disable Home Folder Encryption After Installing Ubuntu

Ubuntu offers to encrypt your home directory during installation. The encryption has some drawbacks – there’s a performance penalty and recovering your files is more difficult. If you change your mind later, you can remov…


Chris Hoffman
Jun 9th, 2012

How to Encrypt Your Home Folder After Installing Ubuntu

How to Encrypt Your Home Folder After Installing Ubuntu

Ubuntu offers to encrypt your home folder during installation. If you decline the encryption and change your mind later, you don’t have to reinstall Ubuntu. You can activate the encryption with a few terminal commands….


Chris Hoffman
Jun 8th, 2012

How to Quickly Encrypt Removable Storage Devices with Ubuntu

How to Quickly Encrypt Removable Storage Devices with Ubuntu

Ubuntu can quickly encrypt USB flash drives and external hard drives. You’ll be prompted for your passphrase each time you connect the drive to your computer – your private data will be secure, even if you misplace the dr…


Chris Hoffman
Jun 7th, 2012

How to Restrict Android App Permissions

How to Restrict Android App Permissions

Android forces you to agree to every permission an app wants, assuming you want to use the app. After rooting your device, you can manage permissions on a per-app basis.


Chris Hoffman
Jun 6th, 2012

How to Lock Down IE 10 by Disabling Flash in Windows 8

How to Lock Down IE 10 by Disabling Flash in Windows 8

Microsoft now includes Flash along with their Internet Explorer browser in Windows 8. Flash has been known as a big culprit when it comes to security vulnerabilities in the past, so here’s how to disable it….


Taylor Gibb
Jun 6th, 2012

The 35 Best Tips and Tricks for Maintaining Your Windows PC

The 35 Best Tips and Tricks for Maintaining Your Windows PC

When working (or playing) on your computer, you probably don’t think much about how you are going to clean up your files, backup your data, keep your system virus free, etc. However, these are tasks that need attention….


Lori Kaufman
Jun 2nd, 2012

What You Said: How Do You Browse Securely Away From Home?

What You Said: How Do You Browse Securely Away From Home?

Responses to this week’s Ask the Reader question show that just because you’re away from home doesn’t mean you have to give up the security and privacy that your home network provides.


Jason Fitzpatrick
Jun 1st, 2012

How to Configure Ubuntu’s Built-In Firewall

How to Configure Ubuntu’s Built-In Firewall

Ubuntu includes its own firewall, known as ufw – short for “uncomplicated firewall.” Ufw is an easier-to-use frontend for the standard Linux iptables commands. You can even control ufw from a graphical interface….


Chris Hoffman
May 29th, 2012

How to Share CD & DVD Drives Over the Network on Windows

How to Share CD & DVD Drives Over the Network on Windows

From ultrabooks to netbooks, computers are shedding their optical drives. If you still use an occasional CD or DVD, you don’t have to buy an external optical drive –  you can share another computer’s optical drive over…


Chris Hoffman
May 18th, 2012


How To Hide Passwords in an Encrypted Drive Even the FBI Can’t Get Into

How To Hide Passwords in an Encrypted Drive Even the FBI Can’t Get Into


Encryption tools exist to protect your privacy… and also to make you feel like you’re an awesome spy. Today we’ll use a portable USB drive to hold all of your passwords encrypted in a virtual disk hidden inside a file….


Eric Z Goodnight
May 17th, 2012


How to Browse Anonymously With Tor

How to Browse Anonymously With Tor

Everything you do online can be traced back to your IP address. Even if you’re accessing encrypted websites, networks can see the websites you’re accessing – and the websites themselves know your IP address. Use the Tor…


Chris Hoffman
May 15th, 2012


The Best Tips and Tweaks for Getting the Most Out of Google Chrome

The Best Tips and Tweaks for Getting the Most Out of Google Chrome


Recently, we gathered the best tips and tweaks for Firefox. Google Chrome is another very popular browser, and we have collected some very useful tips and tricks for Google Chrome here. You’ll learn about built-in features …


Lori Kaufman
May 12th, 2012


How to Extend the Windows Firewall and Easily Block Outgoing Connections

How to Extend the Windows Firewall and Easily Block Outgoing Connections

The Windows Firewall is powerful, but it doesn’t offer an easy-to-use interface for its advanced features. Windows Firewall Notifier fills the holes in the built-in Windows Firewall, offering easy management of outbound con…


Chris Hoffman
May 10th, 2012

5 Alternative Search Engines That Respect Your Privacy

5 Alternative Search Engines That Respect Your Privacy

Google, Bing, Yahoo – all the major search engines track your search history and build profiles on you, serving different results based on your search history. Try one of these alternative search engines if you’re tired o…


Chris Hoffman
May 9th, 2012


How to Use CCleaner Like a Pro: 9 Tips & Tricks

How to Use CCleaner Like a Pro: 9 Tips & Tricks


There’s more to CCleaner than clicking a single button. This popular application for wiping temporary files and clearing private data hides a variety of features, from fine-grained options for tweaking the cleaning process …


Chris Hoffman
May 7th, 2012


  • « Previous
  • 1
  • …
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • …
  • 96
  • Next »

How to Take Screenshots of the Windows Logon Screen: 2 Geeky Tricks

There are ways to run a screen capture utility – or any other program – from the welcome screen. Windows doesn’t make this easy, but it’s possible. The logon screen runs on the Winlogon desktop, an isolated Windows de…


Chris Hoffman
May 6th, 2012

How to Create Advanced Firewall Rules in the Windows Firewall

How to Create Advanced Firewall Rules in the Windows Firewall

Windows’ built-in firewall hides the ability to create powerful firewall rules. Block programs from accessing the Internet, use a whitelist to control network access, restrict traffic to specific ports and IP addresses, and…


Chris Hoffman
Apr 30th, 2012

8 New Features in Ubuntu 12.04, Precise Pangolin

8 New Features in Ubuntu 12.04, Precise Pangolin

Ubuntu 12.04 is upon us. Aside from the usual assortment of bug fixes and updated software, Ubuntu’s Unity desktop environment has been polished and offers new features and more configurability.


Chris Hoffman
Apr 28th, 2012

The Best Tips and Tweaks for Getting the Most Out of Firefox

The Best Tips and Tweaks for Getting the Most Out of Firefox

Firefox is one of the more popular web browsers that runs on Windows, Linux, and Mac OS X. Firefox has a lot of built-in, useful features and you can install many extensions to expand its functionality….


Lori Kaufman
Apr 21st, 2012

Clear Your Browser History Automatically When Firefox Closes

Clear Your Browser History Automatically When Firefox Closes

Do you share a computer with other family members or friends, or with co-workers at a workplace? When surfing the web in Firefox, you may not want the next person to use the computer to know what sites you have visited….


Lori Kaufman
Apr 20th, 2012

View and Delete Stored Passwords in Firefox

View and Delete Stored Passwords in Firefox

Firefox allows you to securely store usernames and passwords for websites in its Password Manager. When you visit one of the websites again, Firefox automatically fills in the username and password to log you in….


Lori Kaufman
Apr 18th, 2012

How to Delete Your Application History in Windows 8

How to Delete Your Application History in Windows 8

When you close a Metro application in Windows 8, its more like it gets paused, rather than completely closes. This allows us to quickly switch between applications (think “resume”) without having to launch the application…


Taylor Gibb
Apr 18th, 2012

The Best Ways to Lock Down Your Multi-User Computer

The Best Ways to Lock Down Your Multi-User Computer

Whether you’re sharing a computer with other family members or friends at home, or securing computers in a corporate environment, there may be many reasons why you need to protect the programs, data, and settings on the com…


Lori Kaufman
Apr 14th, 2012


The Best Free Portable Apps for Your Flash Drive Toolkit

The Best Free Portable Apps for Your Flash Drive Toolkit


Large capacity, small-sized, affordable USB flash drives provide us with the ability to easily carry around gigs of data in our pockets. Why not take our favorite programs with us as well so we can work on any computer?…


Lori Kaufman
Apr 8th, 2012


How To Use the Restore Partition to Break Into a Mac Running OS X Lion

How To Use the Restore Partition to Break Into a Mac Running OS X Lion

It’s trivial to break into a Mac using an OS X boot disk, but new Macs use a restore partition for OS installations. Here’s how you can use that partition to reset a user password and break into a Mac….


Justin Garrison
Apr 4th, 2012


Here’s 6 Great Tricks for Windows 8 that You Probably Don’t Know

Here’s 6 Great Tricks for Windows 8 that You Probably Don’t Know


We’ve covered a lot of tips, tricks, and tweaks for Windows 8, but there are still a few more. From bypassing the lock screen to instantly taking and saving screenshots, here are a few more hidden options and keyboard short…


Chris Hoffman
Apr 3rd, 2012


How to Knock into Your Network, Part 2: Protect Your VPN (DD-WRT)

How to Knock into Your Network, Part 2: Protect Your VPN (DD-WRT)

We’ve shown you how to trigger WOL remotely by “Port Knocking” on your router. In this article, we will show how to use it to protect a VPN service.


Aviad
Mar 28th, 2012

How to Remotely Shut Down or Restart Windows PCs

How to Remotely Shut Down or Restart Windows PCs

Windows includes Shutdown.exe, a simple utility for remotely shutting down or restarting Windows computers on your local network. To use Shutdown.exe, you must first configure the PCs you want to shut down or restart remotely…


Chris Hoffman
Mar 26th, 2012

How To Knock Into Your Network (DD-WRT)

How To Knock Into Your Network (DD-WRT)

Have you ever wanted to have that special “dorm knock” with your router, as to have it only “open the door” when the secret knock has been recognized? How-To Geek explains how to install the Knock daemon on DD-WRT….


Aviad
Mar 23rd, 2012

The Best Articles for Backing Up and Syncing Your Data

The Best Articles for Backing Up and Syncing Your Data

World Backup Day is March 31st and we decided to provide you with some useful information to make backing up your data easier. We’ve published articles about backing up various types of data and settings both offline and on…


Lori Kaufman
Mar 17th, 2012

Ask HTG: Removing Windows 8, Understanding Linux File Permissions, and Disabling Scan and Fix Popups in Windows

Ask HTG: Removing Windows 8, Understanding Linux File Permissions, and Disabling Scan and Fix Popups in Windows

You have questions and we have answers; once a week we round up a handful of reader questions and share the answers with everyone. This week we’re looking at removing Windows 8 from a dual installation, understanding Linux …


Jason Fitzpatrick
Mar 12th, 2012

The Top 10 Tips for Securing Your Data

The Top 10 Tips for Securing Your Data

With the use of smartphones, tablets, laptops, and netbooks, most of us do everyday tasks online, such as purchasing goods and banking. However, if we don’t secure our personal data on our computers and online, we could be …


Lori Kaufman
Mar 10th, 2012

From the Tips Box: Recycling Android Phones, Glowing Light Switches, and Encrypting Dropbox

From the Tips Box: Recycling Android Phones, Glowing Light Switches, and Encrypting Dropbox

Once a week we round up some great tips from the HTG tips box and share them with everyone; this week we’re looking at recycling Android phones for use around the house, increasing safety with a glowing LED switch, and how …


Jason Fitzpatrick
Mar 8th, 2012

How To Create and Use a Password Reset Disk or USB In Windows 8 or 10

How To Create and Use a Password Reset Disk or USB In Windows 8 or 10

Forgetting your password can be very frustrating, however this situation could be completely alleviated if you always had a password reset disk handy. Lets see how we can create one in Windows 8 or Windows 10….


Taylor Gibb
Mar 7th, 2012

Build a USB Password Key to Automatically Login to Your Computer

Build a USB Password Key to Automatically Login to Your Computer

This DIY electronics hack turns an old flash drive into a combination USB password generator and USB password key–simply plug it in to unlock your computer.


Jason Fitzpatrick
Mar 6th, 2012

Listen to Pandora Anywhere Without a Using a Proxy

Listen to Pandora Anywhere Without a Using a Proxy

International users are frequently disappointed to find US-based services behind restrictive firewalls; Pandora is no exception to the long list of off-limits services. This clever hack takes advantage of a loophole to allow …


Jason Fitzpatrick
Mar 5th, 2012

3 Ways to Back Up & Restore Your Wi-Fi Passwords

3 Ways to Back Up & Restore Your Wi-Fi Passwords

Windows remembers Wi-Fi passwords to save you time, but you can save more time by exporting the saved passwords and transfering them to other computers. LastPass, WirelessKeyView, and Windows itself can back up your wireless …


Chris Hoffman
Mar 2nd, 2012

How to Send Self-Destructing Sensitive Information to Someone via Email

How to Send Self-Destructing Sensitive Information to Someone via Email

Have you ever sent private information to someone, maybe a family member needed your credit card number, and then regretted that you had ever done it. This can all be solved with a self-destructing link….


Taylor Gibb
Feb 28th, 2012

Get Your Android’s App Permissions Under Control with aSpotCat

Get Your Android’s App Permissions Under Control with aSpotCat

Viewing the permissions of each installed Android app requires digging through the Manage Applications screen and examining each app one by one — or does it? aSpotCat takes an inventory of the apps on your system and the per…


Chris Hoffman
Feb 24th, 2012

From the Tips Box: Muting Apps in Windows 7, Data Privacy on iOS Devices, and Clutter Free YouTube and Amazon Browsing

From the Tips Box: Muting Apps in Windows 7, Data Privacy on iOS Devices, and Clutter Free YouTube and Amazon Browsing

Once a week we round up some of the great reader tips that flood into our inbox and share them with everyone. This week we’re looking at muting individual apps in Windows 7, controlling the flow of personal data in iOS appl…


Jason Fitzpatrick
Feb 23rd, 2012

  • « Previous
  • 1
  • …
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • …
  • 96
  • Next »

Beginner: How to Clear Your Web History in Chrome, Firefox and IE9

Beginner: How to Clear Your Web History in Chrome, Firefox and IE9

We all have had a time when we have done some private browsing, maybe for someone’s birthday present, on the internet without going into “private” mode. Here’s the beginner’s guide to clearing your web history in any of t…


Taylor Gibb
Feb 21st, 2012

3 Quick Ways to Make Sure Your Google Account is Secure

3 Quick Ways to Make Sure Your Google Account is Secure

Google accounts are a treasure trove of personal data for identity thieves. We’ve already covered setting up two-step authentication to secure your Google account, but there are a few more tricks you may not know about….


Chris Hoffman
Feb 21st, 2012

Ask HTG: Connecting a Reluctant Laptop to Wi-Fi Router, Growth-Friendly Backup Plans, and Explaining Camera RAW

Ask HTG: Connecting a Reluctant Laptop to Wi-Fi Router, Growth-Friendly Backup Plans, and Explaining Camera RAW

Once a week we round up some of the questions pouring into the Ask HTG inbox and share them with everyone. This week we’re looking at how to connect a particularly stubborn laptop to a Wi-Fi router, setting up a growth-frie…


Jason Fitzpatrick
Feb 20th, 2012


The Best Articles for Tweaking and Customizing Windows 7

The Best Articles for Tweaking and Customizing Windows 7


Do you love to tweak your Windows 7 system, customizing it to fit your personality and the way you work? We have shown you many ways to customize the Taskbar, Start Menu, Desktop, Windows Explorer, and other parts of Windows….


Lori Kaufman
Feb 18th, 2012


How to Report a Malicious Website to the SmartScreen Filter in Internet Explorer 9

How to Report a Malicious Website to the SmartScreen Filter in Internet Explorer 9

One of Microsoft’s leading technologies that protect us from the dangerous web is the SmartScreen filter in Internet Explorer. Since the filter is crowd-sourced, it helps tremendously if you do your part, so let’s take a lo…


Taylor Gibb
Feb 9th, 2012

How to Make LastPass Even More Secure with Google Authenticator

How to Make LastPass Even More Secure with Google Authenticator

Storing your passwords in the cloud is convenient, but security can be a concern. LastPass provides two free multi-factor authentication methods to lock your password vault up tight: a mobile app or a piece of paper….


Chris Hoffman
Feb 6th, 2012

How to Optimize Opera for Maximum Privacy

How to Optimize Opera for Maximum Privacy

Opera, like all popular web browsers, contains features that sacrifice privacy for convenience. Opera contains some features that send every website you visit to its servers, but also offers excellent, fine-grained control of…


Chris Hoffman
Jan 30th, 2012

The Best Wi-Fi Articles for Securing Your Network and Optimizing Your Router

The Best Wi-Fi Articles for Securing Your Network and Optimizing Your Router

Wi-Fi is a big part of everybody’s daily life. However, it can cause frustration if not set up properly or optimally. Worse than that, it can get you into big trouble if it is not secure.


Lori Kaufman
Jan 28th, 2012

From The Tips Box: Download All Your Facebook Data, Inifinite Apps in iOS Folders, and Checking Web-App Permissions

From The Tips Box: Download All Your Facebook Data, Inifinite Apps in iOS Folders, and Checking Web-App Permissions

Once a week we round up some of the great tips that flow into the HTG tips box and share them with the greater readership. This week we’re talking about downloading your Facebook data for easy wall searching, packing lots o…


Jason Fitzpatrick
Jan 26th, 2012

How to Install the Transmission BiTorrent Client on Your Router (DD-WRT)

How to Install the Transmission BiTorrent Client on Your Router (DD-WRT)

We’ve already put your DD-WRT router in first gear with the power of the Opkg package manager. It’s time to install a Transmission and shift gears. How-To Geek explains how to install the BiTorrent client Transmission on DD-…


Aviad
Jan 25th, 2012

Quick Tip: How To Delete Your Google Chrome Browser Sync Data

Quick Tip: How To Delete Your Google Chrome Browser Sync Data

There are a number of reasons one might want to delete their Google Chrome Sync data. Regardless of the reason why, there’s one simple place to do it from, though it might not be obvious.


Taylor Gibb
Jan 24th, 2012

The Best Password Tips to Keep Your Accounts Secure

The Best Password Tips to Keep Your Accounts Secure

With all of the online accounts we all have, it’s easy to get lazy and start using the same password for multiple websites, services, and accounts, for fear of forgetting an important password. However, this can compromise …


Lori Kaufman
Jan 21st, 2012

Use a Free, Portable Tool to View your Passwords from Your LastPass Account Offline

Use a Free, Portable Tool to View your Passwords from Your LastPass Account Offline

LastPass is an online password manager that allows you to securely store all your passwords and access them from anywhere. As the developers of LastPass say, it is the last password you’ll have to remember….


Lori Kaufman
Jan 18th, 2012

5 Tips and Tricks to Get the Most Out of Pidgin

5 Tips and Tricks to Get the Most Out of Pidgin

Heard of Pidgin? You should have. It’s one of the best multi-protocol instant messaging apps for Windows and Linux, and it’s open source. Pidgin includes some interesting plugins and features that you might not know about…


Chris Hoffman
Jan 17th, 2012

How to Optimize Internet Explorer 9 for Maximum Privacy

How to Optimize Internet Explorer 9 for Maximum Privacy

Use Internet Explorer 9? It may be sending your entire browsing history to Microsoft. Or, it may be automatically blocking tracking websites. It’s all in how you tweak Internet Explorer’s privacy settings….


Chris Hoffman
Jan 12th, 2012

How to Password Protect Ubuntu’s Boot Loader

How to Password Protect Ubuntu’s Boot Loader

Ubuntu’s Grub boot loader lets anyone edit boot entries or use its command-line mode by default. Secure Grub with a password and no one can edit them — you can even require a password before booting operating systems….


Chris Hoffman
Jan 2nd, 2012

Group Policy Geek: How to Control the Windows Firewall With a GPO

Group Policy Geek: How to Control the Windows Firewall With a GPO

The Windows Firewall can be one of the biggest nightmares for system administrators to configure, with the addition of Group Policy precedence it just becomes a headache. Here we will take you from start to finish on how to e…


Taylor Gibb
Dec 19th, 2011

Learn How Stuff Works With the Best How-To Geek Explainers for 2011

Learn How Stuff Works With the Best How-To Geek Explainers for 2011

How-To Geek is a great place to learn all kinds of things, and some of our articles are in-depth explanations of how something works. We call these explainer topics, and here’s the best ones that we published in 2011….


Lori Kaufman
Dec 10th, 2011

The How-To Geek Guide to Scoring Free Wi-Fi

The How-To Geek Guide to Scoring Free Wi-Fi

Readily available internet access is the lifeblood for laptops, netbooks, tablets, and other portable devices. Whether your travels take you to the local coffee house or across the country, never be without free Wi-Fi again….


Jason Fitzpatrick
Dec 6th, 2011

Ask HTG: White Noise Screen Savers, Efficient File Naming, and Recovering from a Password Compromise

Ask HTG: White Noise Screen Savers, Efficient File Naming, and Recovering from a Password Compromise

Once a week we share three of the questions we’ve answered from the Ask HTG inbox with the greater readership; this week we’re looking at white noise screen savers, efficient file naming systems, and recovering from a pas…


Jason Fitzpatrick
Dec 5th, 2011

Your Phone Carrier Is Tracking You; Here’s How to Disable It

Your Phone Carrier Is Tracking You; Here’s How to Disable It

There’s a good chance that your smart phone is loaded with root-level spyware installed—not by a malicious internet source, but by your phone provider. Find out how to detect and remove it to increase performance and privac…


Jason Fitzpatrick
Dec 1st, 2011

The Best How-To Geek Articles for November 2011

The Best How-To Geek Articles for November 2011

It has been a busy month here at HTG where we covered topics such as how to see which websites your computer is secretly connecting to, reviewed the new Amazon Kindle Fire Tablet, learned how to improve your Google search ski…

Akemi Iwaya
Dec 1st, 2011

How To Block Web Sites at the Router Level for Network Wide Filtering

How To Block Web Sites at the Router Level for Network Wide Filtering

A comprehensive network filtering system is overkill if all you want to do is block a handful of web sites. Read on as we show you how—with nothing more than your router—you can selectively block and temporarily restrict …


Jason Fitzpatrick
Nov 22nd, 2011

How to Hide a Drive in Windows So that No One Will Know it’s There

How to Hide a Drive in Windows So that No One Will Know it’s There

When you add a drive to your PC, by default it gets a drive letter, whether it is a removable drive or even a fixed hard drive inside of your PC. Lets take a look at how we can hide these drives.


Taylor Gibb
Nov 9th, 2011

How to Use Refresh and Reset in Windows 8 or 10 to Easily Reinstall Your PC

How to Use Refresh and Reset in Windows 8 or 10 to Easily Reinstall Your PC

Sick of formatting? Then learn how to breathe new life into your machines without formatting using the new Refresh and Reset features present in Windows 8 or 10.


Taylor Gibb
Nov 4th, 2011

  • « Previous
  • 1
  • …
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • …
  • 96
  • Next »

Tweak the History in the Run Dialog Box in Windows

Tweak the History in the Run Dialog Box in Windows

Do you use the Run dialog box often in Windows? If so, we offer some helpful tips for tweaking the dialog’s history, or the most recently used (MRU) list.


Lori Kaufman
Nov 2nd, 2011

The Best How-To Geek Articles for October 2011

The Best How-To Geek Articles for October 2011

October has been full of geeky goodness here at HTG where we covered topics such as anonymizing and encrypting your BitTorrent traffic, installing Android on your HP Touchpad, reinstalling Windows without having to reactivate…

Akemi Iwaya
Nov 1st, 2011


The Painless Way to Ditch Your Old Windows XP for a More Secure Linux

The Painless Way to Ditch Your Old Windows XP for a More Secure Linux


Windows XP just isn’t secure anymore! If the expense of the new Windows operating systems is too great, here’s an easy and painless way to get a completely free Linux, keep your old Windows XP installation, and start surf…


Eric Z Goodnight
Oct 31st, 2011


More of the Best Windows 7 Explorer Tips and Tricks

More of the Best Windows 7 Explorer Tips and Tricks

Previously, we published a list of useful tips and tricks for getting the most out of Windows 7 Explorer. Here are some additional tips to help improve your productivity when using Explorer.


Lori Kaufman
Oct 29th, 2011

Use the Windows 7 Start Menu, Explorer, and Task Manager in Windows 8

Use the Windows 7 Start Menu, Explorer, and Task Manager in Windows 8

If you’ve tried the Windows 8 Developer Preview and found you don’t like the new Start menu, Windows Explorer, and Task Manager, there is a way to make those items look and act like Windows 7.


Lori Kaufman
Oct 27th, 2011

How to Encrypt and Hide Your Personal Files Inside of a Photo

How to Encrypt and Hide Your Personal Files Inside of a Photo

Have secret plans to take over the world that you don’t want anyone to be able to read? Encrypt those precious bytes with a custom password before disguising them as an ordinary picture that could fool anyone….


Taylor Gibb
Oct 27th, 2011

Take Ownership of a Registry Key in Windows 7

Take Ownership of a Registry Key in Windows 7

We have previously written about how to take ownership of files and folders in Windows 7, but there may be times when you need to take ownership of or assign full permission for certain registry keys. This article shows you h…


Lori Kaufman
Oct 26th, 2011


Online Safety: Why You Should Give Up Windows XP For Good (Updated)

Online Safety: Why You Should Give Up Windows XP For Good (Updated)


Most geeks will tell you it’s well past time to get rid of XP and upgrade to newer, safer operating systems. It can be tough to explain, so keep reading this list of real world reasons to let XP go.


Eric Z Goodnight
Oct 24th, 2011


How to Enable Ping Echo Replies in Windows 8

How to Enable Ping Echo Replies in Windows 8

When you ping a PC running Windows 8, by default it doesn’t reply to the echo request. This is caused by a firewall rule that blocks all incoming ICMP packets, but this can be changed quickly in the Advanced Firewall Settin…


Taylor Gibb
Oct 20th, 2011

How to Remotely Lock or Wipe Your iOS 5 Device

How to Remotely Lock or Wipe Your iOS 5 Device

The Find My iPhone/iPad not only allows you to track your lost or stolen iOS device, it also allows you to remotely remove all your sensitive data off of the device and even lock it in the case of theft….


Taylor Gibb
Oct 18th, 2011

Online Safety: Who Says Macs Don’t Get Viruses?

Online Safety: Who Says Macs Don’t Get Viruses?

Lots of people say “ Don’t worry about viruses, just get a Mac.” Is this advice on the level? Let’s take a look at the history of Macintosh security, and learn what we can from the Mac.


Eric Z Goodnight
Oct 12th, 2011

How To Anonymize and Encrypt Your BitTorrent Traffic

How To Anonymize and Encrypt Your BitTorrent Traffic

Whether you’re trying to dodge an angry government, a connection throttling ISP, or the watchful gaze of media conglomerates, anonymizing and encrypting your BitTorrent traffic can help. Read on to learn how….


Jason Fitzpatrick
Oct 11th, 2011

Best Windows 7 Explorer Tips and Tricks

Best Windows 7 Explorer Tips and Tricks

Windows Explorer in Windows 7 has been significantly changed and improved since the days of Vista and XP. This article provides some of the more useful tips and tricks for getting the most out of Explorer….


Lori Kaufman
Oct 8th, 2011

How to Use the New Picture Password and PIN Logon in Windows 8

How to Use the New Picture Password and PIN Logon in Windows 8

Windows 8 introduces two new ways of authenticating yourself other than just using a password. Now you can use a Picture Password, which uses gestures, as well as PIN code. Here’s how they both work….


Taylor Gibb
Sep 29th, 2011

Upload Files to an FTP Site With a Right-Click Using this Simple Script

Upload Files to an FTP Site With a Right-Click Using this Simple Script

While there are a myriad of FTP clients available, nothing is easier than sending files to an FTP server with a right-click. Likewise, there are loads of utilities available which add this functionality to Windows, but for a …


Jason Faulkner
Sep 29th, 2011

Online Safety: Understanding Hackers, Phishers, and Cybercriminals

Online Safety: Understanding Hackers, Phishers, and Cybercriminals

Have you ever been the victim of identity theft? Ever been hacked? Here’s the first in a series of critical information to help you arm yourself against the surprisingly frightening world of hackers, phishers, and cybercrim…


Eric Z Goodnight
Sep 28th, 2011

Learn the Ins and Out of OpenSSH on Your Linux PC

Learn the Ins and Out of OpenSSH on Your Linux PC

We’ve extolled the virtues of SSH numerous times, for both security and remote access. Let’s take a look at the server itself, some important “maintenance” aspects, and some quirks that can add turbulence to an otherw…


YatriTrivedi
Sep 20th, 2011

Avoid Being Tracked On The Internet Using Tracking Protection List in IE9

Avoid Being Tracked On The Internet Using Tracking Protection List in IE9

When you visit a website you actually share information with more websites than the one you see in the address bar. Read on to find out how to stop websites from tracking your browsing habits using Internet Explorer 9….


Taylor Gibb
Sep 20th, 2011

Windows 8 Screenshot Tour: Everything You Possibly Want to Know

Yesterday Microsoft released the first preview release of Windows 8, and we spent all night testing it out and diving into how it all works. Here’s our review, and the normal How-To Geek style screenshot tour, with loads an…


Lowell Heddings
Sep 14th, 2011

How to Supercharge Your SABnzbd Experience with Tweaks, Add-ons, and Mobile Apps

How to Supercharge Your SABnzbd Experience with Tweaks, Add-ons, and Mobile Apps

Last month we showed you how to get started with Usenet using SABnzbd. Now we’re back to show you how to supercharge your SABnzbd experience with add-ons and customizations.


Jason Fitzpatrick
Sep 6th, 2011

Store Private Files Securely Using a Portable File Encryption Tool

Store Private Files Securely Using a Portable File Encryption Tool

If you work on multiple computers, you probably cart your data and portable programs around on a USB flash drive. Wouldn’t it be handy to have an easy-to-use portable method of storing and accessing your private files?…


Lori Kaufman
Sep 5th, 2011

How to Help Prevent Drive-By Viruses Using ActiveX Filtering in IE9

How to Help Prevent Drive-By Viruses Using ActiveX Filtering in IE9

Anybody who has been around the internet for a while knows about ActiveX controls and their historical security problems. Here’s how to use ActiveX filtering in IE9 to prevent being hijacked by a virus while browsing….


Taylor Gibb
Sep 5th, 2011

Learn How to Securely Delete Files in Windows

Learn How to Securely Delete Files in Windows

When you delete a file in Windows, only the reference to the file is removed from the file system table. The file still exists on disk until other data overwrites it, leaving it vulnerable to recovery….


Lori Kaufman
Sep 1st, 2011

How To Import Your Saved Browser Passwords Into KeePass

How To Import Your Saved Browser Passwords Into KeePass

We have previously covered the security of saved passwords inside Internet Explorer and Chrome which lack browser specific master password protection. If this leaves you a bit wary and yearning to move or backup your password…


Jason Faulkner
Aug 24th, 2011

How Secure are Your Saved Chrome Browser Passwords?

How Secure are Your Saved Chrome Browser Passwords?

A common question about the Google Chrome Browser is “why isn’t there a master password?” Google has (unofficially) taken the position that a master password provides a false sense of security and the most viable form of prot…


Jason Faulkner
Aug 23rd, 2011

  • « Previous
  • 1
  • …
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • …
  • 96
  • Next »

What Causes the "File Downloaded from the Internet" Warning and How Can I Easily Remove It?

What Causes the “File Downloaded from the Internet” Warning and How Can I Easily Remove It?

Whenever you download any file to your hard drive via your browser, Windows automatically flags it as coming from the Internet and potentially dangerous. As a result when you open the respective file, depending on the type, W…


Jason Faulkner
Aug 22nd, 2011

From the Tips Box: Automatic Headphone Volume Adjustment, Compact Windows ReadyBoost, and Secure Phone Charging

From the Tips Box: Automatic Headphone Volume Adjustment, Compact Windows ReadyBoost, and Secure Phone Charging

Once a week we dip into the tips box and share some of the great reader tips that come our way. This week we’re looking at protecting your ears with automatic volume adjustment in Android, a compact way to take advantage of…


Jason Fitzpatrick
Aug 18th, 2011

From the Tips Box: Personal Password Algorithms, Linux/Mac Font Rendering in Windows, and AudioManager for Android

From the Tips Box: Personal Password Algorithms, Linux/Mac Font Rendering in Windows, and AudioManager for Android

Once a week we dip into the tips box and share some of the gems we find there. This week we’re looking at how to easily generate secure passwords with a personal algorithm, upgrade the font rendering in Windows, and manage …


Jason Fitzpatrick
Aug 4th, 2011

Ask HTG: Phantom HDMI Sound Problems, Installing the Stock Android Keyboard, and Network-wide URL Logging

Ask HTG: Phantom HDMI Sound Problems, Installing the Stock Android Keyboard, and Network-wide URL Logging

Each week we dip into our reader mailbag and answer your pressing tech questions. This week we’re looking at an HDMI connection with phantom sound issues, how to install the stock Android keyboard, and how to log URLS visit…


Jason Fitzpatrick
Jul 25th, 2011

How To Secure Your Wi-Fi Network Against Intrusion

How To Secure Your Wi-Fi Network Against Intrusion

Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network….


Jason Fitzpatrick
Jul 19th, 2011

How Secure Are Your Saved Internet Explorer Passwords?

How Secure Are Your Saved Internet Explorer Passwords?

One of the most convenient tools browsers offer is the ability to save and automatically prefill your passwords on login forms. Because so many sites require accounts and it is well known (or should be at least) that using a …


Jason Faulkner
Jul 19th, 2011

Setup SSH on Your Router for Secure Web Access from Anywhere

Setup SSH on Your Router for Secure Web Access from Anywhere

Connecting to the internet from Wi-Fi hotspots, at work, or anywhere else away from home, exposes your data to unnecessary risks. You can easily configure your router to support a secure tunnel and shield your remote browser …


Jason Fitzpatrick
Jul 13th, 2011

The Best How-To Geek Articles for June 2011

The Best How-To Geek Articles for June 2011

June has been a busy month here at How-To Geek where we covered topics like cleaning keyboards, what to do when your e-mail has been compromised, creating high resolution Windows 7 icons, and more. Join us as we look back at …

Akemi Iwaya
Jul 1st, 2011

How To Encrypt Your Cloud-Based Drive with Boxcryptor

How To Encrypt Your Cloud-Based Drive with Boxcryptor

The security debacle at Dropbox last week opened a lot of peoples’ eyes to the need for user-managed encryption for cloud-based storage. Read on to learn how to secure your Dropbox (and other cloud-based files) with Boxcryp…


Jason Fitzpatrick
Jun 28th, 2011

How To Plan, Organize, and Map Out Your Home Network

How To Plan, Organize, and Map Out Your Home Network

Whether you’re setting up a new home network or overhauling the one you’ve got, planning and mapping out your devices and intended uses can save you a lot of headaches.


YatriTrivedi
Jun 28th, 2011

Ask How-To Geek: Unmountable Boot Volumes, Opening Word Files in Works, and Removing Bootloaders

Ask How-To Geek: Unmountable Boot Volumes, Opening Word Files in Works, and Removing Bootloaders

Every week we dip into our mailbag and answer your pressing tech questions. This week we look at unmountable Windows volumes, opening Word files in Works, and removing a haywire bootloader.


Jason Fitzpatrick
Jun 20th, 2011

How To Recover After Your Email Password Is Compromised

How To Recover After Your Email Password Is Compromised

Your friends are reporting spam and pleas for money originating from your email account and some of your logins aren’t working; you’ve been compromised. Read on to see what to do right now and how to protect yourself in t…


Jason Fitzpatrick
Jun 14th, 2011

Create a Persistent, Bootable, and Virtualized Linux USB Drive with LiLi

Create a Persistent, Bootable, and Virtualized Linux USB Drive with LiLi

Live Linux USB drives are often the go-to tool for virus removal and file recovery, but what if you want to install software on your drive without rebooting? Here’s how with the LinuxLive (LiLi) USB Creator….


Justin Garrison
Jun 13th, 2011

How to Encrypt and Delete Your iPhone or iPad Backups

How to Encrypt and Delete Your iPhone or iPad Backups

There was recently a lot of noise in the tech news world about the iPhone and iPad keeping a tracking log of your location, and while that’s now in the past, you might want to consider encrypting your backups anyway. Here’s h…

AlexLayne
May 19th, 2011

Mac OS X Viruses: How to Remove and Prevent the Mac Protector Malware

Mac OS X Viruses: How to Remove and Prevent the Mac Protector Malware

Every Apple fanboy will tell you that Macs are safe from malware, but it’s just not true. Recently a fake AV program has been targeting and infecting OS X computers in the wild. Here’s a quick look at how it works, how to…


Justin Garrison
May 18th, 2011

Sync Encrypted Files with Dropbox and SecretSync

Sync Encrypted Files with Dropbox and SecretSync

Cloud storage is a must have for any geek, and Dropbox is leading the way with its simplicity and affordable prices. With SecretSync you can take full advantage of Dropbox without giving up your privacy by encrypting sensitiv…


Justin Garrison
May 16th, 2011

How To Force Your Browser to Remember Passwords

How To Force Your Browser to Remember Passwords

If you use the password manager built into your browser for remembering all your web logins, or are considering it in light of the recent events with LastPass, you have (or will) inevitably come across certain sites which sim…


Jason Faulkner
May 16th, 2011

Install KeePass Password Safe on Your Ubuntu or Debian-Based Linux System

Install KeePass Password Safe on Your Ubuntu or Debian-Based Linux System

Have you been wanting an easy way to set KeePass Password Safe 2 up on your Linux systems? Then get ready to rejoice. Now you can get that KeePass goodness on your Ubuntu or Debian-Based Linux system using a PPA, the Command …

Akemi Iwaya
May 6th, 2011

Geek Rants: Why the Internet is Like the Wild West

Geek Rants: Why the Internet is Like the Wild West

When we think of the Old West, we remember how wild and dangerous it was and the opportunities it provided. The internet really isn’t much different. Let’s analyze the similarities and consider how we can tame the wild, w…


YatriTrivedi
May 5th, 2011

How to Protect Your Flash Drive Data with TrueCrypt

How to Protect Your Flash Drive Data with TrueCrypt

Just about any self respecting geek always has a flash drive handy. Whether it is on your key ring on in your purse, having the ability to access certain files and utilities anywhere can really come in handy at times. However…


Jason Faulkner
May 3rd, 2011

Locktopus Locks Down Individual Apps on iOS Devices

Locktopus Locks Down Individual Apps on iOS Devices

If you want to share a cool game on your iOS device but not let everyone read your email, Locktopus offers a simple app-by-app lockdown solution.


Jason Fitzpatrick
May 2nd, 2011

What You Said: How You Keep Track of Your Passwords

What You Said: How You Keep Track of Your Passwords

Earlier this week we asked you to share your techniques for managing and organizing your passwords. Now we’re back to highlight the tools, tricks, and tips you use to wrangle your passwords and internet security….


Jason Fitzpatrick
Apr 29th, 2011

How to Harness Technology to Score Amazing Craigslist Deals

How to Harness Technology to Score Amazing Craigslist Deals

Craigslist is a great resource for scoring local deals but only if you’re adept at using it. Today we’re taking a look at tips and  tools you can use to go from being a casual Craigslist user to a deal-scoring ninja….


Jason Fitzpatrick
Apr 19th, 2011

Online Security: Breaking Down the Anatomy of a Phishing Email

Online Security: Breaking Down the Anatomy of a Phishing Email

Don’t think that it’s just your banking details that are important: after all, if someone gains control over your account login they not only know the information contained in that account, but the odds are that same login in…


Jason Faulkner
Apr 13th, 2011

Jailbreak Your Kindle for Dead Simple Screensaver Customization

Jailbreak Your Kindle for Dead Simple Screensaver Customization

If you’re less than delighted with the default screensaver pack on the Kindle relief is just a simple hack and a reboot away. Read on to learn how to apply a painless jailbreak to your Kindle and create custom screensavers….


Jason Fitzpatrick
Apr 11th, 2011

  • « Previous
  • 1
  • …
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • …
  • 96
  • Next »

How to Enable Flashblock in Chrome (And Make it 5000% More Secure)

How to Enable Flashblock in Chrome (And Make it 5000% More Secure)

Most people don’t realize this, but when your PC gets infected from browsing a web site, it’s not usually because of your browser—it’s because of your plugins, like Flash, Java, and others. They are sadly insecure, bu…


Lowell Heddings
Apr 8th, 2011

How to Remove Win 7 Anti-Spyware 2011 (Fake Anti-Virus Infections)

How to Remove Win 7 Anti-Spyware 2011 (Fake Anti-Virus Infections)

If your PC is infected with the Win 7 Anti-Spyware 2011 malware or something similar, you’ve come to the right place, because we’re going to show you how to get rid of it, and free your PC from the awful clutches of this …


Lowell Heddings
Apr 4th, 2011

How to Use SkyDrive’s 25 GB as a Mapped Drive for Easy Access

How to Use SkyDrive’s 25 GB as a Mapped Drive for Easy Access

SkyDrive is an online storage system included in Windows Live, which gives you 25 GB of space that you can sync to your desktop. Here’s how to connect it to your Windows 7 computer as a mapped drive.

Juan Pablo Alonzo
Apr 4th, 2011

Beginner: How To Create a Virtual Machine in Windows 7 Using Virtual PC

Beginner: How To Create a Virtual Machine in Windows 7 Using Virtual PC

Microsoft Virtual PC is a free application that helps you create your own virtual machines inside your current operating system, so you can test software, or learn a new environment easily. Here’s how to get started….

Juan Pablo Alonzo