Feel free to contact at firstname.lastname@example.org
Chris's Latest Posts
Your Android device can fetch the content you want to view while it’s charging and on Wi-Fi, saving you valuable battery power and mobile data. It’s simpler than you think.
To protect the average user, Windows 8 requires all hardware drivers have a digital signature before you can install them, making it more difficult to install malicious drivers. Hardware drivers have low-level kernel access, so malicious or just badly programmed drivers could cause crashes and open gaping security holes. However, some hardware drivers without digital signatures — […]
Did you know that your photos contain hidden information, including the GPS coordinates of the location they were taken at, the date and time, camera shutter setting details, and possibly even the name of the program you used to edit them? This type of metadata can be useful, but you may want to remove it from your photos before sharing them online. Cameras — both standalone digital cameras and smartphone cameras — add this metadata to the photo when they create it. You can easily view this metadata and erase it.
Windows Explorer — known as File Explorer on Windows 8 — is an application that you probably spend a good amount of time in. Even Windows geeks that avoid using any other Microsoft program tend to use Windows Explorer instead of a third-party file manager. But, while we spend time customizing our browser with extensions, we often don’t think about hacking our file manager. There are a lot of ways you can customize Windows Explorer to make your file management experience faster and more efficient.
Hardware companies target gamers with all kinds of special gaming hardware. There are gaming mice, keyboards, headsets, sound cards, and more. There are now even “gaming routers” — routers specially marketed towards gamers offering an improved online gaming experience. But what exactly do these gaming routers do differently from standard routers, and do their features really matter?
There are so many free services online because companies can profit from the data you provide. Companies like Facebook sell (or buy) your data to third parties, while ones like Google use your data to target ads directly at you. As the saying goes, if you’re not paying for something, you’re the product, not the customer. But if these companies can make money from your data, why can’t you make money from your own data?
Try as it might to be an easy-to-use, simplified operating system, Windows 8 is still Windows at heart. If you’re using Windows 8′s desktop, you’ll still be facing many of the issues you faced on previous versions of Windows. We’ll cover some common problems users will face and how to fix them on Windows 8. Some of these tricks may work on previous versions of Windows, but Windows 8 adds many new tools to help with these sorts of problems. For example, Windows 8 includes a built-in antivirus.
Every day, the sun rises, marches through the sky, and then sets. The world changes with it as people wake up, go about their business, and then rest. But your computer just sits there all day, only acknowledging the change in time by updating its clock. There are a variety of third-party tools for Windows that can automatically adjust your computer’s settings as the day goes on, from changing your screen’s color temperature to setting desktop wallpapers, tweaking sound levels, and blocking websites.
Windows is moving towards a more locked-down direction with Windows 8 and its Start screen and “Modern” app environment. There’s no denying this — you can’t even set a custom Start screen background without installing a third-party utility. Luckily, Windows hasn’t completely shed its legacy of customizability, yet. There are many different hacks you can perform with the Start screen, although most of them should have been included with Windows 8 itself. This article reveals them all.
Android smartphones fill up over time with apps, photos, media, and even leftover app data. Worse yet, if your smartphone is nearly full, the write performance of its flash memory will decrease, slowing everything down. Luckily, cleaning up your smartphone and freeing up files should be fairly easy: You can do this all yourself with tools built into Android, no extra apps needed. The steps here were written for Android 4.3 on a Nexus 4 and should be very similar on devices running Android 4.0 and newer.
Google’s Chromebooks are surprisingly good laptops. They’re cheap — only $249 for what’s probably the best one at the moment — lightweight, portable, and quick-to-boot. They may not be the ideal computer for a PC gamer or heavy-duty desktop software user, but they can be great portable web browsers to drag to class. Chromebooks have […]
“If you knew what I know about email, you might not use it either,” said the owner of secure email service Lavabit as he recently shut it down. “There is no way to do encrypted e-mail where the content is protected,” said Phil Zimmermann as he suddenly shut down Silent Circle’s secure email service. The reality is that email is fundamentally insecure and can never be protected from government surveillance in the same way some other communications can.
Remember how everyone used to have an MP3 player? In the days before the iPhone, MP3 players were a must-have item. Smartphones have eaten into MP3 player sales over the years — why purchase a separate device when you have a smartphone in your pocket with a built-in MP3 player? Well, you might want to buy one for several reasons — MP3 players aren’t obsolete just yet.
Windows RT is the locked-down version of Windows 8 for ARM computers, as seen on Microsoft’s Surface RT tablet and other Windows RT devices. Windows RT doesn’t allow you to install your own desktop programs. You’re limited to the included desktop programs written by Microsoft or Modern apps from the Windows Store. However, there are ways to jailbreak your Windows RT device and run unapproved software on the desktop. These tricks are for the geeks who want to make their Surface do more than what it was designed to do.
Like HTTP, which your browser uses to communicate with websites, BitTorrent is just a protocol. You could use your browser to download pirated content, just as you could use a BitTorrent client to download pirated content, but that isn’t the only possible use. Sure, let’s face it — BitTorrent is probably primarily used for downloading unauthorized content. But that’s far from its only use, and the protocol still has a lot of value to people who don’t pirate.