Newsletter Editor and Linux Enthusiast
Feel free to contact at email@example.com
Danny's Latest Posts
Ever since Instagram was introduced on iOS, people have been easily adding filters to their images to make them look better, or cooler, or any other adjective you can think of. The only downside to Instagram is that it is only for iOS and Android devices, so it cannot be used while you’re on your desktop, laptop, or other daily driver. What can you possibly use instead?
For quite a while now, Linux users have constantly been discussing whether the open source operating system will ever experience a “year of the desktop” where Linux’s desktop market share suddenly rises in relatively dramatic fashion. What are the actual chances of it happening, or can you even call it the “year of the desktop”?
Popular Linux distributions make it pretty easy to encrypt your home folder or even entire partitions if you’d like, without many issues. This is a great option to have if you’re someone who needs their data, whether it’s the home folder or entire partitions, that need to be encrypted. In most cases, all you need to do is select a check mark, and it’ll take care of the rest.
Linux systems are so ridiculously flexible and configurable, it’s downright crazy. A huge part of why Linux is so flexible is because of its modular structure. Every single system component and program is split up into many different packages that can easily be removed, added, or replaced by something else. Absolutely no part of the operating system has an exception to that rule, including the Linux kernel itself.
No operating system will have support for every single piece of hardware out of the box, and it’s important to know which ones have that support. There’s always a driver for that piece of Windows hardware, but with Linux, you do not have that guarantee, so the overall hardware support is smaller. You can figure out, however, which pieces of hardware do have Linux support by checking hardware databases.
If you’re using a Linux distribution like Ubuntu or Fedora, you’re also using the Linux kernel, the core that actually makes your distribution a Linux distribution. Your distribution constantly asks you to update your kernel. Why should you do this when it’s been running just fine?
Just a little over a week ago, a lot of news was made in the world of personal cloud storage, where Dropbox added more sharing features, SkyDrive introduced their new synchronization application for desktops, and Google Drive was unveiled. Soon after, plenty of new comparisons were made between the different services. However, despite the “Big Three” being the most discussed, there may be some worthy services that are being left out.
Whether you like to admit it or not, we all make heavy use of our computer’s spell checker. They save us from all sorts of typos and downright horrible spelling. Thankfully, more powerful software such as Microsoft Word also includes a decent grammar checker to make sure that your sentences also make sense, and aren’t just spelled right. Life is great until you come to the browser.
Being able to customize just about anything in whatever way you please is one of the great perks of owning an Android phone. Not only can you replace entire pieces such as your home launcher, but you can also add new lock methods to protect your phone from prying eyes. But what could be better than PINs or lock combinations?
We all love our browsers, and we all love the extensions that you can install with them. We love browser extensions because they allow us to do what we want our browser to do that it couldn’t do before. But, as you install more and more extensions that you find useful, you’ll soon start to encounter some consequences of doing so. Here’s 3 scenarios.
IE6 was the best of the best when it came freshly squeezed out of Microsoft’s software factory. Because of that it was able to achieve the record 95% browser market share at the height of IE’s reign. It could do things other browsers couldn’t, and it was right there in the operating system. The user didn’t have to do a thing. But that was then…
New technologies are constantly being created in order to increase security, and many of those technologies eventually go away because of loopholes and other issues that are eventually discovered. No form of security is exempt from this, including any kind of security that involves transfer of communications. Or at least that’s what the status quo currently is.
What do you do when you need a PDF but your scanner and the software that comes with it only gives you images? Hexonic ScanToPDF can take care of those problems quickly and easily. The great thing about this program is that it almost does a direct conversion from an image format to a PDF.
No matter what most Americans might have to say, soccer is still the most popular sport in the world. With popular sports come popular games, especially for mobile devices. But before you go out into the Play Store and look at the rather large selection of soccer games, which ones are worth trying out? Why not try out Pocket Soccer for your Android device?
Every now and then, we hear something in the news about hackers taking down sites, exploit a multitude of programs, or threatening to wiggle their way into high-security areas where they shouldn’t belong. But, if you think about it, what actually constitutes being called a hacker? Are all hackers evil and out to get us?