MakeUseOf

Archive

Page 160

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
amd ryzen intel core i9 boxes on table feature 1
Intel Core i9 vs. AMD Ryzen 9: Which Ultra-Fast CPU Should You Choose?

These CPUs are the peak of computing, but which is the best option?

By 
 1
5 Online Highlighter Extensions to Annotate Web Pages and Save Notes

These free extensions let you highlight text on any web page and save notes, whether privately or to share them with others.

By 
A drawing of a woman pointing to a visa logo 1
What Is Visa+ and How Does It Work?

Visa+ is set to change P2P banking, making payments much easier.

By 
A hand holding a Samsung Galaxy Fold 1
Is It Time for Loyal iPhone Users to Consider Android Phones?

Android phones have improved massively in recent years that even Apple loyalists should consider switching platforms.

By 
qualcomm snapdragon logo feature 1
Every Qualcomm aptX Bluetooth Codec Explained

Why are there so many different aptX codecs?

By 
Image showing the RTX 4070 GPU 1
Nvidia RTX 3070 vs. RTX 4070: Is the Upgrade Worth It?

Should you upgrade from your RTX 3070?

By 
MacBook connected to a mixing board 1
How to Update Logic Pro (and When You Should Avoid Doing So)

Don't be too hasty to update Logic Pro when new versions release.

By 
Excel logo on a background. 1
3 Effective Ways to Use ChatGPT in Excel

Are you curious about how ChatGPT can enhance your Excel experience? Check out these tips for using ChatGPT in Excel.

By 
person soldering compontnets onto a circuit board 1
What Is Solder Paste and What Is It Used For?

Solder paste is a very useful substance for soldering electronics and is fairly easy to use. Here's everything you need to know.

By 
laptop with netflix logo 1
Has Your Netflix Account Been Hacked? What to Do Next

If you're concerned that your Netflix account has been maliciously accessed, here's how to claim back control.

By 
Woman typing on her smartphone 1
Think Your Partner Is Spying on You With Stalkerware? Here's What to Do

Spyware can be used by hackers, or even by loved ones. How can you tell if someone is tracking you? And what can you do about it?

By 
Person using tablet on a yoga mat 1
Can ChatGPT Design Safe and Effective Workout Plans for You?

ChatGPT can provide realistic answers, but can it offer safe, accurate workout advice?

By 
ubuntu user reporting a bug using their system 1
How to Report Bugs in Ubuntu

Make Ubuntu better by filing bug reports for any errors or bugs you encounter while using the distro.

By 
How to Perform an In-Place Upgrade in Windows 11 1
How to Take a Screenshot of UAC Prompts on Windows

UAC will block any attempts to screenshot its dialog boxes, but you can get around this limitation with a handy trick.

By 
Person lying on yellow floor with half red hair and half blonde 1
The 10 Best Picsart Tools You Need to Know About

Picsart has several useful tools to help you create better visual art. Here are some of the must-know ones.

By 
google apps 1
9 Amazing Android Apps by Google That You've Never Heard Of

Google makes a lot of Android apps, and you probably don't know all of them—but you need to know about these.

By 
Home Theatre Setup 1
Start Creating a Perfect Home Theater With These 8 Essentials

Ready to create your own personal home theater? Here are some of the must-have products to help you get started.

By 
The Windows 11 desktop 1
How to Change Desktop Icon Spacing in Windows 11 and 10 

Windows 11 doesn't give you the option to change the desktop's icon spacing, but there is a way to get around this limitation.

By 
The login screen in macOS Ventura showing the list of users 1
How to Set Up Multiple User Accounts on Your Mac

You can add a second user account to your Mac when you want to share it with someone else. Here, we'll guide you through the process.

By 
artificial intelligence coming out of computer 1
What Are Adversarial Attacks Against AI Models and How Can You Stop Them?

AI models are only as good as the data that goes into them. That makes this data a potential target for attacks.

By 
158 159 160 161 162
Page 160 / 4289