MakeUseOf

Christian Cawley-Deputy Editor

Christian Cawley

Deputy Editor

Page 65

About Christian Cawley

Deputy Editor for Security, Linux, DIY, Programming, and Tech Explained, Christian has extensive experience in desktop and software support, and has been published in Computer Weekly, Linux Format, Tech Radar, ad ComputerActive.

Christian also produces MakeUseOf's weekly show, the Really Useful Podcast.

His current passions are his cigar box guitar, his retro gaming site (www.gamingretro.co.uk) and his family.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
bond-gadgets 1
Survival Technology
The Best Bond Gadgets Of All Time

James Bonds gadgets are legendary. In this article, we run down some of the most futuristic gadgets from the films, and see how they stand up in the era of the iWatch.

router-vulnerable 1
Does Your Default Router Configuration Make You Vulnerable to Hackers & Scammers?

Routers rarely arrive in a secure state, but even if you have taken the time to configure your wireless (or wired) router correctly, it can still prove to be the weak link.

 1
The Best Ways to Sell Books Online

There are many ways to buy books online. But just how do you go about selling them? And is it possible to get a rare or unusual book to sell for the right price?

 1
Why NordVPN Should Be Your VPN Solution [15 1-Year Accounts + iPhone 6 Giveaway]

NordVPN is generously sponsoring 15 NordVPN accounts valid for one year, and for one special reader: a brand new iPhone 6 with free lifetime NordVPN access. Prizes are valued at close to $4,000!

backup-android 1
How to Backup Photos from a Mobile Device

It's never fun when your phone breaks and you lose all your photos -- but that never has to happen again! Learn how to backup your photos quickly and easily.

android-mod-gaming 1
Game Mods
How to Mod Your Android Device for Better Gaming

To get the best performance out of your Android device, you need these tweaks!

 1
SuperFREAK: New Security Bug Vulnerablity Affects Desktop & Mobile Browser Security

The FREAK vulnerability is one that affects your browser, and it isn't limited to any one browser, nor any single operating system. Find out whether you're affected and protect yourself.

 1
Could These NSA Cyber-Espionage Techniques Be Used Against You?

If the NSA can track you – and we know it can – so can cybercriminals. Here's how government-made tools will be used against you later.

 1
How to Easily Remove A Browser Redirect Virus

You ran a search in Google, but somehow, for some reason, you didn't get the result you wanted after clicking a link. You're got a redirect virus; here's how to get rid of it.

android-emulate 1
How to Emulate Android and Run Android Apps on Your PC

It's actually pretty easy to get Android apps running on your desktop or laptop! Here, we step you through the best methods.

geofencing-privacy 1
How You Can Use Geofencing to Improve Your Privacy & Security

Geofencing uses GPS to define geographical boundaries, and can prove very useful in managing your personal security.

ebook-reader 1
Why EBooks Are Recording Information About Your Reading Habits

Your reading activity can be monitored, recorded and even shared with government security agencies.

restore-recovery-partition 1
How to Restore a Deleted Recovery Partition in Windows 8

At the time, that extra storage space must have been very tempting. But now you need a recovery partition. We'll show you how to restore it.

 1
Will Facebook's New Flagging Feature Stifle Freedom of Speech?

Introduced ostensibly to help Facebook remove fake news stories, thereby stopping such a post going viral, it turns out that the new flagging feature is open to abuse.

 1
DIY
5 Things You Can't Do With Raspberry Pi 2

With a quad core CPU and boasts of being able to run Windows 10 – is the Raspberry Pi 2 really all that? Here's 5 things the Raspberry Pi 2 still can't do.

microsoft-mail-account 1
Why You Can’t Access Your Locked Microsoft Account

We attempt to help you to work out why your attempts to unlock your Microsoft account have failed.

 1
10 Best Tools & Resources For Researching Information Security Jobs

Switching careers is never easy, so we’ve compiled a handy list of resources to help you find, and win, that information security role you’ve been chasing.

lenovo-superfish 1
Lenovo Laptop Owners Beware: Your Device May Have Preinstalled Malware

Chinese computer manufacturer Lenovo has admitted that laptops shipped to stores and consumers in late 2014 had malware preinstalled.

 1
Keep Out Prying Eyes With A Computer Privacy Screen

Are your co-workers paying too much attention to your display? A privacy screen can help – here are your options.

windows-8-soundboard 1
Make a Noise with Soundboard Apps for Windows 8

Play a funny noise, a popular quote, or any custom audio with the click of a button. Choose from a library of audio files or create your own custom soundboard.

63 64 65 66 67
Page 65 / 87