Simon Batt
Section Editor for Windows
807 articles published since February 25, 2009
Page 39
About Simon Batt
Simon is a Computer Science BSc graduate who has been writing about technology since 2014, and using Windows machines since 3.1. After working for an indie game studio, he found his passion for writing and decided to use his skill set to write about all things tech.
The Minecraft Command Blocks Guide
Learn what a Minecraft command block is, how to get a Minecraft command block, and how to use Minecraft command blocks.
What Is Tor and How Does Onion Routing Protect Privacy?
Heard about onion routing but don't get how it keeps your browsing private? Here's how onion routing and the Tor network works.
How Artificial Intelligence Will Shape the Future of Malware
As artificially intelligent malware arrives, your antivirus software could become obsolete. How does AI malware work?
Why Ethical Hacking Is Legal and Why We Need It
Ethical hacking is a way to combat the security risks posed by cybercrime. Is ethical hacking legal? Why do we even need it?
5 PC Games You Can Continue Playing on Mobile
Here's a short list of PC games you can continue playing on mobile, giving you the best of both worlds.
7 Great Mobile Games With One-Time Purchases
If you hate seeing ads and neverending IAPs, here are some great mobile games which offer one-time purchases.
8 Shocking Online Accounts Sold on the Dark Web
You've probably heard that your data can be bought and sold on the dark web by hackers. But it's more than just email accounts.
The 3 Best Free Apps for Syncing Android Contact Photos With Facebook
Need to sync your phone contacts with the Android Facebook app? Try these apps to sync Facebook photos with Android contacts.
4 Ways to Block SMS Spam Text Messages on Android
Here's how to stop spam SMS messages using Android apps that block unwanted text messages.
10 Pieces of Information That Are Used to Steal Your Identity
Identity theft can be costly. Here are the 10 pieces of information you need to protect so your identity isn't stolen.
What Is WEP Wi-Fi Encryption? Here's Why You Should NOT Use It
Here's why WEP encryption just isn't good enough and why you should stop using it on your wireless routers at home.
LTE vs. 4G vs. 5G: What's the Difference?
Should your next phone be LTE or 4G? Maybe 5G? Learn which mobile broadband is fastest and compare LTE. vs 4G. vs 5G.
How to Spot If Gmail Has Been Hacked and What to Do Next
Strange activity in Gmail can be an indicator you've been hacked. But once you've spotted it, how do you secure a Gmail account?
What Is "Do Not Track" and Does It Protect Your Privacy?
Does enabling "Do Not Track" in your browser really protect your privacy, or does it simply provide a false sense of security?
Do Gold HDMI Cables Produce Better Picture Quality?
Tempted to pay extra for gold-plated HDMI cables? Learn more about whether gold HDMI cables really have better picture quality.
The 5 Best 100 Dollar Laptops in 2019
If you're looking for a low cost laptop that won't break the bank, then one of these 100 dollar laptops may just be right for you.
What Is Password Spraying and How Can It Be Used Against You?
What is password spraying and how is it used to hack your accounts? Here's how cybercriminals hedge their bets by targeting you.
What Is a Keylogger? How Your Keyboard Can Betray You
Hackers can see what you type into your computer---account names, passwords, and even bank details---thanks to keyloggers.
5 Ways to Safely Test Your Antivirus Software
Is your antivirus software secure and effective? Here's how to test it and see for yourself.
How to Use the Snapchat Map AKA Snap Map
Here's how to get to and use the Snapchat Map (AKA Snap Map) and make the most of this fun Snapchat feature.