Search Results

Search found 5330 results on 214 pages for 'geek history'.

Page 116/214 | < Previous Page | 112 113 114 115 116 117 118 119 120 121 122 123  | Next Page >

  • Leaked Gmail for Android Version 4.2 Features Pinch-to-Zoom and Swipe-to-Delete [Video]

    - by Jason Fitzpatrick
    If you love keeping an eye at what’s around the corner, this video showcases some of the new features in Gmail for Android–there’s even an APK for those adventurous readers who want to try it. Courtesy of AndroidPolice, we’re treated to the above video showcasing Gmail for Android’s new look and features–including pinch-to-zoom and a swipe-to-delete (or archive), similar to the notification dismissal in Android Jelly Bean. If you’re up for a little unofficial app installation, you can even hit up the link below to check out the full writeup and grab a copy of the unofficial installer. Exclusive: Upcoming Gmail For Android 4.2 Will Finally Have Pinch-To-Zoom, Swipeaway Delete/Archive [AndroidZoom] HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference How To Troubleshoot Internet Connection Problems

    Read the article

  • Redbull Stratos Jump in LEGO [Video]

    - by Jason Fitzpatrick
    Last weekend Felix Baumgartner skydived from the edge of space; it was only a matter of (very brief) time before someone rendered the event in LEGO. [via Neatorama] Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference

    Read the article

  • How To Easily Send Emails From The Windows Task Scheduler

    - by Chris Hoffman
    The Windows Task Scheduler can automatically send email at a specific time or in response to a specific event, but its integrated email feature won’t work very well for most users. Instead of using the Task Scheduler’s email feature to send emails, you can use the SendEmail utility. It allows you to construct a single-line command that authenticates with an SMTP server and sends an email. How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • How to Change the Window Border Size in Windows 8

    - by Chris Hoffman
    The window borders on Windows 8’s desktop are fairly thick by default, but they don’t have to be – you can customize the side of the window borders with an easy-to-use application or a quick registry tweak. You can shrink the window borders and make them fairly thin, just as they were on previous versions of Windows. Or you can increase the window border size and make them extremely thick, if you prefer.. HTG Explains: Does Your Android Phone Need an Antivirus? How To Use USB Drives With the Nexus 7 and Other Android Devices Why Does 64-Bit Windows Need a Separate “Program Files (x86)” Folder?

    Read the article

  • Secure Your Wireless Router: 8 Things You Can Do Right Now

    - by Chris Hoffman
    A security researcher recently discovered a backdoor in many D-Link routers, allowing anyone to access the router without knowing the username or password. This isn’t the first router security issue and won’t be the last. To protect yourself, you should ensure that your router is configured securely. This is about more than just enabling Wi-Fi encryption and not hosting an open Wi-Fi network. Disable Remote Access Routers offer a web interface, allowing you to configure them through a browser. The router runs a web server and makes this web page available when you’re on the router’s local network. However, most routers offer a “remote access” feature that allows you to access this web interface from anywhere in the world. Even if you set a username and password, if you have a D-Link router affected by this vulnerability, anyone would be able to log in without any credentials. If you have remote access disabled, you’d be safe from people remotely accessing your router and tampering with it. To do this, open your router’s web interface and look for the “Remote Access,” “Remote Administration,” or “Remote Management” feature. Ensure it’s disabled — it should be disabled by default on most routers, but it’s good to check. Update the Firmware Like our operating systems, web browsers, and every other piece of software we use, router software isn’t perfect. The router’s firmware — essentially the software running on the router — may have security flaws. Router manufacturers may release firmware updates that fix such security holes, although they quickly discontinue support for most routers and move on to the next models. Unfortunately, most routers don’t have an auto-update feature like Windows and our web browsers do — you have to check your router manufacturer’s website for a firmware update and install it manually via the router’s web interface. Check to be sure your router has the latest available firmware installed. Change Default Login Credentials Many routers have default login credentials that are fairly obvious, such as the password “admin”. If someone gained access to your router’s web interface through some sort of vulnerability or just by logging onto your Wi-Fi network, it would be easy to log in and tamper with the router’s settings. To avoid this, change the router’s password to a non-default password that an attacker couldn’t easily guess. Some routers even allow you to change the username you use to log into your router. Lock Down Wi-Fi Access If someone gains access to your Wi-Fi network, they could attempt to tamper with your router — or just do other bad things like snoop on your local file shares or use your connection to downloaded copyrighted content and get you in trouble. Running an open Wi-Fi network can be dangerous. To prevent this, ensure your router’s Wi-Fi is secure. This is pretty simple: Set it to use WPA2 encryption and use a reasonably secure passphrase. Don’t use the weaker WEP encryption or set an obvious passphrase like “password”. Disable UPnP A variety of UPnP flaws have been found in consumer routers. Tens of millions of consumer routers respond to UPnP requests from the Internet, allowing attackers on the Internet to remotely configure your router. Flash applets in your browser could use UPnP to open ports, making your computer more vulnerable. UPnP is fairly insecure for a variety of reasons. To avoid UPnP-based problems, disable UPnP on your router via its web interface. If you use software that needs ports forwarded — such as a BitTorrent client, game server, or communications program — you’ll have to forward ports on your router without relying on UPnP. Log Out of the Router’s Web Interface When You’re Done Configuring It Cross site scripting (XSS) flaws have been found in some routers. A router with such an XSS flaw could be controlled by a malicious web page, allowing the web page to configure settings while you’re logged in. If your router is using its default username and password, it would be easy for the malicious web page to gain access. Even if you changed your router’s password, it would be theoretically possible for a website to use your logged-in session to access your router and modify its settings. To prevent this, just log out of your router when you’re done configuring it — if you can’t do that, you may want to clear your browser cookies. This isn’t something to be too paranoid about, but logging out of your router when you’re done using it is a quick and easy thing to do. Change the Router’s Local IP Address If you’re really paranoid, you may be able to change your router’s local IP address. For example, if its default address is 192.168.0.1, you could change it to 192.168.0.150. If the router itself were vulnerable and some sort of malicious script in your web browser attempted to exploit a cross site scripting vulnerability, accessing known-vulnerable routers at their local IP address and tampering with them, the attack would fail. This step isn’t completely necessary, especially since it wouldn’t protect against local attackers — if someone were on your network or software was running on your PC, they’d be able to determine your router’s IP address and connect to it. Install Third-Party Firmwares If you’re really worried about security, you could also install a third-party firmware such as DD-WRT or OpenWRT. You won’t find obscure back doors added by the router’s manufacturer in these alternative firmwares. Consumer routers are shaping up to be a perfect storm of security problems — they’re not automatically updated with new security patches, they’re connected directly to the Internet, manufacturers quickly stop supporting them, and many consumer routers seem to be full of bad code that leads to UPnP exploits and easy-to-exploit backdoors. It’s smart to take some basic precautions. Image Credit: Nuscreen on Flickr     

    Read the article

  • How to Print From Metro Apps in Windows 8

    - by Taylor Gibb
    Printing has become an application aware feature in Metro applications. This makes the outcome of a print job different from application to application, but the question remains, how do you print? Using the Keyboard Not all apps support printing in Windows 8, a good example of one that does is Mail. So fire up the default Mail app select an email you want to print. When you are ready, go ahead and press the ctrl + P keyboard combination. This will bring up a list of available print devices on the right-hand side, you can use the up and down arrows to select a printer. You will get most of the options you are use to when printing, so once you have set up your preferences go ahead and hit the print button. Using the Mouse If you would rather use your mouse, move it to the bottom right hand corner of your screen, which will bring up the Charms bar, from here you will need to click on the devices charm. Using this will list your printers as well as other devices, so make sure you select a printer. That’s all there is to it. How To Switch Webmail Providers Without Losing All Your Email How To Force Windows Applications to Use a Specific CPU HTG Explains: Is UPnP a Security Risk?

    Read the article

  • Image Collector Rips Web Page Images to Your Dropbox Account

    - by Jason Fitzpatrick
    Chrome: Image Collector is a simple Chrome extension that rips the images on the page you’re visiting to your Dropbox (or Google Drive) accounts. Just click the icon, uncheck any images you don’t want it to download, and click save. You can, technically, modify the script to download the images directly to your hard drive, but modifying it was a bit of a hassle and the default save-to-Dropbox action is so smooth we saw little reason to do so. Hit up the link below to grab a free copy. Image Collector [via Freeware Genuis] How to Make Your Laptop Choose a Wired Connection Instead of Wireless HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me?

    Read the article

  • How To Use The Search Feature in Almost any App on Windows 8

    - by Taylor Gibb
    Searching in Windows 8 has changed significantly, in fact at first you might think that all most Metro apps “lack” a search function altogether. Read on to find out how you can use the search feature in almost any app in Windows 8. HTG Explains: How Windows Uses The Task Scheduler for System Tasks HTG Explains: Why Do Hard Drives Show the Wrong Capacity in Windows? Java is Insecure and Awful, It’s Time to Disable It, and Here’s How

    Read the article

  • The Dangers of Vertical Video; A Public Service Announcement [Video]

    - by Jason Fitzpatrick
    According to the puppets in this tongue-in-cheek PSA, you’d better start shooting your video in the right orientation or very bad things–potentially involving George Lucas–will come to pass. [via Mashable] HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux Hack Your Kindle for Easy Font Customization

    Read the article

  • How to Quickly Resize, Convert & Modify Images from the Linux Terminal

    - by Chris Hoffman
    ImageMagick is a suite of command-line utilities for modifying and working with images. ImageMagick can quickly perform operations on an image from a terminal, perform batch processing of many images, or be integrated into a bash script. ImageMagick can perform a wide variety of operations. This guide will introduce you to ImageMagick’s syntax and basic operations and show you how to combine operations and perform batch processing of many images. The HTG Guide to Hiding Your Data in a TrueCrypt Hidden Volume Make Your Own Windows 8 Start Button with Zero Memory Usage Reader Request: How To Repair Blurry Photos

    Read the article

  • Launch the Desktop Version of IE from the Windows 8 Start Screen

    - by Taylor Gibb
    There are two versions of Internet Explorer in Windows 8, one you can only launch from the Start Screen and the Desktop version which you can only launch from the Desktop. Lets look at how we can launch the Desktop version from the Start Screen. To get started you need to create a shortcut, so right-click on the desktop, and choose New –>  Shortcut. When you are asked for the location of the item, type the following: How to Stress Test the Hard Drives in Your PC or Server How To Customize Your Android Lock Screen with WidgetLocker The Best Free Portable Apps for Your Flash Drive Toolkit

    Read the article

  • Paramount Pictures Movies Dynamic Theme for Windows 7

    - by Asian Angel
    Would you like to have all of the latest movie wallpapers from Paramount Pictures delivered straight to your desktop? Then this is the theme you are looking for. This dynamic RSS-fed theme brings you the latest wallpapers from movies such as Thor, True Grit, Kung Fu Panda 2, Super 8, and Transformers 3. Download the Paramount Pictures Movies Dynamic Theme [Windows 7 Personalization Gallery] You can learn more about Microsoft’s dynamic themes here: RSS-fed dynamic themes FAQ How To Easily Access Your Home Network From Anywhere With DDNSHow To Recover After Your Email Password Is CompromisedHow to Clean Your Filthy Keyboard in the Dishwasher (Without Ruining it)

    Read the article

  • Force Your Mac to Sort Folders on Top of Files (Windows Style)

    - by Eric Z Goodnight
    Even die-hard Mac converts have their issues with Mac OS, and one of those problems is that OS X lists folders mixed in with all other files. Here’s how to fix that in under five minutes with a clever hack. You know you’ve had that issue. You’ve dug through your files looking for that one elusive folder, and because it’s jumbled in with all the other stuff, it’s more or less impossible to find. Have no fear, with no downloads or silly plug-in software, you can finally make Mac OS behave like Windows and Linux and list those folders in the proper order.  How To Encrypt Your Cloud-Based Drive with BoxcryptorHTG Explains: Photography with Film-Based CamerasHow to Clean Your Dirty Smartphone (Without Breaking Something)

    Read the article

  • 100+ Science Fiction Movies Supercut [Video]

    - by Asian Angel
    If you were looking for inspiration for a weekend sci-fi movie watching marathon, then this awesome supercut video of 100+ sci-fi movies is the perfect place to start! Now all you need is a nice tub of popcorn to round things out… Science Fiction: A Supercut (Glitch Mob remix “Monday”) [via Geeks are Sexy] Why Does 64-Bit Windows Need a Separate “Program Files (x86)” Folder? Why Your Android Phone Isn’t Getting Operating System Updates and What You Can Do About It How To Delete, Move, or Rename Locked Files in Windows

    Read the article

  • HTG Explains: How System Restore Works in Windows

    - by Chris Hoffman
    System Restore is a Windows feature that can help fix some crashes and other computer problems. To know when to use it, you’ll have to understand just how System Restore works. System Restore can’t solve every problem – for example, you can’t use it to restore your personal files if they’re accidentally deleted or modified. However, it’s another tool you can use when your computer isn’t working properly. HTG Explains: How Antivirus Software Works HTG Explains: Why Deleted Files Can Be Recovered and How You Can Prevent It HTG Explains: What Are the Sys Rq, Scroll Lock, and Pause/Break Keys on My Keyboard?

    Read the article

  • How To Enable 3D Acceleration and Use Windows Aero in VirtualBox

    - by Chris Hoffman
    VirtualBox’s experimental 3D acceleration allows you to use Windows 7’s Aero interface in a virtual machine. You can also run older 3D games in a virtual machine – newer ones probably won’t run very well. If you installed Windows 7 in VirtualBox, you may have been disappointed to see the Windows 7 Basic interface instead of Aero – but you can enable Aero with a few quick tweaks. How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • What Are the Windows A: and B: Drives Used For?

    - by Jason Fitzpatrick
    The C: drive is the default installation location for Windows, if you have a CD/DVD drive on your machine it’s likely the D: drive, and any additional drives fall in line after that. What about the A: and B: drives? Image by Michael Holley. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. HTG Explains: What is DNS? How To Switch Webmail Providers Without Losing All Your Email How To Force Windows Applications to Use a Specific CPU

    Read the article

  • How to Access Metro Apps from Windows Explorer in Windows 8

    - by Taylor Gibb
    Windows 8 comes with its new Metro Start Screen, which makes it easy to launch your Metro apps from that screen, but did you know you can access them from Windows Explorer too? Here’s how to do it. To get started you need to create a shortcut, so right-click on the desktop, and choose New –>  Shortcut. When you are asked for the location of the item, use the following: The HTG Guide to Hiding Your Data in a TrueCrypt Hidden Volume Make Your Own Windows 8 Start Button with Zero Memory Usage Reader Request: How To Repair Blurry Photos

    Read the article

  • YouTube Releases Native Wii App

    - by Jason Fitzpatrick
    Watching YouTube videos on the Wii just got a whole lot easier; YouTube’s native Wii app streamlines the process and cuts out the need for the Internet Channel browser. Previous to this release you had to use the $5 Internet Channel and the Opera Browser to access YouTube. It worked but it wasn’t elegant by any means. The new YouTube Wii app sports a clean interface, simple Wiimote-based controls, and all the great YouTube content you can handle. The app is free but currently U.S. only. According to the press release, the app will be rolled out to other countries in the coming months. YouTube App Now on Nintendo Wii in the U.S. [YouTube] How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • The Best Free RSS Readers for Keeping Up With Your Favorite Websites

    - by Lori Kaufman
    RSS stands for “Really Simple Syndication” or “Rich Site Summary.” It’s a document specification that allows you to easily collect and organize web-based news and information from websites. RSS reader applications allow you to follow your favorite websites without having to visit each one separately. For more information about RSS, see our article defining RSS and describing how you can benefit from using it. We’ve collected some links to good desktop and web-based, free RSS applications. 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

  • How To Install and Use ADB, the Android Debug Bridge Utility

    - by Chris Hoffman
    ADB, Android Debug Bridge, is a command-line utility included with Google’s Android SDK. ADB can control your device over USB from a computer, copy files back and forth, install and uninstall apps, run shell commands, and more. We’ve covered some other tricks that require ADB in the past, including backing up and restoring your smartphone or tablet and installing Android apps to your SD card by default. ADB is used for a variety of geeky Android tricks. Image Credit: LAI Ryanne on Flickr HTG Explains: How Antivirus Software Works HTG Explains: Why Deleted Files Can Be Recovered and How You Can Prevent It HTG Explains: What Are the Sys Rq, Scroll Lock, and Pause/Break Keys on My Keyboard?

    Read the article

  • How to Make a 9 Layer Density Column [Video]

    - by Jason Fitzpatrick
    Density columns, layers of varying density liquid in a glass cylinder, are nothing new in the world of science demonstrations, but this nine layer one with seven floating objects is something to see. Courtesy of Steve Spangler Science, the experiment goes above and beyond the traditional five layer column by adding another four layers and sinking objects of varying density into the column. The end result is a colorful demonstration of the varying densities of liquids and solids. [via Boing Boing] How To Get a Better Wireless Signal and Reduce Wireless Network Interference How To Troubleshoot Internet Connection Problems 7 Ways To Free Up Hard Disk Space On Windows

    Read the article

  • Warm Up Your Desktop with the Caribbean Shores Theme for Windows 7 & 8

    - by Asian Angel
    Are you in the mood for some tropical scenery? Then enjoy a view of quiet coves, clear water, palm trees, and gently rolling surf with the Caribbean Shores Theme for Windows 7 and 8. The theme comes with twelve awesome images to provide the perfect relaxing environment on your desktop. Download the Caribbean Shores Theme [Windows 7 & 8 Personalization Gallery] Why Does 64-Bit Windows Need a Separate “Program Files (x86)” Folder? Why Your Android Phone Isn’t Getting Operating System Updates and What You Can Do About It How To Delete, Move, or Rename Locked Files in Windows

    Read the article

  • How to Sync Files Between Computers Without Storing Them in the Cloud

    - by Chris Hoffman
    So you have multiple computers and you want to keep your files in sync, but you don’t want to store them on someone else’s servers. You’ll want a service that synchronizes files directly between your computers. With such a service, you can synchronize an unlimited amount of files and people can’t gain access to your files just by gaining access to an account on a server and viewing the files via the web interface. We’re focused on syncing files over the network here — either over a local network or the Internet. We’re looking for Dropbox-style solutions that don’t store files on a central server like Dropbox does.    

    Read the article

  • How To Run Two Windows 8 Apps At the Same Time With the Snap Feature

    - by Chris Hoffman
    Windows 8’s Modern interface includes support for running two Windows 8 apps side-by-side. This feature, named “Snap,” isn’t explained in the tutorial – you’ll have to know it exists to make use of it. While the multitasking may be limited compared to Windows desktop multitasking, it’s more flexible than iPad and Android tablets, which can only have a single app on the screen at a time. Note: Snap only works on monitors that are at least 1366 pixels wide. 6 Start Menu Replacements for Windows 8 What Is the Purpose of the “Do Not Cover This Hole” Hole on Hard Drives? How To Log Into The Desktop, Add a Start Menu, and Disable Hot Corners in Windows 8

    Read the article

< Previous Page | 112 113 114 115 116 117 118 119 120 121 122 123  | Next Page >