Search Results

Search found 2710 results on 109 pages for 'the journeyman geek'.

Page 96/109 | < Previous Page | 92 93 94 95 96 97 98 99 100 101 102 103  | Next Page >

  • How To Create Your Own Custom Google Search Engine

    - by Chris Hoffman
    Have you ever wanted to create a custom Google search engine that searches only specific websites? You can easily do this with Google’s Custom Search Engine tool. You can bookmark your search engine and even share it with other people. This trick works similarly to Google’s site: operator, but you won’t have to type the operator every time you search. It’s particularly useful if you want to search a large number of sites at once. How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • How to Make Windows 8 Index Encrypted Files

    - by Taylor Gibb
    If you have files that are encrypted with the Encrypting File System, you will probably have noticed that they don’t get indexed by Windows, and therefore don’t show up in search results. Here’s how to fix that. 6 Start Menu Replacements for Windows 8 What Is the Purpose of the “Do Not Cover This Hole” Hole on Hard Drives? How To Log Into The Desktop, Add a Start Menu, and Disable Hot Corners in Windows 8

    Read the article

  • How to Disable Compatibility Mode in Internet Explorer

    - by Taylor Gibb
    Compatibility mode in IE is a feature that helps you view webpages that were designed for previous versions of the browser, however having it enabled can break newer sites that were designed for modern browsers. Here’s how to disable it and make sure it only runs for older sites. 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

  • Recycle Bottles for DIY Projects [Video]

    - by Jason Fitzpatrick
    Rather than tossing bottles in the recycle bin with this simple hack and a little elbow grease you can recycle them into new containers like drinking cups and vases. In the above video Matt Richardson from Make magazine shows us how to use an inexpensive bottle cutting jig to recycle bottle into new things. With a little polishing you can drink more than beer out of your favorite beer bottles. Watch the video above to see how and hit up the link below for more information. How-To: Bottle Cutting [Make] What is a Histogram, and How Can I Use it to Improve My Photos?How To Easily Access Your Home Network From Anywhere With DDNSHow To Recover After Your Email Password Is Compromised

    Read the article

  • Finding the Best Spot in the Microwave [Video]

    - by Jason Fitzpatrick
    Where’s the best spot in the Microwave? In this video we see a neat hands-on demonstration with some LED lights that shows just how the microwave beam in your microwave works. In the above video from Smarter Ever Day they visit the National Electronics Museum and get a first person look at how microwaves work and why nearly every microwave you’ll ever own has a turn table. Best Spot in the Microwave? [YouTube] How to Make and Install an Electric Outlet in a Cabinet or DeskHow To Recover After Your Email Password Is CompromisedHow to Clean Your Filthy Keyboard in the Dishwasher (Without Ruining it)

    Read the article

  • The Best Websites for Listening to Podcasts and Learning How to Create Your Own

    - by Lori Kaufman
    Podcasts, or webcasts, are shows about many different topics that are broadcast over the web and broken up into parts, or episodes.  You subscribe to podcasts and new episodes are automatically delivered to you as they are released. We’ve collected the best websites for finding many different types of webcasts and for finding resources to help you in creating and producing your own podcasts. In the coming weeks, we will be publishing other articles about the best websites for educating and entertaining yourself online, such as sites for eBooks, audiobooks, movies and TV shows, documentaries, user-made videos, free online courses, news and information, and music (downloads, streaming, and radio). How to Make Your Laptop Choose a Wired Connection Instead of Wireless HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me?

    Read the article

  • Desktop Fun: Waterfalls Wallpaper Collection Series 2

    - by Asian Angel
    Two years ago we shared a terrific collection of waterfall wallpapers with you and today we are back with more. Let these wonders of nature cascade onto your desktop with the second in our series of Waterfalls Wallpaper collections. HTG Explains: Learn How Websites Are Tracking You Online Here’s How to Download Windows 8 Release Preview Right Now HTG Explains: Why Linux Doesn’t Need Defragmenting

    Read the article

  • What You Said: How You Set Up a Novice-Proof Computer

    - by Jason Fitzpatrick
    Earlier this week we asked you to share your tips and tricks for setting up a novice-proof computer; read on to see how your fellow readers ensure friends and relatives have a well protected computer. Image available as wallpaper here. If you only listen to a single bit of advice from your fellow readers, let that advice be the importance of separate and non-administrative user accounts. Grant writes: I have two boys, now 8 and 10, who have been using the computer since age 2. I set them up on Linux (Debian first, now Ubuntu) with a limited rights account. They can only make a mess of their own area. Worst case, empty their home directory and let them start over. I have to install software for them, but they can’t break the machine without causing physical damage (hammers, water, etc.) My wife was on Windows, and I was on Debian, and before they had their own, they knew they could only use my computer, and only logged in as themselves. All accounts were password protected, so that was easy to enforce. What Is the Purpose of the “Do Not Cover This Hole” Hole on Hard Drives? How To Log Into The Desktop, Add a Start Menu, and Disable Hot Corners in Windows 8 HTG Explains: Why You Shouldn’t Use a Task Killer On Android

    Read the article

  • From the Tips Box: Location-based To-Do Reminders, DIY Floppy Drive Music, and Easy Access to Product Manuals

    - by Jason Fitzpatrick
    Once a week we round up some great tips from the HTG tip box and share them with you; this week we’re looking at location based to-do reminders for Android phones, how to make your own floppy drive symphony, and an easy way to enjoy anywhere access to your manuals and product documentation. HTG Explains: What The Windows Event Viewer Is and How You Can Use It HTG Explains: How Windows Uses The Task Scheduler for System Tasks HTG Explains: Why Do Hard Drives Show the Wrong Capacity in Windows?

    Read the article

  • Sidestep Automatically Secures Your Mac’s Connection on Unsecure Networks

    - by Jason Fitzpatrick
    If you’re wary of browsing on wide open public Wi-Fi networks (and you should be), Sidestep is a free Mac application that routes your connection on an unsecure network through a secure proxy. Sidestep automatically detects when you are on an unprotected wireless network and forms an encrypted tunnel to the proxy you specified during setup. Anytime you login a wide open Wi-Fi node (such as at a coffee shop, airport, or other public area) you won’t be broadcasting your login credentials and other personal information in what amounts to plain text into the air around you. Anyone snooping on you or the network in general will simply see your stream of encrypted data going to the proxy. Hit up the link below to grab a copy and read additional information about setting up the program and finding/configuring a proxy server. Sidestep is freeware, Mac OS X only. Sidestep [via Gina Trapani] How to Create an Easy Pixel Art Avatar in Photoshop or GIMPInternet Explorer 9 Released: Here’s What You Need To KnowHTG Explains: How Does Email Work?

    Read the article

  • Impact Earth Lets You Simulate Asteroid Impacts

    - by Jason Fitzpatrick
    If you’re looking for a little morbid simulation to cap off your Friday afternoon, this interactive asteroid impact simulator makes it easy to the results of asteroid impacts big and small. The simulator is the result of a collaboration between Purdue University and the Imperial College of London. You can adjust the size, density, impact angle, and impact velocity of the asteroid as well as change the target from water to land. The only feature missing is the ability to select a specific location as the point of impact (if you want to know what a direct strike to Paris would yield, for example, you’ll have to do your own layering). Once you plug all that information in, you’re treated to a little 3D animation as the simulator crunches the numbers. After it finishes you’ll see a breakdown of a variety of effects including the size of the crater, the energy of the impact, seismic effects, and more. Hit up the link below to take it for a spin. Impact Earth [via Boing Boing] How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • How to Deauthorize Flash Content Before You Sell Your PC

    - by Taylor Gibb
    When it comes to selling your old digital equipment you usually should wipe it of all digital traces with something like DBAN, however if you cant there are some precautions you should take, here’s one related to flash content you may have viewed on your PC. When you rent or purchase a movie over a service that uses flash, it authorizes your PC to play that particular content. When you sell your PC, unless you deauthorize your PC, the new owner will still be able to view and play the content your purchased. 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

  • How To Use the Restore Partition to Break Into a Mac Running OS X Lion

    - by Justin Garrison
    It’s trivial to break into a Mac using an OS X boot disk, but new Macs use a restore partition for OS installations. Here’s how you can use that partition to reset a user password and break into a Mac. All laptops that come with OS X 10.7 “Lion” or laptops that were upgraded to Lion have a restore partition for easy OS recovery. This easy-to-use recovery partition also opens up hackers to break into your Mac without needing any additional tools. To reset a user password on a Mac with Lion you first need to restart the computer and hold the Command+R (?+R) keys. When the gray Apple logo shows up on the screen you can release the keys. Your computer should automatically boot into the recovery partition. Start by selecting your language and then go to Utilities -> Terminal in the menu. How to Sync Your Media Across Your Entire House with XBMC How to Own Your Own Website (Even If You Can’t Build One) Pt 2 How to Own Your Own Website (Even If You Can’t Build One) Pt 1

    Read the article

  • How to Reset Your Forgotten Domain Admin Password on Server 2008 R2

    - by Taylor Gibb
    Forgetting your password is always a pain, but luckily there’s an easy way to reset your Domain Administrator password. All you need is a copy of the Windows Server 2008 R2 installation disk and one simple command line trick. HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux Hack Your Kindle for Easy Font Customization

    Read the article

  • From the Tips Box: Free Shipping with Amazon Filler, Repairing Ethernet Cables, and Emergency Stickers

    - by Jason Fitzpatrick
    Once a week we round up some great tips from the tips box and share them with everyone. This week we’re looking at easy Amazon filler items, repairing the tab on Ethernet cable connectors, and a humorous data-security sticker. How to Own Your Own Website (Even If You Can’t Build One) Pt 1 What’s the Difference Between Sleep and Hibernate in Windows? Screenshot Tour: XBMC 11 Eden Rocks Improved iOS Support, AirPlay, and Even a Custom XBMC OS

    Read the article

  • Find Waldo with Mathematica

    - by Jason Fitzpatrick
    If you’re looking for a geeky (and speedy) way to find Waldo, of the Where’s Waldo? fame, this series of Mathematica scripts makes it a snap. Over at Stack Overflow, programmer Arnoud Buzing shares a clever bit of Mathematica-based coding that analyzes a Where’s Waldo? drawing and finds the elusive Waldo. Hit up the link below to see the distinct steps of analysis with accompanying photos. How Do I Find Waldo with Mathematica? [via Make] How To Properly Scan a Photograph (And Get An Even Better Image) The HTG Guide to Hiding Your Data in a TrueCrypt Hidden Volume Make Your Own Windows 8 Start Button with Zero Memory Usage

    Read the article

  • How To Enable Do Not Track In Every Web Browser

    - by Chris Hoffman
    We’ve covered why “Do Not Track” isn’t a silver bullet that prevents you from being tracked. However, if you don’t like being tracked and want to express that preference to websites, you can enable “Do Not Track” in every browser. To Google’s credit, future versions of Chrome explain exactly what Do Not Track does when you enable it. Remember that, by enabling Do Not Track, you’re just expressing a preference. Websites may or may not obey your preference. Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference

    Read the article

  • How Hot Can It Get? [Video]

    - by Asian Angel
    The coldest temperature possible is zero degrees Kelvin, but how hot do you think it can actually get? Watch as Vsauce discusses the varying levels of temperatures, what happens at those levels, and ends with the hottest possible temperature known to humanity. How Hot Can It Get? [via Geeks are Sexy] Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference

    Read the article

  • Desktop Fun: Fantasy Theme Wallpaper Collection Series 2

    - by Asian Angel
    Fantasy worlds come in a wondrous variety and today we are here with a collection that will inspire your imagination. Explore whole new worlds on your desktop with the second in our series of Fantasy Theme Wallpaper collections. How to Make Your Laptop Choose a Wired Connection Instead of Wireless HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me?

    Read the article

  • The Frustrating Life of Zelda Universe Henchmen [Video]

    - by Jason Fitzpatrick
    Life as the Ganon’s henchmen in the Legend of Zelda universe is mostly hard work, vague instructions, and no glamour if this insider’s video is to be believed. [via Cracked] HTG Explains: Does Your Android Phone Need an Antivirus? How To Use USB Drives With the Nexus 7 and Other Android Devices Why Does 64-Bit Windows Need a Separate “Program Files (x86)” Folder?

    Read the article

  • Roll Your Own Flexi-Ties to Secure and Store Frequently Used Cables

    - by Jason Fitzpatrick
    If you’re looking for an easy way to hang up or tidy frequently used cables, these DIY soft ties are durable, resuable, and easy to make. Soft ties ties are metal wire ties coated in rubber; people use them for everything from securing computer cables to shaping garden plants. Instructables user Bobzjr wanted a lot of them but couldn’t find anyone that sold bulk roles of the soft tie material. To that end he did a little exploring at the hardware store and found the perfect combination of wire and rubber to roll his own. Hit up the link below for more information on his DIY soft tie project. Roll Your Own Flexi-Ties (Soft Twist Ties) [Instructables] How To Properly Scan a Photograph (And Get An Even Better Image) The HTG Guide to Hiding Your Data in a TrueCrypt Hidden Volume Make Your Own Windows 8 Start Button with Zero Memory Usage

    Read the article

  • HTG Explains: Why Screen Savers Are No Longer Necessary

    - by Chris Hoffman
    Screen savers are a left-over solution from a previous technology. In spite of their name, screen savers no longer “save” anything – all they do is waste electricity. Screen savers are not necessary on modern, flat-panel LCD displays. Having your computer automatically turn off its display is the new “screen saver” – it saves energy, reduces your electricity bill, and increases your battery life. Screen savers may look pretty, but they do it when no one is looking. HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full

    Read the article

  • How To Change the Window Border Color in Windows 8

    - by Chris Hoffman
    Windows 8’s default blue window border color isn’t the only option. Windows 8 automatically selects the appropriate color depending on your wallpaper – you can also select a different color or use a third-party tool to easily select other colors. Changing the color of the window borders also changes the color of your taskbar. The taskbar and window borders use the same colors in Windows 8, although the taskbar is still partially transparent. HTG Explains: Does Your Android Phone Need an Antivirus? How To Use USB Drives With the Nexus 7 and Other Android Devices Why Does 64-Bit Windows Need a Separate “Program Files (x86)” Folder?

    Read the article

  • Ask the Readers: How Do You Give an Old Laptop a New Life?

    - by Jason Fitzpatrick
    That powerhouse laptop you bought back in 2006 can’t compete with the sleek ultrabook you just unboxed–but that doesn’t mean you should ship it to the dump. How do you give an old laptop a new lease on life? Whether you tear it apart and rebuild it into something brand new, put it on night duty as a backup station, or install a lightweight Linux distro before passing it on to your relatives, we want to hear all about your tools and methods for keeping old laptops out of the junk bin. However big or small your repurposing project, sound off in the comments below with your tips, tricks, and tools. Make sure to check back in on Friday for the What You Said roundup to see how your fellow readers revitalize their old laptops. How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • How To Be Your Own Personal Clone Army (With a Little Photoshop)

    - by Eric Z Goodnight
    Maybe you’ve always wanted more of yourself. Or maybe you’ve always thought you could be your own best friend! Regardless of your reasons, here’s how to duplicate yourself with some clever photograph tricks and either Photoshop or GIMP. How To Be Your Own Personal Clone Army (With a Little Photoshop) How To Properly Scan a Photograph (And Get An Even Better Image) The HTG Guide to Hiding Your Data in a TrueCrypt Hidden Volume

    Read the article

< Previous Page | 92 93 94 95 96 97 98 99 100 101 102 103  | Next Page >