Search Results

Search found 2852 results on 115 pages for 'ash geek pickney'.

Page 86/115 | < Previous Page | 82 83 84 85 86 87 88 89 90 91 92 93  | Next Page >

  • Running Windows 98 in 2013 with Modern Apps and Web

    - by Akemi Iwaya
    Do you ever have those moments when curiosity for the sake of fun gets a hold on you? Perhaps that curiosity gets focused on computer-related “what ifs” such as how well would a very old operating system handle being used with today’s modern apps and web? Nazmus Shakib Khandaker decided to find out how well Windows 98 could and would do in 2013. Have you tried something similar to this? Do you know of any individuals who are holding on to an older operating system no matter what? Share your experiences in the comments! Running Windows 98 in 2013 with Modern Web and Apps [YouTube]     

    Read the article

  • Custom Silent HTPC Uses Entire Case as a Heatsink

    - by Jason Fitzpatrick
    This silent media center PC dissipates heat in a rather clever way; the entire back of the case is one giant heatsink. Courtesy of computer enthusiast and tinker DeFex, the build isn’t just silent but quite eye catching too. He used a combination of one massive heatsink, custom brackets, acrylic, and bicycle spokes to create a sleek case that looks as much like a computer-inspired work of art as it does a media center computer. Hit up the link below to check out the build gallery and see how he mated the CPU to the heatsink-body with a custom milled aluminum bridge. Heatsink HTPC [via Hack A Day] Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Desktop Fun: Sunsets Wallpaper Collection Series 1

    - by Asian Angel
    Sunsets can turn the sky into a work of art as day slowly fades into night and taking a moment to enjoy the beauty can be the perfect way to end the day. Bring this peaceful time of day to your desktop with the first in our series of Sunsets Wallpaper collections. SPECIAL NOTE: Due to the unexpected problem with Paper Wall’s server we are providing a download link for the entire wallpaper set in a zip file (~12 MB) HERE. HTG Explains: What Is RSS and How Can I Benefit From Using It? HTG Explains: Why You Only Have to Wipe a Disk Once to Erase It HTG Explains: Learn How Websites Are Tracking You Online

    Read the article

  • Get Hands On with Raspberry Pi via Free OS-Building Course

    - by Jason Fitzpatrick
    Cambridge University is now offering a free 12-segment course that will guide you through building an OS from scratch for the tiny Raspberry Pi development board–learn the ins and outs of basic OS design on the cheap. You’ll need a Raspberry Pi board, a computer running Windows, OS X, or Linux, and an SD card, as well as a small amount of free software. The 12-part tutorial starts you off with basic OS theory and then walks you through basic control of the board, graphics manipulation, and, finally, creating a command line interface for your new operating system. Hit up the link below to read more and check out the lessons. Baking Pi – Operating Systems Development HTG Explains: What The Windows Event Viewer Is and How You Can Use It HTG Explains: How Windows Uses The Task Scheduler for System Tasks HTG Explains: Why Do Hard Drives Show the Wrong Capacity in Windows?

    Read the article

  • What You Said: Your Must Have Presentation Tools

    - by Jason Fitzpatrick
    Earlier this week we asked you to share your must have presentation tools and tricks; read on to see how your fellow readers jazz up their presentations and keep things flowing smoothly. Image by VectorOpenStock. Several readers favorites PowerPoint alternatives to break out of the PP doldrums. Kaitlin writes: Prezi.com An amazing tool! Enables you to create really dynamic zooming presentations, on one big canvas, with no slides! Wow-effect guaranteed. If you were reading down the comments thread and not quite sure if you wanted to check out Prezi, Dan’s passion for the presentation tool might push you over: How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • How to Convert DMG Files to ISO Files on Windows

    - by Taylor Gibb
    The DMG image format is by far the most popular file container format used to distribute software on Mac OS X. Here’s how to convert a DMG file into an ISO file that can be mounted on a Windows PC. First head over to this website and grab yourself a copy of dmg2img by clicking on the win32 binary link. Once the file has downloaded, open your Downloads folder, right click on the file, and select extract all from the context menu. The Best Free Portable Apps for Your Flash Drive Toolkit How to Own Your Own Website (Even If You Can’t Build One) Pt 3 How to Sync Your Media Across Your Entire House with XBMC

    Read the article

  • Download the Original Fallout For Free Today [4/6]

    - by Jason Fitzpatrick
    Fallout, the first game in the popular post-apocalyptic RPG series, is available for free today. Grab the game along with a detailed manual, game bible, soundtrack, and more. Courtesty of gaming site GOG, you can score a free Fallout bundle that includes the original game from 1997, a detailed manual, a 200+ page game bible filled with the history of the Fallout games and timeline, wallpaper, artwork, and even the game soundtrack. Not a bad haul for a single free download that weighs in at 506MB. Check out the video of the in-game introduction above and then hit up the link below to grab a copy. Fallout [GOG via Boing Boing] How to Own Your Own Website (Even If You Can’t Build One) Pt 3 How to Sync Your Media Across Your Entire House with XBMC How to Own Your Own Website (Even If You Can’t Build One) Pt 2

    Read the article

  • WouldISurviveANuke Assesses Your Distance From Nuclear War Strike Sites

    - by Jason Fitzpatrick
    WouldISurviveANuke is a morbid Google Maps mashup that plots out the effective radius of nuclear weapons on major metropolitan areas, your distance from them, and your chances of survival. Visit the site, plug in your zipcode, and set the parameters (how big of a nuclear weapon and how large the nearest target city needs to be) to find out if you’re in the blast radius. We plugged in a downtown address in Detroit, MI. The verdict? Neither we nor the cockroaches will be coming out alive. If you plug in a location far enough away from the direct blast radius you’ll also get a quality of life report that spells out the effects of a local nuclear strike. As far as startling anti-nuclear proliferation arguments go, WouldISurviveANuke is an effective and interactive demonstration. Hit up the link below to try it out. WouldISurviveANuke [via Y! Tech] How to Run Android Apps on Your Desktop the Easy Way HTG Explains: Do You Really Need to Defrag Your PC? Use Amazon’s Barcode Scanner to Easily Buy Anything from Your Phone

    Read the article

  • The Chemistry of Snowflakes [Video]

    - by Jason Fitzpatrick
    Snowflakes start out as tiny bits of dust high in the atmosphere and end up drifting down to us as intricate water crystals. Check out this video to see the process start to finish. Courtesy of the American Chemical Society and Bytesize Science, we’re treated to a well explained and illustrated journey from the beginning of the snowflake formation process until the end. [via Neatorama] How to Access Your Router If You Forget the Password Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor

    Read the article

  • The Most Useful Bookmarklets to Enhance Your Browsing Experience

    - by Lori Kaufman
    Bookmarklets are JavaScript links you can place on your browser’s toolbar that add one-click functionality to the browser or webpage. They are free and help make repetitive tasks in your browser quicker and easier to perform. Use bookmarklets to add functionality to your browser, such as modifying the appearance of a webpage, extracting data from a webpage, and search for highlighted text in a search engine or online encyclopedia. We’ve collected some links to useful bookmarklets here to enhance your browsing experience. 7 Ways To Free Up Hard Disk Space On Windows HTG Explains: How System Restore Works in Windows HTG Explains: How Antivirus Software Works

    Read the article

  • Hundred Zeros Catalogs Current Free Best-Sellers on Amazon

    - by Jason Fitzpatrick
    If you’re looking for some free entertainment (and who isn’t?), Hundred Zeros catalogs the current free best selling ebooks on Amazon. Visit, search, and enjoy some new books without spending a dime. Courtesy of Amit Agarwal from Digital Inspiration, Hundred Zeros catalogs piles of free Kindle books. You can browse the front page for the current top books, browse by category, or search by topic in the sidebar. When you find a book you like just click through to Amazon and send to your Kindle or Cloud Reader. Hit up the link below to start searching. Hundred Zeros HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux

    Read the article

  • How to Banish Duplicate Photos with VisiPic

    - by Jason Fitzpatrick
    You meant well, you intended to be a good file custodian, but somewhere along the way things got out of hand and you’ve got duplicate photos galore. Don’t be afraid to delete them and lose important photos, read on as we show you how to clean safely. Deleting duplicate files, especially important ones like personal photos, makes a lot of people quite anxious (and rightfully so). Nobody wants to be the one to realize that they deleted all the photos of their child’s first birthday party during a hard drive purge gone wrong. In this tutorial we’re going to show you how to go beyond the limited reach of  tools which simply compare file names and file sizes. Instead we’ll be using a program that combines that kind of comparison with actual image analysis to help you weed out not just perfect 1:1 file duplicates but also those piles of resized for email images, cropped images, and other modified images that might be cluttering up your hard drive. How to Banish Duplicate Photos with VisiPic How to Make Your Laptop Choose a Wired Connection Instead of Wireless HTG Explains: What Is Two-Factor Authentication and Should I Be Using It?

    Read the article

  • Ask the Readers: How Do You Keep Your Email SPAM Free and Tidy?

    - by Jason Fitzpatrick
    Email can be a fantastically efficient way to deal with communication, but not if it’s bogged down with SPAM messages and poorly organized. This week we want to hear all about the tips, tricks, and ninja-filters you use to keep your inbox tidy. Whether it’s special filters for your Bacon (spam-like marketing that you actually want to receive and occasional review), services you use to block spammers, or organization tips you use to keep your email inbox streamlined with no message unreplied to, we want to hear all about it. Sound off in the comments with your proclamations of your inbox-fu and how you maintain zen-like mastery over your email workflow. Be sure to check in on Friday for the What You Said roundup. How to Banish Duplicate Photos with VisiPic How to Make Your Laptop Choose a Wired Connection Instead of Wireless HTG Explains: What Is Two-Factor Authentication and Should I Be Using It?

    Read the article

  • Build a LEGO Creation without Leaving Your Cube

    - by Jason Fitzpatrick
    Just because you’re stuck at your desk doesn’t mean you can’t sneak in a little fun. At BuildWithChrome you can slap together virtual LEGO bricks with ease. The site, a collaboration between Google and LEGO, shows you a massive map of Australia and New Zealand covered in thousands of LEGO base plates. Zoom in, select a base plate, and get building. The block selection is fairly limited (you can work with the kind of blocks you’d find in a generic LEGO brick pack) but it’s still quite a bit of fun. When I took it for a test drive, I started simple by building a house-like structure: With the addition of a few more pieces it would be possible to pull off the wizard shop my wife and daughter just built: How to Banish Duplicate Photos with VisiPic How to Make Your Laptop Choose a Wired Connection Instead of Wireless HTG Explains: What Is Two-Factor Authentication and Should I Be Using It?

    Read the article

  • DIY Mini-Studio Is a Sturdy and Cheap Photography Platform

    - by Jason Fitzpatrick
    Most DIY table top studios/light tents are designed to be packed down–this one is a permanent and sturdy fixture with a nice smooth cyclorama background. Courtesy of DIYer Nick Britsky, this stand-alone mini-studio features a nice solid frame for attaching lighting, flashes, and diffusion panels as well as a solid and smooth cyclorama-style background. Hit up the link below to see pictures of the build in progress, Nick’s solution for the background, and the Sketchup files so you can whip one up for your basement. DIY Mini Photo Studio [via Make] HTG Explains: What The Windows Event Viewer Is and How You Can Use It HTG Explains: How Windows Uses The Task Scheduler for System Tasks HTG Explains: Why Do Hard Drives Show the Wrong Capacity in Windows?

    Read the article

  • How To Create a Shortcut That Lets a Standard User Run An Application as Administrator

    - by Chris Hoffman
    Want to allow a standard user account to run an application as administrator without a UAC or password prompt? You can easily create a shortcut that uses the runas command with the /savecred switch, which saves the password. Note that using /savecred could be considered a security hole – a standard user will be able to use the runas /savecred command to run any command as administrator without entering a password. However, it’s still useful for situations where this doesn’t matter much – perhaps you want to allow a child’s standard user account to run a game as Administrator without asking you. We’ve also covered allowing a user to run an application as Administrator with no UAC prompts by creating a scheduled task. HTG Explains: Is ReadyBoost Worth Using? HTG Explains: What The Windows Event Viewer Is and How You Can Use It HTG Explains: How Windows Uses The Task Scheduler for System Tasks

    Read the article

  • How to Total Rows and Columns in a Word 2013 Table

    - by Lori Kaufman
    If you’re working in Word and you need to total values in a table, you can do so without having to enter the data into Excel and then copy and paste it into Word. Word can do simple calculations such as summing, multiplying, and averaging. NOTE: When you add new rows or columns of values to a table in Word, the formulas will not automatically update. To update a formula, right-click on the formula and choose Update Field from the popup menu. To enter a formula into a cell in a table, put the cursor in the cell and click the Layout tab under Table Tools.     

    Read the article

  • Ransomware: Why This New Malware is So Dangerous and How to Protect Yourself

    - by Chris Hoffman
    Ransomware is a type of malware that tries to extort money from you. One of the nastiest examples, CryptoLocker, takes your files hostage and holds them for ransom, forcing you to pay hundreds of dollars to regain access. Most malware is no longer created by bored teenagers looking to cause some chaos. Much of the current malware is now produced by organized crime for profit and is becoming increasingly sophisticated. How Ransomware Works Not all ransomware is identical. The key thing that makes a piece of malware “ransomware” is that it attempts to extort a direct payment from you. Some ransomware may be disguised. It may function as “scareware,” displaying a pop-up that says something like “Your computer is infected, purchase this product to fix the infection” or “Your computer has been used to download illegal files, pay a fine to continue using your computer.” In other situations, ransomware may be more up-front. It may hook deep into your system, displaying a message saying that it will only go away when you pay money to the ransomware’s creators. This type of malware could be bypassed via malware removal tools or just by reinstalling Windows. Unfortunately, Ransomware is becoming more and more sophisticated. One of the latest examples, CryptoLocker, starts encrypting your personal files as soon as it gains access to your system, preventing access to the files without knowing the encryption key. CryptoLocker then displays a message informing you that your files have been locked with encryption and that you have just a few days to pay up. If you pay them $300, they’ll hand you the encryption key and you can recover your files. CryptoLocker helpfully walks you through choosing a payment method and, after paying, the criminals seem to actually give you a key that you can use to restore your files. You can never be sure that the criminals will keep their end of the deal, of course. It’s not a good idea to pay up when you’re extorted by criminals. On the other hand, businesses that lose their only copy of business-critical data may be tempted to take the risk — and it’s hard to blame them. Protecting Your Files From Ransomware This type of malware is another good example of why backups are essential. You should regularly back up files to an external hard drive or a remote file storage server. If all your copies of your files are on your computer, malware that infects your computer could encrypt them all and restrict access — or even delete them entirely. When backing up files, be sure to back up your personal files to a location where they can’t be written to or erased. For example, place them on a removable hard drive or upload them to a remote backup service like CrashPlan that would allow you to revert to previous versions of files. Don’t just store your backups on an internal hard drive or network share you have write access to. The ransomware could encrypt the files on your connected backup drive or on your network share if you have full write access. Frequent backups are also important. You wouldn’t want to lose a week’s worth of work because you only back up your files every week. This is part of the reason why automated back-up solutions are so convenient. If your files do become locked by ransomware and you don’t have the appropriate backups, you can try recovering them with ShadowExplorer. This tool accesses “Shadow Copies,” which Windows uses for System Restore — they will often contain some personal files. How to Avoid Ransomware Aside from using a proper backup strategy, you can avoid ransomware in the same way you avoid other forms of malware. CryptoLocker has been verified to arrive through email attachments, via the Java plug-in, and installed on computers that are part of the Zeus botnet. Use a good antivirus product that will attempt to stop ransomware in its tracks. Antivirus programs are never perfect and you could be infected even if you run one, but it’s an important layer of defense. Avoid running suspicious files. Ransomware can arrive in .exe files attached to emails, from illicit websites containing pirated software, or anywhere else that malware comes from. Be alert and exercise caution over the files you download and run. Keep your software updated. Using an old version of your web browser, operating system, or a browser plugin can allow malware in through open security holes. If you have Java installed, you should probably uninstall it. For more tips, read our list of important security practices you should be following. Ransomware — CryptoLocker in particular — is brutally efficient and smart. It just wants to get down to business and take your money. Holding your files hostage is an effective way to prevent removal by antivirus programs after it’s taken root, but CryptoLocker is much less scary if you have good backups. This sort of malware demonstrates the importance of backups as well as proper security practices. Unfortunately, CryptoLocker is probably a sign of things to come — it’s the kind of malware we’ll likely be seeing more of in the future.     

    Read the article

  • The Impact of Names

    - by Akemi Iwaya
    Most of the time you may not give much thought to a person’s name, or your own for that matter. But does your name, or the letters used in it (i.e. spelling), have an impact on your life that you may not be aware of? Vsauce looks at names, how they could affect your self-perception, how other people relate to you based on your name, and more in their latest video. Names [YouTube]     

    Read the article

  • The Evolution of the Moon – Past to Present [Video]

    - by Asian Angel
    The Moon seems like a pretty quiet place these days, but it has not always been so. Take a journey through time and watch the evolution of the Moon with this terrific video from NASA! NASA | Evolution of the Moon [via Geeks are Sexy] The HTG Guide to Hiding Your Data in a TrueCrypt Hidden Volume Make Your Own Windows 8 Start Button with Zero Memory Usage Reader Request: How To Repair Blurry Photos

    Read the article

  • How to Easily Optimize & Manage Multiple Computers with Soluto

    - by Chris Hoffman
    Soluto is a quick, simple way to optimize and manage one or more computers – it really shines for managing multiple ones. If you’re already tech support for family or friends, Soluto can save you a lot of time. We’ve written about Soluto in the past, when it was in a closed beta. Anyone can now sign up for a free Soluto account and manage up to five computers from the same account. The HTG Guide to Hiding Your Data in a TrueCrypt Hidden Volume Make Your Own Windows 8 Start Button with Zero Memory Usage Reader Request: How To Repair Blurry Photos

    Read the article

  • How to Use a 64-bit Web Browser on Windows

    - by Chris Hoffman
    64-bit version of Windows don’t use 64-bit browsers by default – they’re still in their infancy, although even Adobe Flash now supports 64-bit browsers. Using a 64-bit browser can offer significant performance benefits, according to some benchmarks. This article is for Windows users – 64-bit Linux distributions include 64-bit browsers, so you don’t have to do anything special on Linux. How to Own Your Own Website (Even If You Can’t Build One) Pt 1 What’s the Difference Between Sleep and Hibernate in Windows? Screenshot Tour: XBMC 11 Eden Rocks Improved iOS Support, AirPlay, and Even a Custom XBMC OS

    Read the article

  • Get Your Logical Fallacies Straight with this Rhetological Fallacies Chart

    - by Jason Fitzpatrick
    Have trouble telling your Ad Hocs from your Ad Hominems? Fear not, this extensive and easy to read logical fallacy chart makes it easy to tell when someone is begging the question or suffering from a confirmation bias. Rhetological Fallacies Chart [via Neatorama] How to Own Your Own Website (Even If You Can’t Build One) Pt 2 How to Own Your Own Website (Even If You Can’t Build One) Pt 1 What’s the Difference Between Sleep and Hibernate in Windows?

    Read the article

  • How to Freeze and Unfreeze Rows and Columns in Excel 2013

    - by Lori Kaufman
    If you are working on a large spreadsheet where all the rows and columns of data don’t fit on the screen, it would be helpful to be able to keep the heading rows and columns stationary so you can scroll through the data. You can freeze rows and columns in your spreadsheet. To do so, select the cell above which and to the left of which you want to freeze the columns and rows. Click the View tab.    

    Read the article

  • The Island of Lost Apple Products

    - by Jason Fitzpatrick
    While Apple has has a mountain of commercial successes, every once in awhile the crew in Cupertino strikes out. Here are some of the less successful and prematurely retired Apple products from the last two decades. Courtesy of Wired, we find nine of the least favorably received products in the Apple portfolio. Pictured here, the QuickTake Camera: Life Span: 1994 – 1997 Back in 1994, Apple was actually at the forefront of digital photography. The QuickTake Camera’s photos (640 x 480 at 0.3 megapixels) were borderline unusable for anything other than your Geocities homepage. But technology has to start somewhere. Still, Apple killed the line after just three years. And while the iPhone and other smartphones have replaced most people’s digital cameras, Apple could have had a reaped the benefits of the digital point-and-shoot salad years. 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

< Previous Page | 82 83 84 85 86 87 88 89 90 91 92 93  | Next Page >