There's a lot to like about Google Chrome's built-in security features. The browser offers unique sandboxing functions and privilege restrictions, and even updates itself in the background to help better protect you from hackers and malware. But like all browsers, Chrome is imperfect, and there are steps you can take to protect it from attack. Here's how to get the most from Chrome's built-in security features, and work around its security shortcomings.Privacy...
Friday, March 29, 2013
Monday, March 25, 2013
Use Twitter to get real-time customer service updates and info
Posted on 8:35 PM by Unknown
Yesterday, digital-comic-book reseller Comixology held a promotion offering a whopping 700 free comics—first issues of old and new series ranging from The Avengers to The Fantastic Four to Spider-Man.For a total cost of $0, you could read these gems on the Web or your PC, tablet, or smartphone.Perhaps unsurprisingly, the giveaway was so popular, it turned into Kryptonite for Comixology's servers. I tried all day to create an account and grab some free comics, but simply couldn't connect.Twitter to the rescue! Well, sort of. Seeking information...
Sunday, March 24, 2013
How to add Windows 8's best desktop features to Windows 7
Posted on 3:25 AM by Unknown
"Windows 8 on a desktop." The very phrase makes some people recoil and instinctively mouse over their Start buttons.It's too bad that the modern UI has proven so contentious, because aside from the eye candy—or eye cancer, depending on your perspective—an abundance of welcome nuts-and-bolts changes makes Windows 8 the hands-down best version of Windows that Microsoft has ever released.But don't despair. Although you can tweak and tuck a few things...
Tuesday, March 19, 2013
How (and why) to set up a VPN today
Posted on 4:32 PM by Unknown
Marissa Mayer made Yahoo's VPN famous by using it to check on the work habits of her employees. Lost amid today's VPN conversation, however, is the fact that virtual private networks are much more than just pipelines for connecting remote employees to central work servers.And that's a damn shame, because VPNs can be helpful tools for protecting online privacy, and you need not be an office drone to enjoy their benefits.A VPN, as its name...
Thursday, March 14, 2013
Backing up your entire drive: Cloning vs. imaging
Posted on 6:16 PM by Unknown
Both cloning and imaging create an exact record of your drive or partition. I'm not just talking about the files, but the master boot record, allocation table, and everything else needed to boot and run your operating system.This isn't necessary for protecting your data--a simple file backup will handle that job just fine. But should your hard drive crash or Windows become hopelessly corrupt, a clone or image backup can quickly get you back to work.When...
Video: How to secure your home Wi-Fi network
Posted on 6:15 PM by Unknown
Is your Wi-Fi network at home secure? There’s a good reason it should be.Unsecure networks allow neighbors or anyone within range to use your Internet connection. That will slow it down, make you more vulnerable to hacking or, even worse, have your connection used for illegal activity.In this IDG News Tech Tip video, we’ll go beyond simply setting a password, and talk about three security options available in most modern base stations—WEP, WPA and WPA2. We’ll also show you how to find out which one of those you’re using as well as how to stop your...
Sunday, March 10, 2013
The Ubuntu guide for displaced Windows users
Posted on 7:21 AM by Unknown
With Windows 8 pushing a “touch-first” desktop interface—Microsoft’s words, not ours—and with Valve’s Steam on Linux beginning to bring much-needed games and popular attention to the oft-overlooked operating system, there’s never been a better time to take Linux out for a test drive.Dipping your toes into the penguin-filled waters of the most popular open-source ecosystem is easy, and you don't have to commit to switching outright...
Subscribe to:
Posts (Atom)