Wednesday, April 3, 2013

Get Organized: Change Your Wi-Fi Name and Password | PCMag.com

Get Organized: Change Your Wi-Fi Name and Password | PCMag.com: "In December and January, I visited half a dozen friends and family members. And every time I arrived at a new host's house, I had to ask, "What's your Wi-Fi network name and password?""

'via Blog this'

Switched: The Convert's Guide to the Mac and OS X

Switched: The Convert's Guide to the Mac and OS X: "The reasons for deciding to buy a Mac over a PC are entirely personal, and your own pro-Mac arguments might not align with someone else’s. That said, there are a few things that Mac users generally enjoy that users of other operating systems might not, including unique features and a perceived superior user experience. "

'via Blog this'

Tuesday, April 2, 2013

How to Use the Command Line to Kill a Program

How to Use the Command Line to Kill a Program: "Everyone knows how to kill a program using Task Manager in Windows or Force Quit in OS X, but sometimes it’s useful to kill a program using the command line. I’ve run into several situations where the program refused to end via Task Manager, even when I tried to kill the underlying process. Force Quit has it’s own quirks and doesn’t always kill a program like it should. That’s when you can use the power of the command line."

'via Blog this'

Monday, April 1, 2013

Raspberry Pi $25 Model-A Computer Hits US Market - Technology News - redOrbit

Raspberry Pi $25 Model-A Computer Hits US Market - Technology News - redOrbit: "The Raspberry Pi Foundation announced that  its $25 Model A computer is now available for purchase in the United States through the electronics reseller Allied Electronics"

'via Blog this'

10 Fun & Surprising Operating System Easter Eggs

10 Fun & Surprising Operating System Easter Eggs: "Find hidden hilarity and otherwise odd stuff, built right into the operating system you’re using. They’re hiding in plain site, in software you use every day, and when you find operating system easter eggs you’ll be delighted – it’s no wonder these hidden gems are called Easter Eggs."

'via Blog this'

Two unlikely PC makers emerge: Google, Microsoft | Business Tech - CNET News

Two unlikely PC makers emerge: Google, Microsoft | Business Tech - CNET News: "The tech giants are certainly big enough to make waves in the market for personal computers. CNET's Brooke Crothers considers the potential impact of their entry into the arena."

'via Blog this'

How to Use Google Chrome to Remotely Access Your Computer

How to Use Google Chrome to Remotely Access Your Computer: "We have looked at some of the various ways in which remote access of your computer can be achieved, including using TeamViewer and VNC, but if you have Chrome installed you can do the same with nothing more than a browser extension."

'via Blog this'

Round Up: All of Google’s jokes for April Fools 2013 - The Next Web

Round Up: All of Google’s jokes for April Fools 2013 - The Next Web: "Every year, Google goes all out for April Fools’ Day. The company not only pulls together more jokes than all the other tech giants, but the company makes a point to outdo itself too. It honestly gets difficult to keep track of everything Google thinks up, so like last year we’re putting together a roundup."

'via Blog this'

Sunday, March 31, 2013

HTG Explains: Why Windows Has the Most Viruses

HTG Explains: Why Windows Has the Most Viruses: "We all know that Windows is the most malware-ridden platform out there, but why is that? Windows is the most popular desktop operating system, but that isn’t the only reason – past decisions made Windows a fertile breeding ground for viruses and other malware."

'via Blog this'

Saturday, March 30, 2013

How to protect your computer system

How to protect your computer system: "Passwords are a very important element when it comes to protecting data on computer systems and different kinds of accounts that can be accessed online. If the inappropriate person gets your password, many terrible things could happen. First, all of your accounts could be jeopardized and all of the data on your computer system could be compromised. In this posting, you will learn how to create strong passwords for data security."

'via Blog this'