Tagged With desktop

0

There's no doubt that settling down into a marathon TV viewing session is one of the most enjoyable ways to spend an evening (or morning or afternoon), but it's also true that you can have too much of a good thing. If you want to know the ground rules for binge-watching without harming your health, we'll outline them below.

18

Fire up your Start menu or Dock and think carefully for a moment: Out of all your ageing desktop apps, how many do you really rely on these days — or even better, how many of them don't already have very capable web app alternatives you could use instead? Unless you're a film editor or a graphic designer, it's probably time to let those old-fashioned, clunky desktop apps go.

3

The command line (or Terminal for you Mac fans) is a throwback to a simpler age of computing, before mouse pointers and application windows and desktop wallpaper. Back when it was just you and a window full of text. Operating systems have long since evolved beyond the humble command line interface, but there's still no better tool for quickly disseminating complex information in your operating system — and you can actually do some other pretty cool stuff with them, too.

0

Thanks to the helter-skelter pace of modern living it can be all too easy to sign up for a free trial or a month's worth of a particular service, and then before you know it, you're getting billed for a ton of apps you're not using and don't really need. Checking up on your subscriptions could save you a serious chunk of change — here's how to do it.

7

Thanks to dropping storage prices, speedier internet, and slicker software, you've now got a plethora of choices when it comes to keeping your files in the cloud, safe from harm and ready on demand. Yet there are a lot of different services, and while they can all handle your storage needs, they are not all created equal. Some work better for photo fans, while others are a better option if you're hoarding thousands of MP3s.

10

The deep web and its inner recess, the dark web — those less well-trodden parts of the internet beyond the reach of Google and Bing — are not for the faint-hearted or untrained. With the right tools, however, there's little to fear and plenty to discover. Here's how you can start exploring the deep web without having to worry about your digital well-being.

7

If you're erasing sensitive files from a computer, you probably want them gone forever and far beyond the reach of data recovery tools. Unfortunately, that's not what happens all of the time. Here are some simple steps you can take to make sure your files are deleted permanently.

1

It's a crucial component in any laptop or desktop computer, but very few computer owners actually know what a motherboard is or what it does. There's a motherboard (often called a logic board in smaller more mobile devices) sitting in every computer system: the processor, RAM, hard drives, graphics card, and other bits and pieces all plug straight into it.

4

You've got more choices than ever when it comes to backing up your data — you are backing up your data, right? — so how do you choose the best one for your needs? First, it's a good idea to pick up some kind of external hard drive. You can go the Network Attached Storage (NAS) route if you want to access the storage from your Wi-Fi (or build your own Netflix). You can also just get a regular external hard drive from someone like Seagate or Western Digital.

13

On today's web it's hard to set a (digital) foot online without it attracting dozens of trackers and log entries, as companies look to learn everything about you and sell that data on to advertisers. To hide you've got a few tools at your disposal, many of which we've talked about in the past, and all of which add up to a largely anonymous browsing experience.

2

Data backups can save your skin from all kinds of IT mishaps like dropping your laptop in a lake or having a virus blast through your hard drive. You should be backing everything up! Thanks to the recent spree of ransomware attacks, it's once again time to evaluate your backup system, so you're prepared in the event that some malicious actor locks up your computer.