background preloader

I.T

Facebook Twitter

How to Find Out What's Keeping Your Computer from Going to Sleep. Top 10 Ways to Speed Up Your Computer's Boot Time. Battery Life News, Videos, Reviews and Gossip - Gizmodo. These days, you can purchase a passable laptop for little more than the cost of an iPad.

Battery Life News, Videos, Reviews and Gossip - Gizmodo

As of February, the average Windows notebook cost just $513 and, for less than that, you can find a strong system that comes with modern specs like a Core i3 CPU, 4GB of RAM and a 500GB hard drive. But just because you can grab a low-rent laptop for $399 at Best Buy doesn’t mean you should. Whether you’re buying a notebook that’s made to order or choosing between different ready-made models, you need to pay a little extra to be happier and more productive. Here are five laptop features worth the splurge: 1. You can never be too rich, too thin or have too many pixels, but unfortunately most notebooks today come with lame 1366 x 768 screens that show even less of your favorite Web pages above the fold than their 1280 x 800 counterparts from 2007. If you’re purchasing a MacBook, make sure to buy one with at least a 1440 x 900 resolution (MacBook Air 13-inch, MacBook Pro 15-inch or higher). 2. 3. 4. 5. UsbFlashSpeed.com: We know everything about USB Flash speed! Why Printers Suck (And What You Can Do About It)

LoJack for Laptops. Weekendhacker News, Videos, Reviews and Gossip - Lifehacker. Top 10 Ways to Speed Up Your Computer's Boot Time. Top 10 Ways to Turn Your Retired Gadgetry into the Technology of the Future. Top 10 News, Videos, Reviews and Gossip - Lifehacker.

Photography

Gadget Insurance from InsureandGo.com. How to Send Self-Destructing Sensitive Information to Someone via Email. Have you ever sent private information to someone, maybe a family member needed your credit card number, and then regretted that you had ever done it.

How to Send Self-Destructing Sensitive Information to Someone via Email

This can all be solved with a self-destructing link. Note: We are not advising that you send private information via email or necessarily endorsing this service as a safe way to transfer any information. It’s a novelty and a fun geeky trick. Creating The Self-Destructing Link To get started head over to this website and click on the Create One Now button. How to Use Bing’s Advanced Search Operators: 8 Tips for Better Searches.

Google may still be the top search engine, but Bing is starting to stand on its own.

How to Use Bing’s Advanced Search Operators: 8 Tips for Better Searches

Bing has many of the same search operators offered by Google, but it has a few tricks you won’t find elsewhere. Master these search operators and you’ll find exactly what you’re looking for, and do it faster. These search operators will also work in Yahoo, which is now powered by Bing. The Basics Bing’s basic search operators work similarly to Google’s.

“find this exact phrase” Omit words with the NOT or minus sign operators. Smartphones NOT iphone smartphones -iphone Use the OR or | operator to find pages that contain one word or another. Android OR iphone android | iphone Site Search Use the site: operator to search within a specific website, just like on Google. Site:howtogeek.com bing File Type. 10 Amazing Uses for Wolfram Alpha.

Software

Windows Forensics: Have I been Hacked? Table of Contents Introduction One of the top questions I see on forums is "How do I know if I have been hacked?

Windows Forensics: Have I been Hacked?

". When something strange occurs on a computer such as programs shutting down on their own, your mouse moving by itself, or your CD constantly opening and closing on its own, the first thing that people think is that they have been hacked. In the vast majority of cases there is a non-malicious explanation for these problems such as faulty hardware or problematic software, but it is better to be safe than sorry for not investigating deeper. Unfortunately, the vast majority of computer users have no idea how to go about determining if their computer is hacked. Before we continue, it is important to go over some basic information. It should also be noted that in many of the cases that people think they are hacked, they are instead infected with malware such as Spyware, Scareware, or Trojans. Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help Conclusion.

Tracing a hacker. Table of Contents Introduction.

Tracing a hacker

How to install and use the Windows XP Recovery Console. Table of Contents What is the Recovery Console?

How to install and use the Windows XP Recovery Console

The Recovery Console is a special boot up method that can be used to help fix problems that are preventing your Windows installation from properly booting up into Windows. This method allows you to access the files, format drives, disable and enable services, and other tasks from a console prompt while the operating system is not loaded.

An Explanation of Oem, Upgrade, Academic, And Full Versions of software. Many times you will see software for sale that is listed as OEM , Academic, Upgrades, or Full Versions, all at different prices.

An Explanation of Oem, Upgrade, Academic, And Full Versions of software

This may lead to some confusion making you think that they are all different products. In reality they are all the same products, but are priced differently. OEM stands for Original Equipment Manufacturer. Oem software is generally only sold by hardware manufacturers who include the OEM software as part of the total product. How to Backup and Restore your hard drive with DriveImage XML. Table of Contents: Introduction DriveImage XML is my program of choice for backing up and protecting my data.

How to Backup and Restore your hard drive with DriveImage XML

When I first began using this application, though, I had some difficulties restoring my backup image on my test boxes using the instructions found in other tutorials.