background preloader

Computer

Facebook Twitter

20 essential PC shortcuts. I've always liked that Windows gives me multiple ways to perform popular tasks.

20 essential PC shortcuts

Say you want to print something. You could go to the File menu and select the Print command, or you can press the Ctrl button and the letter P. Ctrl+P is just one example of a keyboard shortcut. Shortcuts combine two or more keys to do something special that neither key does alone. I prefer to use shortcuts whenever possible. Get to know the basics There are certain shortcuts I use all day, every day. Copy a selected item: Ctrl+CCut a selected item: Ctrl+XPaste a selected item: Ctrl+VUndo an action: Ctrl+ZRedo that thing I just undid: Ctrl+YSelect everything: Ctrl+APrint: Ctrl+P Manage open windows Chances are, you use your PC to do a lot of things at once. Switch between open windows Alt+Tab If you have lots of open windows and you're not sure exactly which one you need, press Alt+Tab, and get a quick thumbnail view of all open windows. Get even funkier with window management Manage tasks.

80+ Best Free Hacking Tutorials. Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics.

Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. You must have a passion and positive attitude towards problem solving. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Hacking For Dummies - Beginners Tutorials Summary. Portable.Edu: 51 Productive & Petite Apps Every Student Should Put on Their USB Drive. Video games,Ghost Recon video games ghost recon ghost recon future soldier 1680x1050 wallpaper – video games,Ghost Recon video games ghost recon ghost recon future soldier 1680x1050 wallpaper – Soldiers Wallpaper.

How Not to Remove Your Timeline. Technical Art and Steampunk Contraptions. 17 Portable Apps to Help Troubleshoot PC's. Are you the one that your friends and family call every time they have a problem with their computer?

17 Portable Apps to Help Troubleshoot PC's

Put these tools on your USB thumb drive and troubleshooting will be that much easier. Please feel free – encouraged even – to suggest other helpful, portable troubleshooting apps. Just leave a comment and I’ll check out the app then update the list accordingly. AutoRuns (startup monitor) The most comprehensive tool for info on auto-starting locations of any startup monitor/utility. Avira UnErase (file recovery) File Recovery tool for Windows 2000 and XP. CCleaner (PC optimization) The popular PC optimization and privacy tool has a Portable Edition that you can download and install on your USB thumb drive. ClamWin (anti-virus) Following the instructions found here, you can carry the open-source anti-virus software ClamWin on your USB pen drive. DBAN (secure disk eraser) DBAN is a self-contained boot disk that securely wipes the hard disks of most computers. Three steps to properly protect your personal data.

With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly.

Three steps to properly protect your personal data

Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption.

It's fairly easy, quick, and free. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password.