FCC Chairman Ajit Pai won a victory with the recent failure to overturn the Restoring Internet Freedom Order, which essentially reclassifies broadband Internet access as an informational service governed by the FTC, rather than a telecommunications service governed by the FCC. And really, if you asked me to check a single box to classify the […]
Anything tech-related, such as computers, mobile devices, networking and online security.
How many times have you knowingly shared your account password with another person? Or just as importantly, how many times have you accessed someone else’s account with their permission? Before answering, consider these possibilities: You give a friend access to your video streaming account; You have a multi-connection VPN account, so you offer your friends […]
Page Borders adds creative flair to your documents, which is great for flyers, presentations or just plain fun. We already discussed how to apply word and paragraph borders, so this article might seem familiar. It follows the same interface as paragraph borders, except for a few application options. Page Borders 1. Place your cursor somewhere […]
Boxing up text helps separate or draw focus to important elements of your document. And while it’s convenient to use text boxes for supplemental information, such as a “Tip” or “Warning” box, text boxes aren’t ideal for regular text within your document. For that, you want an option that allows for editing and word-wrapping just […]
Most users probably don’t schedule their shutdowns; they either shut down immediately or leave the computer on. However, there are times when specifying a future shutdown is handy. For examples: You want to shut down your computer after allowing time for some process or download to complete first. Although many programs offer that option, most […]
As we’ve discussed numerous times, you should encrypt any sensitive file to deter would-be data thieves or snoops. That is especially important for shared computers or laptops that are exposed to greater risk. Although encrypted containers and drives offer a fantastic option for protecting multiple files, the files are fully exposed while the container is […]
The available portable edition of Firefox limits you, so we’ll explore creating your own portable version from installers and then set them up to simultaneously run multiple profiles or versions.
Torrents enable you to download or share LEGAL (don’t download copyrighted content!) files with multiple peers all around the world. Rather than rely on the integrity of a single server, you share the load across numerous users instead. This potentially makes downloads faster and more reliable. As such, Linux often distributes versions via torrents and […]
Window’s Sleep mode places the computer in a power-saving state from which you can quickly resume work. Resuming is faster than the previously discussed Hibernation mode, but it generally uses more power, because RAM must continually receive energy to maintain data. There’s actually several tiers of sleep or sleep-like modes, as described by Khanse of […]
We’ve talked extensively about TrueCrypt and VeraCrypt for encrypting file containers, partitions, whole drives or your operating system. In this article, we’ll streamline your usage of those programs by using Favorite Volumes. Both programs have two favorites lists: Favorite Volumes organize a list of frequently used container files, partitions or drives that you can manually […]