Latest News

Friday, 6 June 2014

Quickly Secure Your Computer With Microsoft's Enhanced Mitigation Experience Toolkit (EMET)

How-To Geek Newsletter
Did You Know?

Despite the commonly held belief that former U.S. Vice President Al Gore claimed he invented the internet, he made no such claim; during a 1999 interview he did, however, give himself credit for being a champion of early Internet development.

Geek Trivia

What Did 19th Century Japanese Aristocrats Dye Black As A Status Symbol?
Hair →
Hands →
Teeth →
Fingernails →


Advertisement
Download Refreshing, Resetting, and Restoring: A Guide to Recovery Options in Windows
Learn about the powerful additions to the arsenal of recovery tools found in Windows 8. Click here to download
Geek Comic
Today's Tech Term

Bursty

Bursty refers to data transmissions or transfers that occur in abrupt and/or short, uneven bursts.

What We're Reading from Around the Web

Network Security 10: General Security Tips for Windows Users

We have arrived at the final lesson in this How-To Geek School series. We have covered all the security tools that are built into Windows, and now we would like to some general tips that will improve the security of your computing experience.

Read This Article →


Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)

Only one cash prize went unclaimed at Pwn2Own 2014. All major browsers were hacked, but hackers were unable to claim the $150,000 grand prize for hacking IE 11 secured with EMET. Secure your own PC with EMET today.

Read This Article →


How do You Make Your Browsers Use the Full Resolution of Your Monitor?

Having a monitor with a very high resolution is awesome, but what do you do when Google Chrome and Internet Explorer refuse to make appropriate use of all that resolution real-estate? Today’s SuperUser Q&A has some possible solutions to one reader’s resolution dilemma.

Read This Article →


How to Manage Startup Applications in Ubuntu 14.04

If you've installed a lot of applications in Ubuntu, you may have noticed that takes longer for your system to boot up. Some applications are automatically run when you boot up your Ubuntu system and this process uses up resources as Ubuntu boots.

Read This Article →


Network Security 9: Beyond Defender: Third Party Security Products in Windows

While Microsoft tries to do a good job at providing a secure computing experience, there will always be other companies that provide better security products than those found in Windows. This is especially true when you consider Windows Defender (Microsoft Security Essentials) and its effectiveness in blocking all kinds of malware.

Read This Article →


How to Secure and Manage a Relative’s Computer

Sure, maybe your parents don’t need any help with their PC and your kids are better at technology than you are. But many geeks are called upon to be responsible for a relative’s PC — often after it breaks.

Read This Article →


Advertisement
Download A Crossroads for Windows XP Users: Windows 7 or Windows 8?
Find out what to consider when upgrading from Windows XP to a new operating system. Click here to download

No comments:

Post a Comment

Recent Post