Latest News

Monday, 22 September 2014

Windows Memory Dumps: What Exactly Are They For?

How-To Geek Newsletter
Did You Know?

Lagophthalmos is a medical condition wherein the patient cannot completely close their eyelids (typically as a result of a malfunctioning facial nerve); the most common surgical treatment is to insert tiny plates made of pure gold into the patient’s upper eyelid which provide just enough weight to pull the lid closed.

Geek Trivia

The Best Selling Non-Bundled Game For The Game Boy Platform Was?
The Legend of Zelda: Link's Awakening →
Pokémon Red and Blue →
Super Mario Land →
Dr. Mario →


Advertisement
Download Cloud-Based Video Conferencing for Dummies
Today, your physical presence is no longer mandatory. With the ability to meet virtually, long commutes and whirlwind cross-country meetings can be bypassed. Welcome to the world of cloud-based video conferencing. Click here to download
Geek Comic
Today's Tech Term

Sideloading

Sideloading refers to the process of installing an application on a mobile device from an online marketplace or repository that is not a part of the device manufacturer’s official application distribution channel.

What We're Reading from Around the Web

Windows Memory Dumps: What Exactly Are They For?

When Windows blue-screens, it creates memory dump files — also known as crash dumps. This is what Windows 8′s BSOD is talking about when it says its “just collecting some error info.”

Read This Article →


How to Configure the GRUB2 Boot Loader’s Settings

Ubuntu and most other Linux distributions now use the GRUB2 boot loader. You can change its settings to select a default operating system, set a background image, and choose how long GRUB counts down before automatically booting the default OS.

Read This Article →


B4B – The Next Evolution In The B2B Model [Sponsored]

B4B? Don't we mean B2B? Actually, the term "B4B" was recently coined by the Technology Services Industry Association (TSIA) and represents the next evolutionary stage of the B2B model, one based largely on the "as-a-Service" model. As cloud computing continues to evolve and expand, we believe that business leaders need to recalibrate not only their firms' internal operations, but also their understanding of B2B relationships.

Read This Article →


How to Open the System Information Panel on Windows 8

The System Information panel has always been a great way to get more information about your system, but in Windows 8 you will have a hard time figuring out how to open it. Here’s how to do it.

Read This Article →


An Official Google Drive for Linux is Here, Sort Of — Maybe This Is All We’ll Ever Get

Google introduced Google Drive on April 24, 2012 and promised Linux support “coming soon.” That was nearly two and a half years ago. There’s now a somewhat “official” Google Drive client for Linux, but it’s probably not what you want.

Read This Article →


Prevent Windows Asking for a Password on Wake Up from Sleep/Standby

If you’ve configured Windows to automatically log you in rather than having to enter a password, you might find it annoying that you still need to enter a password when your PC comes out of sleep mode. Here’s the quick fix.

Read This Article →


Why You Probably Don’t Want to Pay Extra for a Faster CPU in Your Laptop or Tablet

When you buy a new laptop or tablet, you’ll often be able to “customize” it by paying extra for a faster CPU. But this may not be a good idea — the higher-end CPU might be a worse fit for the device!

Read This Article →


Jumpshare is a Super Easy Way to Share Files Online

These days, you can share files using all of the different cloud storage providers like Dropbox and OneDrive, but if all you want is a super easy way to share files with people, Jumpshare might be worth a look.

Read This Article →


eMMC vs. SSD: Not All Solid-State Storage is Equal

Not all solid-state storage is as fast as an SSD. “eMMC” is the kind of flash storage you’ll find in cheap tablets and laptops. It’s slower and cheaper than a traditional SSD you’d find in more expensive computers.

Read This Article →


Advertisement
Download A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
Your customer data—and your business reputation—are undoubtedly secure, but is it? Take a look at yourself through the eyes of the cybercriminals who are making today's headlines. Click here to download

No comments:

Post a Comment

Recent Post