You’ve probably heard of how hackers easily infiltrate Windows networks of unsuspecting people. If you stick your head out of the water frequently and interact with other people on the Internet, you might also run the risk of being attacked at some point in time or another. By following a couple of tips, you can […]
Signing documents has just become that much easier. So often I’ll get a contract via email, either for insurance, a new loan, or a new job, and I’m asked to sign it and send it back through email. While it’s not a difficult process, it can be somewhat of a pain to go through all […]
There are a lot of options out there for music players. We have talked about a few music players for your computer and music players for your mobile devices. Winyl is a great replacement for a desktop music player.
If you’ve just bought a fancy new solid state drive, you might want to move a select few games across for improved performance and loading times. You may also just be running out of space on your main drive and feel like relocating a game to a secondary hard drive. Unfortunately the guys at Valve […]
KDE offers one of the most comprehensive and flexible notification systems (KNotify). In addition to system notifications, nearly every program has notification settings that are integrated into the larger desktop environment. Moreover, KDE’s notification system is configurable for just about any type of user, including those who need specific accessibility features.
If you’re a hobbyist that runs a home server, or even a regular computer user that wants to get things done quickly, you will know how important it is to start Windows quickly. There’s nothing worse than having to restart a server and have your visitors tolerate 3 minutes of downtime. Add another 5 minutes […]
With all the exciting changes in iOS 5 and Mac OS Lion, an Apple ID is more important than ever. It has become very essential to your whole system, whether mobile, desktop, or a combination of the two. With all the syncing on behalf of iCloud, it’s all done with an Apple ID. It’s how […]
If you are using SSH frequently to connect to a remote host, one of the way to secure the connection is to use a public/private SSH key so no password is transmitted over the network and it can prevent against brute force attack.
Consider a situation. You took photos during your friend’s birthday party and it is time to upload them on Facebook or email them to other friends. Normally, the photos taken using digital cameras are large in size, which makes it really difficult to upload them or even email them to anyone. A good solution is […]
We have covered plenty of Gnome Shell tips here in Make Tech Easier, but we also know that those are not enough to satisfy all of you. So here you are, more Gnome shell tips and tricks for you. Install Gnome Tweak Tool Before we begin, it is best that you have Gnome Tweak Tool […]