The growing presence of screens in our lives has transformed their safety into an issue that some are taking so seriously, they are calling it a crisis.
Read this first if you are getting a new mouse and wonder if laser mice is worth the extra cost.
The general impression of Windows 10 is mostly good. What makes Windows 10 so special that it’s starting to change the public’s opinion of Microsoft, if ever so slightly?
Here are some questions (and answers) about video card specifications that don’t seem to be fully explained in terms everyone can understand on the web.
YouTube has added for videos to stream at 60 frames per second as opposed to its usual 30. Is this something we should be excited about?
Do you have difficulties understanding the specifications on a graphic card data sheet? Learn about the obscure GPU specification here.
If you really want to be anonymous on the web, here are a few things you got to know and also learn a couple of tenets.
Google has just discovered a POODLE exploit that can affect millions of browsers worldwide at this moment. Let’s see how you can protect yourself from POODLE exploit.
You may understand what social engineering is, but are not sure how to properly defence against it. Here are a couple of advices for you.
Other than WPA, MAC filtering is another feature to enhance the security of your WiFi router. Learn why this little setting is insurmountably powerful.
There were news that the FBI was able to spy on people’s webcams without them knowing. How is this possible? Let find out how this hack was done.
In the world of gaming, there has been a recent move by major publishers to release their games with 64-bit support. Why is this so? Let check it out.
One way to encrypt your files is via the public/private key. Let’s take a look at the public key encryption concept to understand how it can protect you.
Nowadays, many devices come with an IP code and can withstand harsh conditions. Let’s see how the IP code system works and what you can do with your device.
Instead of giving your credit card, Visa came out with a token concept to enhance web security. Is it useful? Let’s check it out.
You’ve probably seen the term RFC thrown around in applications that you’ve been using. What is this mysterious RFC that people been talking about? Let’s find out.
We are coming closer to creating supercomputer that can function as digital brain. Can we really speed up cancer research to the point of finding a cure with the help of these mega-thinkers?
Smartphones are now becoming an integral parts of our lives. Is this necessarily a bad thing? It’s time we explored this!
Are you looking to get a gamepad for your PC? You will want to read this guide first before you go shopping for the gamepad.
There has been a heated debate on whether WiFi signal is safe for our health. Here’s our take on that.
You probably have heard the term “end-to-end” plenty of times, but what is it really about? Read on to find out more.
Here is an easy way to disable the Autorun feature in Windows to protect yourself from autorun viruses in USB drives.
Banks have been issuing contactless debit cards since 2008. These contactless cards allow you to pay by just tapping on the reader, but is it safe? Let check it out.
Most smartphones (and tablets) come with phone memory range between 8 and 32 GB. Will this always be the case? How much bigger can mobile devices really get?
Despite the fact that fiber is amazingly fast, it’s not necessarily delivering the Internet speed it promises. Check out the reasons why is this so.
You are probably not aware that Flash has an “Rosetta” exploit. Here is what you need to know about Rosetta Flash exploit and what you can do about it.
Internet transmission speed on fiber optic cable is much faster than the old copper infrastructures we relied on for decades. Why is this so? Let discuss it.
Sometime in 2015, Microsoft will be releasing Windows 9. If you are wondering what will be in Windows 9, here are 3 things that you should know about.
The word “API” is flashed around a lot, but it seems that only developers know what it means. For the general public, here is what an API does.
Google has recently revealed the developer preview of Android “L”. Let’s see exactly what we can expect to experience in this new operating system.
When you are looking for a new webcam, you might have noticed some products known as IP cameras. If you’re wondering what those are, here’s the explanation.
A couple of international powers have decided that it’s time to move on to 5th generation mobile networking. Here’s what you need to know about 5G.
Most XSS attacks are preventable by the potential victim. It is your responsibility to arm yourself against any threat lest you become a victim.
Even after you’ve cleared your browser’s cookies, or even disable them entirely, companies are still able to get hold of your browser history. Here’s how.
The current battery technology is lacking behind the smartphone technology. How can we create a new battery that can keep our phones running for days?
Google has been testing their driverless vehicles for past two years. Is it ready for prime time? Here’s what you need to know about driverless vehicles.
There are over 4 billions people have no access to Internet. How can we promote internet access to the rest of the world? Check out these solutions.
You probably have been dreaming of a home automation solution, but not sure how it really works. We’ll explain how it works and the role of the smartphone.
If you want to save Mother Nature and cut down your electric bill, greening up the electronic devices in your home is the best solution. Here is how you can do so.
Internet privacy has always been a major issue. It’s time to address this and show you how you can ride the waves of the post-privacy internet.
Are you confused on what DHCP is and if you should disable it to make your network more secure? You won’t be after reading this.
As the world of screens starts getting more advanced, it’s time to think about how far we are from achieving a viable model for holographic technology.
When you’re going on a trip, don’t forget to protect what’s nearest and dearest, your electronic devices, in the best fashion possible.
As of late, many people have been hacked and are the victims of password leaks and Trojan horse infections. The following are some tips if it happens to you
What if I tell you that your encrypted data may already be cracked by the hackers? Here are some examples why encryption is not as safe as you may believe.
There are many reports about net neutrality and how it can affect us all negatively if it would be removed. Let’s see how it can protect us as a consumer.
If you are always wondering why the Internet provider have slow connection speed, you may want to find out more about wireless spectrum and the crisis it is facing.
Intel has recently started to produce CPUs for mobile. How does its mobile chipset stack up against ARM? Will Intel be able to beat ARM at its own game?
You’re probably so used to charging your devices that you don’t realize how inconvenience it is. Can we see a future without having to charge our devices? Let’s find out.
Things just don’t work the way they should in the Internet. Here are some things you should know about the OpenSSL “Heartbleed” bug and how it affects you.