With a little help understanding the basics, the dmesg command can become a very powerful tool in a system admin’s tool-set.
Google has released two new Android apps for Google Docs and Google Sheets which saves us from having to dig around within Google Drive for docs and sheets.
If you’re using a PDF document with some sensitive information, the easiest method to password protect it is to simply encrypt the PDF file.
With Outlook.com, it seems that Microsoft has hit the jackpot with an email service that competes with Gmail. Read on to find how to import IMAP messages.
As of late, many people have been hacked and are the victims of password leaks and Trojan horse infections. The following are some tips if it happens to you
Looking to create a dynamic resizable disk for file distribution or storage on your system, external media or on a local network server. Follow this tutorial.
What could be causing the downturn of the tablet craze? Are people over the whole tablet thing? Are tablets part of your Internet experience?
Getting your computer stolen can be the worst feeling. The following is how to remote wipe a Linux computer when it is stolen to protect your info and data.
Experienced Linux users will find themselves wanting to install multiple distributions. This walks you through a dual boot, adding Ubuntu and Fedora.
Using some of the password managers listed, you can have all of your login data handy and use them at any time you want. Included here are 8 of the best.
To get rid of profanity and offensive content on your site, you can either moderate every single post manually, or automate it with an external tool. WebPurity is one useful tool built for this purpose.
If you use Firefox, an add-on called SuperDrag allows you to open links by simply employing the drag and drop function of your mouse.
Check out the funny ads below, the work of HonestSlogans, that are more truthful than their real counterparts.
Recently I noticed my laptop working more slowly, so I decided to ditch the “heavy” OS and change to a lighter distribution – Windows to Linux.
Here’s a look at which flagship phones or apps are able to defocus the background of pictures and the approach they take to do so.
In the following tutorial, we’ll show you how you can map and bind shortcut keys to your Wine program on your Linux machine.
What if I tell you that your encrypted data may already be cracked by the hackers? Here are some examples why encryption is not as safe as you may believe.
Google has been scanning your emails so as to serve you targeted ads. Here is how you can opt out of the system and stop Gmail from showing you targeted ads.