Saturday, July 19, 2014
Wednesday, July 16, 2014
iPads and Android tablets can’t run Windows apps locally, but they can access a Windows desktops remotely — even with a physical keyboard. In a pinch, the same tricks can be used to access a Windows desktop from a smartphone.
Microsoft recently launched their own official Remote Desktop app for iOS and Android devices. Microsoft’s official apps are primarily useful for businesses — if you’re a typical home user, you’ll want to use a different remote desktop solution.
Windows 7 and 8 create a special “System Reserved” partition when you install them on a clean disk. Windows doesn’t assign a drive letter to these partitions, so you’ll only see them when you use Disk Management or similar utility.
The System Reserved Partition was introduced with Windows 7, so you won’t find it on previous versions of Windows. The partition is also created on Windows Serer 2008 R2 and newer Server versions of Windows.
Passwords can be reset or bypassed on every operating system. On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files.
On other devices where you can’t gain access to the files, you can still reset the device and gain access to it without knowing a password. These tricks all require physical access to the device.
Yes, some Android apps can be malicious — Apple, Microsoft, and the media seem happy to remind us about this. Take a few basic precautions and you can avoid these potentially dangerous apps.
Google doesn’t manually approve apps like Apple does, but they do scan apps in the Google Play Store for malware. Permissions, reviews, and other reputation information can also tell us a lot.
Have you ever wished you had an extra Hard Disk to store files, share, or set aside as an encrypted vault? One of the new features in Windows 7 is the ability to create Virtual Hard Disks and we’ll show you how.
BitLocker normally encrypts entire drives and partitions, but you can also create encrypted container files with tools built into Windows. Such encrypted VHD files can easily be moved between systems, backed up, and hidden when not in-use.
This trick allows you to create TrueCrypt-style encrypted volumes as files on your computer. Like other BitLocker features, it requires a Professional or Enterprise edition of Windows, or Ultimate for Windows 7.
Searching for a singular file or file type is one thing, but what do you do when you need to search for multiple file types at the same time? Today’s SuperUser Q&A post comes to the rescue for one reader’s file search dilemma.
Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites.
Safe mode can help you troubleshoot your Android, but sometimes you’ll need to wipe everything and restore your device to its factory state. You can even perform a factory reset when your Android phone or tablet won’t boot normally.
Ensure you have any important data backed up before doing a reset. This includes your Google Authenticator credentials, which will be lost during the reset. Disable two-factor authentication on your accounts first or you’ll experience some trouble afterwards.
Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don’t wait until you’ve lost your hardware to think about this — these features need to be enabled ahead of time.
This requires that the device is powered on and has a connection to the Internet. This is easy if you’re tracking a phone with a data connection, but harder if you’re tracking a laptop that may be offline or powered off.
Tuesday, July 1, 2014
Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network.
You’ve got WEP encryption enabled, your network’s SSID is hidden, and you’ve enabled MAC address filtering so no one else can connect. Your Wi-Fi network is secure, right? Not really.
It’s important to secure your wireless network with WPA2 encryption and a strong passphrase. But what sorts of attacks are you actually securing it against? Here’s how attackers crack encrypted wireless networks.
Computers need cooling to remove the heat their components generate during use. If you’rebuilding your own PC — especially if you’re overclocking it — you’ll need to think about how you’ll cool it.
Heat build-up can actually damage your computer’s hardware or cause it to become unstable. Modern PCs may shut down and refuse to operate if they reach a potentially unsafe level of heat.