Tuesday, December 29, 2015

How to Install Applications On a Mac: Everything You Need to Know

mac-applications-folder[4]
Installing software on a Mac is  different from installing software on Windows. There isn’t just one way to install applications on a Mac, either — there are several different ways, depending on the application you want to install.
New Mac users will likely find themselves asking a number of questions: Why isn’t every application on the Mac App Store? What is a DMG file, and why do I have to drag-and-drop the app’s icon after opening it?

Format an External Hard Drive or USB Flash Drive for Mac OS X

 Format a hard drive for Mac compatibility

If you want to insure full Mac compatibility of a new external hard drive or flash disk, you’ll want to format the drive to the Mac OS Extended filesystem. This is particularly necessary for purchases of generic PC drives, which almost always come preformatted to be Windows compatible rather than for Mac OS X.

How to Create a OS X El Capitan Boot Installer USB Flash Drive

Make a bootable OS X El Capitan install drive
Many Mac users like to make a bootable installer drive for installing OS X El Capitan, whether for performing a clean install, or for making it easier to install OS X 10.11 onto multiple Macs. We will walk through creating a bootable install flash drive from OS X El Capitan with the final public version. I have discussed the steps to format and create one using DiskMaker X here.

OS X El Capitan Available to Download Now for All Mac Users

OS X El Capitan now available to download
Apple has released OS X El Capitan as a free update to all Mac users. The new version of system software is officially versioned as OS X 10.11, and the final build number is 15A284. Users can start the download now from the App Store using the direct link below.

How to Create a Bootable El Capitan USB Install Drive with DiskMaker X

http://www.gete.net/ldm/wp-content/images/LDM_Gem.png



With OS X El Capitan, Apple has built on many of the changes that were brought on by Yosemite. And as with previous OS X versions dating back to OS X 10.7, El Capitan is only available for install via download from the App Store.
So if you previously relied on DVD installs, you won’t be able to do so with this version. Luckily, DiskMaker X helps fill the void by allowing you to make a bootable OS X 10.11 El Capitan USB install drive, making a task such as installing on several different machines easier.

Thursday, November 26, 2015

How to Find Your Router’s IP Address on Any Computer, Smartphone, or Tablet

wireless router
Your router’s web-based setup page allows you to change various settings — like your Wi-Fi network’s name and password — and view information. You’ll need your router’s IP address to access it.
On Windows, this is called the “default gateway” address. Macs, iPhones, and iPads simply call it your “router” IP address. Other devices may just call it your “gateway” address, or something similar.

How to Convert Your iPhone’s Live Photos to Still Photos


Apple’s new Live Photos feature on the iPhone 6s and 6s Plus is really cool, but if you don’t want to share them as full Live Photos or just want them as stills, you can easily convert them in just a few steps.

How to Share Apple Live Photos with Everyone

Live Photos are a nifty innovation Apple recently introduced in iOS 9, allowing users to basically shoot short videos that appear as photos. Sadly, the only way to share them easily is with other iPhone users. Here is how to share them with everyone.

8 Things You Can Do With 3D Touch on an iPhone

iphone 3d touch
The iPhone 6s and iPhone 6s Plus are the first iPhones to feature “3D touch“. 3D Touch allows the iPhone to detect how hard you’re pressing, and you can press harder on the screen in some places to do different things.

Thursday, November 5, 2015

10 Ad Blocking Extensions Tested for Best Performance

Blocking website adverts in web browsers has been a hot topic in recent years and there are merits to both sides of the argument. Many sites out there bombard you with tons of ads, and quite often you will feel that you have no choice but to use an ad blocker because either the ads slow down the site loading too much, or they are incredibly annoying and get in the way or distract from your browsing.

How to Change the Display Language in Windows 10

Windows 10 supports changing the default language. You no longer need to be concerned about the default language when you buy a computer — if you prefer to use a different language, you can change it at any time.

Skype gets in on the social game with its own ‘share’ button for websites

Image via Skype
Image via Skype
The social sharing bar is about to get even more crowded. According to GEEKWIRE reportage, Microsoft’s Skype is making a bid for that precious digital real estate with the rollout of its own Skype share button, designed to be displayed alongside similar buttons from Facebook, Twitter, LinkedIn, Reddit, Pinterest and others.

Wednesday, November 4, 2015

How to Enable or Disable Automatic Updates for iOS Apps

00_lead_image_update_badge
Automatic downloads in iOS allow apps, as well as other items, to be updated automatically. This may seem handy, but they can also be problematic because they may use your mobile data without you realizing it. If you have metered data, you probably want to disable automatic downloads.

How to Add a PIN to Your Account in Windows 10

With each new version of Windows, new and innovative features are improving the total user experience in different ways. Windows 10 is quickly growing in popularity due in part to its innovative security features, and among these security options are new sign in options like the PIN code.

Tuesday, November 3, 2015

Authy: Two-Factor Authentication Made Easy

bigstock-Binary-code-background-59902745
Authy is supposed to make two-factor authentication simple and painless by centralizing your accounts into one app. Sounds awesome, but is it safe? Let’s look into it further and find out.
2-factor authentication or 2FA is meant to add another layer of security to your online accounts, so even if your password is compromised, your account can’t be accessed without a special code. This code isn’t something you know until you request it.

5 Different Two-Step Authentication Methods to Secure Your Online Accounts

smartphone security
Many online services offer two-step verification or two-factor authentication. Enable this for an account and it’ll require more than just your password to sign in. You’ll also need something else — and there are many different types of additional authentication methods you can use.
Different services offer different two-step verification methods. But, when you set up two-step verification, you’ll often be able to choose between a few different methods. Here’s how they work and how they differ.

Friday, October 30, 2015

Check out the lists of top 20 most visited Websites in Nigeria

www.alexa.com is an amazon.com company that many advertisers use to target their audience, they also give you better information about a site and to check various website traffic/other ranking like location of visitors, where visitors go after leaving your site and where your visitors visit first before checking on your site. Below are the lists of Nigeria top 20 websites, you can also check full details of others that are not on the top 20 list by typing the website at the space provided and click find to know the site ranking.

Thursday, October 29, 2015

Is WIFI a Silent Killer?

wifi 

Wi-Fi: a wireless network in which you can connect to many devices without the use of cables. Nowadays Wi-Fi is found everywhere. The mobiles phones benefit mostly from it, and the companies which make them have specific instructions for the services so they do not damage our health.
Wi-Fi: a silent killer that kills us slowly
Our wireless devices like phones and tablets use routers to connect online. The router emits WLAN signals – electromagnetic waves that can cause a lot of damage. We ignore this fact because we practically have no knowledge of it. Given time, these signals harm the body. A study conducted by the British Health Agency has proven that routers hinder the growth of people and plants.
- See more at: http://www.weeklyhealthylife.com/wi-fi-a-silent-killer-that-kills-us-slowly/#sthash.1eTc2j8W.dpuf

In this modern world of technology the Wi-Fi network is everywhere around us. It is really a revolutionary way of connecting many devices without using any cables. The biggest benefit from this kind of connecting have the mobiles phones, but the companies that produce them have specific instructions for the services on how to make them not harmful to our health.

Tuesday, October 27, 2015

How to Set Up a Camera to Monitor Your Home When You’re Away

closeup of cctv camera background is a running computer
Whether you’ll be away from home while travelling or just during the workday, you may want to keep an eye on it. Solutions like Nest’s Nest Cam (formerly Dropcam) try to make this easy, but there’s more than one way to do this.
We’re not focused on full security systems with alarms and other features here — just cameras so you can keep an eye on your place with live streaming and video recordings.

How to Create an Image of Your PC Before Upgrading to Windows 10

 

Windows 10 is the biggest and most aggressive Windows rollout to date. Before you take the plunge you need to image your hard drive so, should you wish to return to the familiarity of Windows 7 or Windows 8 you can do so with the click of a button.
Note: This tutorial details how to create a bit-for-bit backup (a disk image) of your current Windows system disk so that you can later restore your computer using that image. If that’s not what you’re looking for and you’d like to actually copy your disk bit-for-bit over to a brand new hard disk (a disk clone) we’d encourage you to check out our detailed tutorial on the matter.

Tested: Should You Unplug Chargers When You’re Not Using Them?

Energy Savings With Turning Off Electrical Appliances
How much energy do your smartphone, laptop, and tablet chargers really use? Should you unplug them when you aren’t using them to save power and money? We measured exactly how much power a variety of common chargers use, and how much keeping them plugged in will cost your each year.
You’ve probably heard of “vampire power” — the amount of power a device uses in standby mode when you aren’t using it. But just how much vampire power does a charger use, and is it worth the hassle of unplugging them when you aren’t using them?

How to Check Your Router for Malware


router

Consumer router security is pretty bad. Attackers are taking advantage of lackadaisical manufacturers and attacking large amounts of routers. Here’s how to check if your router’s been compromised.

The home router market is a lot like the Android smartphone market. Manufacturers are producing large numbers of different devices and not bothering updating them, leaving them open to attack.

How to Hide or Show the Battery Percentage on iPhone or iPad

00_lead_image_battery_percentage
If you find the battery charge percentage in the upper-right corner of your iPhone or iPad screen distracting, it can be turned off easily. However, if you decide you want to easily keep track of your battery life, you can easily turn the percentage back on.
To turn off the battery charge percentage, tap “Settings” on the home screen.

How to Mute Individual Browser Tabs in Chrome, Safari, and Firefox

mute icon
Web pages can automatically play audio thanks to HTML5, even if you’ve set Flash and other browser plug-ins to click-to-play. Most modern web browsers include an audio indicator that will show you which tab is playing sound. Most modern browsers also let you mute individual tabs.
This feature was available behind a hidden flag in Chrome for a while, and is now stable. Apple’s Safari was the first web browser that actually enabled it by default, and Mozilla is working on adding it to Firefox.

Thursday, September 10, 2015

Respect Promises Made to Yourself as if They Were Made to Someone Else

I saw this article written by Patrick Allan and i guess its worth sharing right here for you guys to be inspired.
Respect Promises Made to Yourself as if They Were Made to Someone Else
It’s easy to break a promise to yourself because it only affects you. Here’s why you should take promises you make to yourself more seriously, and how to start off easy so you don’t let yourself down again.

Use 2 different numbers on Whatsapp on same phone with OGWhatsApp!

ogwhatsapp-wasconet-620x350
OGWhatsApp
Once you install OGWhatsApp on your Android device, the app allows you to use two different telephone numbers with WhatsApp from the same smartphone.

How are MAC Addresses Unique?

With the huge volume of Internet connected devices that have been and will continue to be produced, how is the uniqueness of any ‘given’ MAC address enforced? A Network user asked, "Again and again I have read that devices are uniquely identified by their MAC addresses, but how are MAC addresses determined? And do they tell us anything about the devices they represent? How is the uniqueness of MAC addresses enforced?


How are MAC Addresses Determined?
Vendors are given a range of MAC Addresses that can be assigned to their products by the IEEE (Institute of Electrical and Electronics Engineers). MAC Address are assigned to Vendors in various sized blocks as appropriate.
  • The IEEE offers Registration Authority programs or registries which maintain lists of unique identifiers under standards and issue unique identifiers to those wishing to register them. The IEEE Registration Authority assigns unambiguous names to objects in a way which makes the assignment available to interested parties.
You can go to Vendor/Ethernet/Bluetooth MAC Address Lookup and Search to find the vendor given a particular MAC Address or find a MAC Address Range given to a vendor.
Devices are Uniquely Identified by Their MAC Addresses
This is incorrect. Devices are not uniquely identified by their MAC addresses.
  1. In the past vendors have intentionally or by mistake assigned the same MAC Address to multiple devices.
  2. It is possible to change the MAC Address presented by most hardware to the OS, an action often referred to as MAC spoofing:
  • MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) Address of a network interface on a networked device. The MAC Address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC Address of a user’s choosing.

Duplicate MAC Addresses
  • Manufacturers re-use MAC Addresses and they ship cards with duplicate addresses to different parts of the United States or the world so that there is only a very small chance two computers with network cards with the same MAC Address will end up on the same network.
  • MAC Addresses are ‘burned’ into the Network Interface Card (NIC) and cannot be changed. See ARP and RARP on how IP addresses are translated into MAC Addresses and vice versa.
  • In order for a network device to be able to communicate, the MAC Address it is using must be unique. No other device on that local network subnet can use that MAC Address. If two devices have the same MAC Address (which occurs more often than network administrators would like), neither computer can communicate properly. On an Ethernet LAN, this will cause a high number of collisions. Duplicate MAC Addresses on the same LAN are a problem. Duplicate MAC Addresses separated by one or more routers is not a problem since the two devices won’t see each other and will use the router to communicate.
Source: Media Access Control
Further Reading
FAQs: The Registration Authority

Friday, September 4, 2015

How to Fix the “Wi-Fi: No Hardware Installed” Error on Mac OS X

Screenshot_8_31_15__9_02_AM
If you brought your Mac back from sleep only to see that your Wi-Fi isn’t working at all, even after a reboot, you might be experiencing the Wi-Fi: No hardware installed error. And luckily it’s really easy to fix.
Essentially what has happened is that the MacBook lost track of which devices are supposed to be powered on and which are supposed to be powered off, and it just left your Wi-Fi completely turned off even though the rest of the computer is on. It’s like when you wake up and your arm is still asleep because you slept funny. The rest of you is ready to go, and your arm doesn’t want to work.
Luckily you can fix this very simply by resetting the System Management Controller (SMC), which is as easy to do as pressing a couple of keys.

Thursday, August 27, 2015

How to Set Up a Camera to Monitor Your Home When You’re Away

closeup of cctv camera background is a running computer
Whether you’ll be away from home while travelling or just during the workday, you may want to keep an eye on it. Solutions like Nest’s Nest Cam (formerly Dropcam) try to make this easy, but there’s more than one way to do this.
We’re not focused on full security systems with alarms and other features here — just cameras so you can keep an eye on your place with live streaming and video recordings.

What to Do When You Forget Your Wi-Fi Password

Wireless modem transmitting digital data. Digital illustration.
You may have misplaced a Wi-Fi password, but your laptop probably remembers it if you’ve connected in the past. If not, you can always grab the password from your router itself or reset the Wi-Fi passphrase and set a new one.
These tricks allow you to recover the passphrase to any network you’ve connected to in the past from your laptop. You can then easily log into those networks from other devices or share the password with your friends.

How to Block An Application from Accessing the Internet with Windows Firewall

Most of the time we want our applications online and connected to both our local network and the greater Internet. There are instances, however, when we want to prevent an application from connecting to the Internet. Read on as i show you how to lock down an application via the Windows Firewall.

Why can Data be Recovered After Formatting?

Someone once asked, "If a quick format just marks bits as writable and a normal format writes zeroes to the entire disk, why do people bother with DBAN and why are multiple passes ever required? Why can data be recovered after formatting?

Friday, August 21, 2015

What to Do When Your Android Phone or Tablet Won’t Turn On

android wont turn on
You turn on your Android phone or tablet by pressing its power button — simple. If that button won’t work, your device isn’t necessarily broken — there are ways to bring it back to life.
This problem can also be caused by hardware damage. Your phone or tablet may not be powering on because it’s broken. But, if there’s a software problem, the steps here will fix it.

How to Test Your Internet Connection Speed or Cellular Data Speed

internet speed
How fast is your Internet connection? Sure, your Internet service provider has given you some numbers, and your cellular provider probably says you get blazing fast 4G LTE. But how fast is it, actually?
There’s a good chance you’re not getting the Internet connection speed you’re paying for, but maybe you are. Here’s how to find out.

How to Fax a Document From Your Smartphone

Receiving a FAX
You can sign a PDF document from your phone, tablet, or any other computer and email it off to someone. But some organizations still don’t accept documents via email — you may need to fax documents instead.
No, you can’t use your smartphone’s phone connection as a fax machine or dial-up modem. You’ll need to rely on an app or third-party service that does the faxing for you, just as you would sending the occasional fax from your PC.

Start Your Own Internet Radio Station for Free


If you're the kind of person who insists on handpicking a road-trip playlist rather than just setting your music player to shuffle, you were born for radio, baby. Fortunately, you don't have to let your daily life get in the way of your broadcasting fantasies. As long as you have a PC with a broadband connection, you have what it takes to inflict your talk-radio rants or musical taste on anyone who'll listen.

Sunday, August 16, 2015

How to Clean Install Windows 10

windows 10 pc
The Windows 10 upgrade process drags old files, settings, and programs from your previous Windows system to your new one. Microsoft allows you to get an entirely fresh system by performing a clean install, but the activation process can be a bit confusing.
This is also useful if you’ve purchased a new Windows 10 PC and it includes manufacturer-installed bloatware you don’t want. Or, you may need to perform a clean install on a computer without an existing Windows system after installing a new hard drive.

Sunday, August 9, 2015

Password Protect & Encrypt Files or Folders in Windows: Free

With hackers becoming more and more sophisticated, most users are worried about the safety of their personal data. There are many options available to protect the user’s data but none comes close to encryption in terms of safety offered. This article contains some of the best and easy to use methods and tools that allow you to password protect and encrypt important files and folders in Windows without costing you anything.

Enable the Hidden Administrator Account on Windows 7, 8, 8.1 & 10

Windows automatically creates an Administrator account with elevated privileges during the installation process. We mostly need to access it to perform tasks limited only to system Administrators. These are tasks performing which result in the UAC asking for confirmation even if you are using an account with administrative privileges. The elevated Administrator account is disabled by default in Windows 7, Windows 8, Windows 8.1, Windows 10 and Windows Vista.

Notepad Tricks: Cool Notepad tricks for Windows

Notepad, the text editor that comes bundled in Windows is an excellent tool for text editing. But that is not the only thing for which notepad is famous. It is also famous for its tricks and hacks. Here is a roundup of some of the best and coolest tricks that you can try using Notepad.

Friday, August 7, 2015

Simple Quiz to test your knowledge

Nigeria Test Quiz

Welcome to Nigeria info knowledge test
  1. Where is the capital of kaduna State?

  2. Damaturu
    Kaduna

  3. How many local government are in Delta State?

  4. 21
    25

  5. Who was the Head of State of Nigeria in 1990

  6. IBB
    Abacha

  7. President Mugabe is from where?

  8. South Africa
    Zimbabwe

  9. Nasir El' Rufai was the Minister of .......

  10. Solid Minerals
    FCT Abuja

  11. Nigeria comprises of _____________ States

  12. 36
    37

  13. Who is the Current Vice President of Nigeria?

  14. Osinbajo
    Osinbaji

  15. Zuma Rock is located where?

  16. Abuja
    Niger State

  17. Banana sland is in which State?

  18. Ogun State
    Lagos

  19. Lokoja is in which state?

  20. Kogi
    Kwara

How to Root Your Android Device & Why You Might Want To

Android geeks still often root their devices, and you can usually do it yourself in just a few minutes with one of these easy tools. After you root your Android phone or tablet, you’ll have full access to the entire system.
Rooting has become less necessary over the years, but it’s still necessary if you want to run certain types of apps. You get to choose which apps get root permissions and which don’t.

How to Improve Battery Life with Windows 10’s New Power Settings

While Windows 10 is getting a lot of press for its “new” Start menu, beyond that there’s still a lot of stuff most users who skipped Windows 8 probably don’t know about. Today we want to talk about Windows 10’s power and battery settings.
The quickest way to access the settings is to open the Action Center and click “All settings”.

How to Set Up and Configure User Accounts on Windows 10

Windows 8 introduced Microsoft accounts, which are essentially roaming accounts that allow you to sync settings and files from computer to computer. Today we want to discuss what Windows 10 brings to user account management, and the options available to you.
In the old PC settings on Windows 8.1, you were limited to three options, but in Windows 10, those options have been expanded to five and things have been rounded out quite a bit.

Sunday, June 28, 2015

How to Charge Your Phone or Tablet Faster

Solar Mobile Phone Chargers on grass in nature
Not all charging is equal. If your smartphone (or tablet) is low on battery and you only have a limited amount of time to charge it, here’s how you can get the most juice possible.
These tips should work for practically anything that charges via USB, including cameras, peripherals, and any other device you might have.

How (and Why) to Change Your MAC Address on Windows, Linux, and Mac

ethernet-network-interface
Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can change, or “spoof,” MAC addresses in software.
MAC stands for “media access control.” MAC addresses are also commonly referred to as physical addresses or hardware addresses, because they correspond to a hardware adapter.

How to Detect if Someone's Stealing Your WiFi

Internet Connection Image Gallery 



It may be hard to imagine, but just a mere 20 years ago, the Internet was nothing more than a novelty -- a way for incredibly smart college professors and researchers to share information, and for a few people to network across the newly developed World Wide Web. E-mail was nothing like it is today. The primitive e-mail systems found at universities or even through accounts offered with the first Internet service providers (ISPs) such as Prodigy and America Online were often difficult to use.

What Exactly Is a MAC Address Used For?

Every piece of hardware on your local network has a MAC address in addition to the IP address assigned to it by the local router or server. What exactly is that MAC address for?

Saturday, June 27, 2015

Can Connect to Wireless Router, but not to the Internet?

http://www.thecomputeradvisor.net/gallery/wireless-connection-problems/wireless_connection_problems.jpg

Have you ever run into the situation where you could connect your laptop to your wireless router, but could not browse the Internet? There could be several things going on in this kind of situation, either your computer has a problem or the router cannot connect to the Internet via your ISP.
So if you’re able to connect to a wireless network, but can’t get out to the Internet, then first check to see if it’s your compute or the router. You can do this by trying to connect to the Internet from another computer connected to the same wireless network.

Tuesday, June 23, 2015

View Saved Wi-Fi (WPA, WEP) Passwords on OS X

Just about everybody who has a laptop has probably connected to several different wireless networks over the course of time. I tend to travel a lot and take my laptop with me everywhere I go, so I literally have over a hundred wireless networks stored on my Mac. This is great because I can easily connect to those wireless networks whenever I’m in range again, even if it’s 6 months later.

5 Easy Ways to Speed Up a Slow Windows 7 Computer

In terms of optimizing your computer,  99 Ways to Make Your Computer Blazingly Fast is tough to top; but if you don’t have the time to initiate all of those helpful fixes in one session, there are some quick and easy steps that you can take to rejuvenate a slow computer, all in under an hour.
Check out the top 5 ways to speed up a slow Windows 7 PC. Most of these fixes and maintenance procedures are common practice for a computer geek, but may be a gold mine for a beginner PC user looking to make their computer fast again.
Alienware Area 51

Friday, June 19, 2015

10 Top Tips for Bathroom Safety

Image result for bathroom accidents
Don’t let your own home be a safety hazard. A few simple steps can help prevent slips and falls.

How to Build a New Custom PC Without Stressing Yourself

We love building our own computers but it takes quite a bit of time. If you love to build but find you don’t have the time, a custom-built PC still gives you control over your components, while leaving the actual assembly up to someone else.
When considering a new computer, you can buy, build, or just get a laptop. Either way, buying a PC or laptop is pretty easy while building you own computer is akin to anything else that takes care and assembly. There’s a process – research, gathering, assembly, testing – and and while you can certainly research and gather in tandem, you can’t do anything else until you have all the parts.
Altogether, it can take a considerable effort because when it comes right down to it, you’re spending money and you want the best computer for your budget. You don’t simply want to buy the first components that pop up in your search results.

Monday, June 15, 2015

How to Easily View Recently Modified Files in Windows

To find just about anything in Windows, type something describing the file in the search box. Windows will then quickly search all your files, and present a list of matches according to your search criteria. Today we’ll show you how to find files you’ve recently modified.

Sunday, June 14, 2015

How to Remove Delta Homes Homepage & Other Annoying Unwanted Homepages

One of my clients called me on Thursday complaining bitterly about how deltahomes.com page took over her browser homepage despite changing it from the Tools/Options menu tips i gave her. I decided to see for myself because she is the impatient client when providing solution to her on phone. 

Saturday, June 13, 2015

How to Import iPhone Pictures and Movies into Picasa

If you’re a fan of Google’s Picasa picture management program and the iPhone, you’ve likely already discovered the unfortunate state of affairs: with the default settings Picasa can’t import pictures from iOS devices. Read on as we show you how to tweak your workflow and get things importing smoothly.

Monday, June 8, 2015

Restrict Access to Programs with AppLocker in Windows

If you share a computer and don’t want other users accessing certain applications, there is a new feature in Windows 7 that allows you to block them. Today we take a quick look at restricting what programs other users can access using AppLocker.
Note: AppLocker is only available in Ultimate and Enterprise versions of Windows 7.
Using AppLocker 

Monday, June 1, 2015

25 Computer Networking Tips

25 networking tips 

Running a home network is pretty essential in this day and age.
Thankfully, modern hardware and software has reduced the complexities of configuring networks down to a few setup screens, and the relevant hardware often comes free with an internet connection.
If you have multiple computers, the chances are they're already talking to each other, either through wires or wirelessly. However, while your home network might be up and running, optimising it takes some doing. Follow our simple tips to extract the last drop of juice from your network hardware.

Friday, May 29, 2015

Understand Privacy and Security Settings in OS X to Keep Your Data Safe

If you use OS X, you probably have perused its security preferences on several occasions. These preferences are fairly straightforward, but there are some notable features about them that merit further exploration.
System security should always be one of a user’s primary concerns. We’re not just talking about strong passwords and firewalls, there are other considerations that you want to make such as encrypting your hard drive, which services can poll your location, and what apps you can install.
The range of security concerns on modern systems is fairly vast and wide, thankfully most operating system makers have developed ways to make it pretty easy and painless to users. Android for example, has refined how its notifications display so you can hide sensitive notification content on your lock screen. Meanwhile, iPhone and iPad users can effortlessly unlock their devices with any of their fingerprints.

Friday, May 1, 2015

How to Turn Your Computer Into a DLNA Media Server

dlna
Many boxes you plug into your TV, including the Roku, Xbox 360, Xbox One, and PlayStation 3 offer DLNA (“Digital Living Network Alliance”) streaming support. They can stream video files and music over the network from your PC — as long as you set up a DLNA server first.
This feature is also known as “Play To” or UPnP AV. Using it is easier than you might think, as the server software you’ll need is built into Windows. if you want to play media files from your computer on a DLNA-enabled set-top box, it’s useful.

Sign PDF Documents Without Printing and Scanning Them From Any Device

Man Signing With A Pen An Official Document
Need to sign a document and email it? Don’t print, sign, and then scan it back in again. Skip the entire process and apply your signature electronically. It saves time and you don’t need a printer or scanner.
All the below tools also let you type words into a document, so you can fill out forms without printing them first. This even works if the form isn’t “fillable” — type words and position them in a place that looks correct.