How-To

How To Protect Yourself From Threatening “We Have Your Password” Emails

by File in: How-To

Have you received a threatening email with your password in the subject line? Your password has leaked but usually it’s an automated scam with no immediate threat. Here’s how to keep safe. Usually this automated email scam asks for a large ransom in dollars or bitcoin. It may demand that if you don’t respond, your […]

How To Delete Temporary Files & Other Junk On a Smartphone or Tablet

by File in: How-To

Deleting temporary files on your phone or tablet is almost a necessity as time goes on. Your device uses files for a specific reason, but then when it’s done with them, it might not remove them, which can lead to unresponsively, excess storage usage, memory problems, etc. Temporary files are created after apps are installed […]

How To Add GPX Files To Google Maps

by File in: How-To

Google Maps’ map data format of choice is KML, but they do support many other formats including GPX. GPX, also commonly referred to as GPS eXchange format, is an open standard XML type that contains Global Positioning System (GPS) coordinates on top of additional map data. The format has seen increased growth and is used […]

See How Much Your CPU Bottlenecks Your GPU BEFORE You Buy It

by File in: How-To

Buying a new graphics card is one of the great joys of owning a gaming or other high-performance PC. You get to take a computer you currently own and, for a fraction of a whole machine’s cost, upgrade it to current graphical standards. Unfortunately, despite being a key component to gaming performance, your GPU doesn’t […]

How To Move Your Thunderbird Profile & Email To a New Windows Computer

by File in: How-To

Are you struggling to convert and move your Thunderbird profile, settings, and email to a new computer? Many people choose to use Thunderbird as their email client for its many benefits including advanced spam filtering, a good reputation for being dependable, the ability to customize, a high level of security, support for email protocols such […]

How To View A Password Behind The Asterisks In a Browser

by File in: How-To

When you’re on a website whose login details are saved in your browser, the browser automatically fills-in both the username and password fields for you. You may have noticed this behavior while visiting a website where you hold an account. While the username is clearly visible, the password is hidden behind asterisks. It’s common for […]

How To Safely Destroy An Old Hard-Drive

by File in: How-To

The age of privacy appears to be coming to an end, but that doesn’t mean you should willingly give up all your information. Yet that’s what thousands of people do everyday when they throw out an old computer. That hard drive, even if you don’t think it still works, can have all the data harvested […]

Fix Repeating Keys With These Tips

by File in: How-To

If you’ve ever had a repeating key, you will know how annoying it can be. Every time you have to double back to erase a duplicate “i” or “s,” you lose a little time. It may even interfere with your thought flow, killing your productivity throughout the day. The good news is that repeating keys […]

4 Ways To Edit a PDF File

by File in: How-To

When John Warnock, co-founder of Adobe, developed the Portable Document Format (PDF), he wanted to make it easier for people to distribute documents without the need to print them. Surprisingly, it didn’t turn out to be very user-friendly. Not only were the files large in size, but the format didn’t support external hyperlinks and could […]

How To Encrypt Zip Files

by File in: How-To

You’ll want to encrypt a Zip file if you don’t want just anyone to be able to open it. A normal, unencrypted Zip file can be viewed in seconds on most operating systems with a simple double-click, revealing all the files inside. A password protected, encrypted Zip file prevents this, locking down the archive so […]