How To

You need information to make intelligent choices about how to save energy in your home. Data is power. Here's how to get started.

Apply these tips to prevent bad actors from using your IP address to load malware onto your devices, serve you with ransomware, hack into your financial accounts, or steal your entire online identity.

Do you want to run a full Linux desktop installation on your Chromebook without giving up ChromeOS? This alteration will give you access to both complete operating systems running simultaneously so you can move between them with a keyboard shortcut.

Making Windows fully restart without having to login again after a power failure is handy. The process is fairly simple if you follow these steps.

Keeping safe in cyberspace is increasingly difficult as crooks try to exploit uninformed users every chance they get. Add to that, virus and malware threats are never-ending. Here are five things in your control to help keep your digital activity safe.

Be suspicious at the first sign of your phone behaving oddly. Both the Android and iOS smartphone platforms present the same set of common symptoms to indicate malware may be at play inside your device.

If you’ve run any operating system for any length of time, you will probably have encountered strange phenomena. Here are a few routes you can traverse to track down suspicious behavior on your Linux system.

HOW TO

Computers Use Processes, So Should You

Writing about technology over the years I've produced many guides on how to do cool stuff with your computer. However, without the right foundation, even the most thorough guide can leave room for pesky variables to creep in. This made me realize how important it is to establish what firm footing fo...

One of the fundamental choices that an e-commerce retailer must make is the platform they use to sell their goods and services, because it's not just a store -- it's a place to connect with customers and create a sense of the brand. We spoke with several e-commerce experts to get their take on how r...

HOW TO

Bolt-On Security the Linux Way

In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...

Picking the ideal Linux distribution takes research and planning. Not because Linux is a challenge. Rather, the Linux OS offers a seemingly unending selection of distributions to meet general computing as well as special needs for enterprise, SMBs, and personal use. Deciding which distribution of Li...

In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi.

For the majority of consumers, cutting the cable TV cord is a mixed bag for a variety of reasons. The big misconception is that you will drastically lower your cable bill. That is not the case unless you can also pickup free TV reception from an antenna. Otherwise, you will need to use a video strea...

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

Technewsworld Channels