Computer users have numerous reasons for finding and deleting duplicate files on their systems. Some of the top reasons include freeing up storage space and better manageability of files in the operating […]
Linux, being a multi-user system, begs for you to configure it such that all users initially experience exactly what you want them to experience. One option you have, which is very easy […]
Several elements in the Windows operating system have been restricted by Microsoft. It is for instance not possible to pin folders to the Windows 7 taskbar, or to add programs to the […]
When is a computer idle? A friend of mine asked me that question the other day after playing around with the Windows Task Scheduler for a while. One of the conditions that […]
I do not like ad blockers as I make my living from those ads. The more users install ad blockers, the less money I make. It is that simple. My hope is […]
Microsoft's .NET Framework has become an integral part of the Windows operating system. Windows 7 for instance ships with the .NET Framework 3.5, which means that users can run applications that require […]
Entertainment on the go has become a must for travelers. People who listen to music or watch something all the time are so accustomed to doing those things that they almost feel […]
Unregistered users who want to download files from the file hosting service Depositfiles need to wait 60 seconds before they can download the first file. Additional time limits are added once a […]
I have been working with WordPress for the last six years and it has been a pleasant ride for most of the time. WordPress offers a lot, considering that it is free […]
When you work long hours on the Internet, either for business or pleasure, you will eventually come upon a web page that is not loading properly. Reasons for this behavior are manifold, […]
Keeping Adobe's Flash Player up to date is an essential online security tasks. Users need to make sure that the Flash plugin is up to date to protect their computer system from […]
Back in 2008 I reviewed a small application to download music from Deezer, a popular free music streaming service at that time. The application reviewed back then has not been updated since […]
How big are the add-ons that you use in the Firefox web browser? You do not get an answer to that question in the web browser. The add-on manager displays all kinds […]
Most Firefox users remove add-ons and userscripts from within the web browser. I'm currently testing the latest builds of the upcoming Firefox 4 browser and noticed that it is not possible to […]
You have taken those beautiful photos on your last vacation, only to find out that some of them show objects on the screen that should not be there. Additional people for instance, […]
I have been a fan of Enlightenment for a long, long time. It's one of the most elegant desktops available today. But not only is it elegant looking, it's a joy to […]
One of the major causes for PC infections with worms, viruses and trojans are USB devices that are connected to the computer. Vulnerabilities in the past have shown that it is sometimes […]
I sometimes take a look at PCs of friends and family, usually because something is not working and they asked me to, and to a lesser extent when they bought a new […]
Update: Microsoft has since then integrated Kinect system in the recently released Xbox One gaming system and also made it available for computers running Windows as well. Update 2: Since Kinect raised […]
Update: The Folderpane Tools extension is not compatible with recent versions of Thunderbird. You can use the extension Manually Sort Folders instead which enables you to sort accounts and folders in the […]
Many web users do not know that web services often offer two connection options. The standard http connection and the more secure https connection. Users who connect to email services like Hotmail […]
Question: Why are many companies still working with Internet Explorer, when newer browser versions are available for Windows? Answer: Because of applications and services that have been designed to work in Internet […]
Hiding a hard drive or partition in Windows can be an effective way of preventing access to a drive's content. The method is not foolproof though, and users with enough time on […]
Lets say you are currently working on a computer where you have standard user rights. This means that you cannot install software that requires elevated privileges, nor that you can perform operations […]
The default way of copying items from the Windows command prompt is not the most effective option available. To copy items from the command line users need to right-click and select mark […]
Websites and services can use several techniques to identify a specific user visiting their properties, or third party properties they are affiliated with. Among the most common ones are standard HTML cookies, […]
Do you sometimes power on your computer and leave immediately afterwards for other activities, like making coffee or breakfast, taking a shower or going into a meeting? There are two possible scenarios […]
Icons are used in numerous applications both online and offline. Some of the most notable ones are browser favicons that display in the address bar and bookmarks, and program icons that visualize […]
All hard drive manufacturers have announced the first wave of 3TB (that's 3 Terabytes) hard drives in the first half of 2010, and first 3TB hard drives like the Western Digital Caviar […]
I use the online virus scanning service VirusTotal on a regular basis, for instance to check files before I download them to my local computer system. Especially useful for programs that are […]
It's hard to believe that the web as we know it is still a teenager. No other teenager in all of history has had such a massive impact on life. Throughout world […]
Chrome Toolbox is a new extension for the Chrome web browser that aims to improve a user's productivity in numerous ways. All features of the extension become available after installation. A right-click […]
Vulnerabilities have moved into the focus of many Internet users. This time it is a new 0-day vulnerability for Microsoft's Internet Explorer that could allow remote code execution on the target system. […]
CopyTo Synchronizer, a once commercial software has been released as a freeware a few days ago. The free software offers an impressive set of options to back up and synchronize data. It […]
If you are a Linux user who frequents the command line, you will most likely have heard of the bash history. This is a special system that keeps a history of all […]
The history stores information about previously visited websites. Every web browser offers this feature, and the major difference is the way it can be accessed. Firefox users for instance can display the […]
Many stories here at Ghacks are based on my personal endeavors in the computing world. I tried to find a program to split a text file into multiple smaller files just recently. […]
Google Chrome users have an option to enable experimental browsing features for some time now. Previously all they had to do was enter about:labs into the Chrome address bar to open the […]
The mouse speed settings configured in Windows apply to every mouse connected to the computer system. A laptop's touchpad for instance has the same speed settings as a mouse that gets connected […]
It is not that complicated to create a TrueCrypt container, but it does take some time. You need the TrueCrypt software obviously to do that, and someone with admin rights to install […]
Please click on the following link to open the newsletter signup page: Ghacks Newsletter Sign up
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.