Every version of Windows ships with a list of installed services that control features of the operating system. While some are essential for the operating system others are optional or only required […]
Mozilla will release new versions of the Firefox web browser for all supported channels later today. This brings the stable version of the browser to version 37 while Beta, Aurora and Nightly […]
Update: This is uTorrent's official statement on the matter. This morning users on the uTorrent forum started to report that EpicScale, a Bitcoin miner, was installed on their systems without their permission […]
Verizon Wireless is a large wireless telecommunications provider owned by Verizon Communications. It came to light last year that Verizon Wireless injects unique identifiers into web requests that company customers make on […]
Computer hard drives and other storage devices will fail eventually. While you may be able to use them for years without any issues, failures can happen from one moment to the next. […]
Cisco announced back in October 2013 that it would release an open source H.264 codec in the near future that would be made available to open source projects so that these projects […]
Mozilla Firefox is without the shadow of a doubt the browser that you can customize the most. This shows not only when it comes to (most) feature additions or changes, as there […]
If you use more than one computer, be it multiple desktop PCs, mobile devices, laptops, or remote servers, you are probably using some form of synchronization to transfer data between devices. As […]
Most mobile devices are protected by a PIN that needs to be entered before access to its functionality is granted. Depending on what type of mobile operating system you are using, that […]
The term screen capture may refer to taking a screenshot of the desktop or part of it, or a screencast which is a digital recording that records activity over time. This guide […]
The Firefox 28.0 update introduces several new technologies to the browser. Mozilla has added VP9 video decoding support, support for Opus in WebM, improved volume controls for HTML5 media, and its GamePad […]
Opera Software introduced Opera Turbo as a new feature in Opera 10 back in 2009. The feature enabled you to compress web traffic to speed up web browsing. You can check out […]
There are several ways how attackers gain access to Internet accounts. One common attack form is to attack servers on the Internet directly, to download the user database. While most companies protect […]
Update: We have published a new NoScript guide for Firefox 57 and newer. One of the core reasons why I'm using the Firefox web browser on my desktop PC and not another […]
It has been a while since I last mentioned the programs and devices that I use for blogging. Today, I'm publishing a list of the core programs and apps that I use […]
Windows 8 users have options to log on to the system using a local account or a Microsoft Account. Both options have their advantages. The local account does not communicate with Microsoft […]
HitmanPro.Alert is a product by Surfright, the makers of the excellent HitmanPro security application, that has been designed to mitigate exploits, and here specifically browser attacks. We reviewed it back in 2012 […]
Another 42 days have passed which means that Mozilla will release the final version of Firefox 25 today if everything goes along as planned. Firefox 24.0 users will receive update notifications starting […]
If you sometimes hand over your phone to someone else, or have it lying around unlocked, then it is possible that a third party can read your messages and chat history on […]
Depending on where you live, you may not be able to access select websites or services available on the Internet. This is not limited to countries where you would expect Internet censorship […]
If you had to assess your computer's security setup, how good - or bad - would you say it is? Would you say it is well protected against threats you may encounter […]
I have three favorite file hosting and syncing services right now. There is Dropbox, the service that I have been using for the longest, Microsoft's SkyDrive which I have also used for […]
HitmanPro is a commercial security solution for Windows that has been designed as a second line of defense against malware and other threats. There are different types of security programs that you […]
With UK parties proposing to monitor the activities of all country residents come new fears of an 1984-esque government that with a single mouse click can find out everything there is to […]
The rise of cloud storage in the past two or so years was fueled largely by an increase in mobile Internet usage. Barely any smartphone gets released these days without Internet access […]
Windows 8 just like its predecessor Windows 7 ships with an administrator account that is disabled by default. While it is not suggested to enable and use the administrators on a day […]
The buzz word of 2012 is the cloud, as every big company seems to start their own service. Just lately we have seen the rise of Google Drive and Cubby, two new […]
Back in 2010, when I reviewed the application installer Soft2Base for the first time, I found it to be an interesting program for users who wanted to install multiple popular freeware programs […]
When you write down all the computer security tips that come to your mind, you probably end up with a long list. If you analyze that list then, you may realize that […]
Ninite is a great way to easily install many essential programs. It takes the work out of loading a new computer with the software you need. While there is one thing that […]
Making sure that you are connected via SSL is one of the most important things Internet users can do to improve their security online. This is especially true on public computer networks, […]
Renaming files can sometimes be a necessity and other times something that improves the readability on a computer system. Probably the most common example used to explain this are photos taken with […]
CCleaner is an indispensable tool for many Windows users to clean up temporary files and other leftovers on the system. The core benefit here is that running the program regularly frees up […]
In a home environment, many people neglect to backup their files and systems, and are then devastated when their computer fails taking all their precious files they’ve been collecting with it. Some […]
Yesterday I wrote here about the BitLocker security file encryption system that was introduced with Windows Vista. BitLocker is a full-disk encryption technology but I also alluded to problems with Microsoft's other […]
For the last few days I've been using the new beta update to Microsoft's smartphone operating system, Windows Phone, on my HTC handset. I've written a full hands-on review of this 'Mango' […]
It is no secret to anyone that between the dates of April 17th and 19th, still as yet unnamed hackers broke into Sony’s database and stole the personal data of more than […]
After finding out that there might have been a security breach at LastPass, a company known for their online password management solution, I quickly changed my master password and started to think […]
It's been over a decade now that we've had secure socket layer (SSL) encryption technology for making Internet transactions safe. With only a very few exceptions, including a certificate cloning scare a […]
Are you backing up important data regularly? If so, how are you doing it? Are you storing the backups locally or remotely? What program are you using? Many users believe that backups […]
Please click on the following link to open the newsletter signup page: Ghacks Newsletter Sign up
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.