Online Tech Tips – Page 156 – Computer Tips from a Computer Guy

5 Tech Happenings to Look Forward To in 2013

by File in: Gadgets

We’re already 4 months into 2013 and there haven’t been many exciting gadgets released or mind-blwing software created to make us more efficient. Luckily, there are a few things towards […]

10 Smartphone Security Tips

by File in: Smartphones

You’ve probably read a lot about hackers and how to protect your computer, but for some reason, most people don’t really care all that much about smartphone security. Maybe because […]

Best Online Buying Guides to Consult Before Making a Purchase

by File in: Computer Tips

Planning on buying a new computer, a new DSLR camera, a new power tool, a new appliance, or a new piece of furniture? If so, you should always take your […]

How to Keep Yourself Updated With the Latest Internet Memes

by File in: Cool Websites

Did you know the latest Internet meme was Hadouken and Vadering? Yeah, me either. Hadouken is where people take pictures of themselves fighting in mid-air and Vadering is where people […]

OTT Guide to Codecs, Container Formats and Transcoding

by File in: Computer Tips

If the title of this article doesn’t already make your head hurt, then the rest of it definitely will. Well, hopefully I can explain it in a way that makes […]

OTT Guide to Creating a Strong Password

by File in: Computer Tips

It’s so common now, that we all do it without even thinking about it: create a password that’s at least x characters, has at least one number and one symbol […]

OTT Explains – What is Port Forwarding and What is It Used For?

by File in: Computer Tips

Most people live their lives not having any idea what port forwarding is and what it can do for them. I recently bought a Foscam IP camera that connects to […]

How to Use the Command Line to Kill a Program

by File in: Computer Tips

Everyone knows how to kill a program using Task Manager in Windows or Force Quit in OS X, but sometimes it’s useful to kill a program using the command line. […]

How to Properly Setup Recovery and Backup Options for Two-Factor Authentication

by File in: Computer Tips

I’ve always been a big proponent of two-factor authentication and it seems these days you really need to use it. Just look at the recent Apple security hole that allowed […]

What’s the Difference Between a Virus, a Trojan, a Worm, and a Rootkit?

by File in: Computer Tips

Pretty much everyone has heard of the terms spyware, malware, virus, trojan horse, computer worm, rootkit, etc, etc, but do you really know the difference between each of them? I […]