Internet access is a glorious thing--except for when it isn't. Sometimes it's an easy fix if you know how to solve Wi-Fi router problems, and other times the issue isn't so obvious, especially if it looks like your favorite site went down and took half the web with it.
To go forward, you must back up. This is an old rubric and bad joke about the importance of keeping regularly updated copies on hand of your personal and work documents and, ideally, your entire drive. Backing up is often an important stage in migrating to a new machine as well. This week, I cover my recommended methods.
Windows users have long been jealous of workspaces--also called virtual desktops or multiple desktops--on Linux. But many Linux desktops have hidden this feature by default in recent years. Soon, Windows users will have multiple desktop workspaces enabled by default--and many Linux users won't.
The Internet of Things is based on sensors and controls in all sorts of devices. When those types of devices are used to create a smart home, they can give residents unprecedented control and insight. The proliferation of smart devices, however, also opens the door to new dangers and threats.
Most of the time we focus on helpful tips for Windows users, but today's article will also appeal to anyone with a Chromebook. A company named Cameyo is known for its software that lets you run Windows program from a USB stick, but it also offers a virtualization service that lets you run full-blown Windows desktop programs in a browser for free.
Sylvia Chepkurui asked, "Can I recover my stolen laptop using the serial number?"
Playlists are one of the best, and most creative ways to organize music in iTunes, and to listen to music on your iOS devices. But sometimes, it can be hard to figure out how to make complex playlists. In this week's column, I look at three questions about playlists, both standard and smart. And I also look at an issue where album art, for some albums, changes on iOS devices.
In our last episode of Private I, I explained the basics of public-key (PK) cryptography, a way to scramble messages in a way that only someone possessing a particular key can decrypt, without that key ever having to be publicly disclosed or shared. It's an effective system that has no known theoretical exploits, and currently deployed implementations are considered robust.