Best of 7 Tutorials
The best articles we published. The list includes in-depth analysis, great reviews, very useful tutorials, great downloads, etc.
A few weeks ago, Google released the 64-bit version of the popular Chrome browser and promised increased stability, security, and speed. We were curious to learn how many of these promises are true, and share what you gain and lose when using the 64-bit version of this browser. We have used this browser for a couple of days and ran several benchmarks. Here's what you get when using the 64-bit version of Google Chrome instead of the 32-bit version.
ASUS has been kind enough to send us one of their newest Transformer Book devices. It is the big brother of the T100 that we tested a while ago - the new ASUS Transformer Book T200. We were very curious to learn what's different about this device and whether it is a worthy upgrade over its predecessor. We've tested it for a week and today we are ready to share what we have learned about it. Read on as this is one of the first reviews in the world for this device.
Linksys WRT1900AC is the modern successor of the iconic Linksys WRT54G - one of the most popular routers ever made. It has a very similar look to its predecessor and the most impressive hardware specifications we've seen so far on a wireless router. Some even said that this router is the best in the world. You can imagine that we were very excited to test it out and see for ourselves what is has to offer. If you would like to learn more about Linksys WRT1900AC and its real world performance, read our review!
It is 2014 and Telnet is not exactly the world's most popular protocol. Very few people know about it and you can say without being contradicted that this protocol is almost dead. However, there's a small but active community out there that is still using it for several reasons, including for having fun. We've done a bit of research and here are five fun things you can do with the Telnet Client in Windows:
Kaspersky has recently launched the 2015 version of their security products across North America and they will soon follow in Europe and other regions. While this version doesn't promise any spectacular new features, it does promise to provide many improvements over the 2014 edition. If you would like to learn more about what this new generation of products has to offer, read this review for Kaspersky Internet Security 2015.
Storing your files in OneDrive is a great way to access your data more conveniently. Once your files are in the cloud, you can view or edit them using any device with Internet access. But what happens if you have a file you need but it isn't in your OneDrive account? You may think you're out of luck, but that isn't the case. As long as you've got the Fetch feature configured properly and you are using Windows 7 or Windows 8 on the computer containing the file and that computer is connected to the Internet, you can find the file and upload it right from the OneDrive website. Read on to learn how to use this simple yet awesome feature.
A couple of days ago, one of our readers asked us to explain what are all those Windows features that can be added or removed from your Windows installation. Even though all of them have some description, the information offered by Windows is either too little or too hard to understand. That's why we decided to publish this article and walk you through every Windows feature that's available in Windows 8.1 Pro. We will describe each Windows feature in a lot more detail than Windows does, so that you can decide for yourself whether to keep it or remove it.
While connecting to a broadcasting wireless network in Windows is a very simple process, the same can't be said of a hidden network. By not broadcasting its SSID (service set identifier), or network name, a hidden network is not visible in the list of available networks you can access from your computer. You'll need to know the SSID, as well as all of the other security information before you can connect. Read on for step-by-step instructions for connecting to a hidden network in Windows 8 and Windows 8.1.
Computers on a network can be part of a workgroup or a domain. The difference between them is how resources are managed on the network. While domains are fit for enterprise networks, home networks and small business networks can work very well using a workgroup. In this article we will explain what is a workgroup, what's different about it when compared to a network domain, how to access the workgroup setting and how to change the workgroup, both in Windows 7 and Windows 8.1.
Windows 8 and 8.1 provide a simple interface for connecting to wireless networks. The procedure varies depending on whether or not the network broadcasts its name (also known as SSID - Service Set Identifier). If the name is broadcast, connecting to the network is as simple as entering a password. But enough talk, let's see how it works:
Previous editions of Windows allowed users to create ad hoc wireless connections between computers. You could use those connections to create a wireless network between multiple computers or to share the Internet connection that was available on one of them. This can no longer be done in Windows 8.1, at least not using a visual interface and the mouse. However, with the help of the Command Prompt and a few commands, you too can turn your Windows 8.1 laptop or hybrid device into a WiFi access point. Here's how: