Computer speech recognition has been around for a long time, and many people have heard of programs like Dragon Naturally Speaking. What many people may not know is that Windows 7 includes its own, very capable, speech recognition program. We plan to cover it in detail in a couple of articles. But first, let’s see how to set it up, in order for it to work.
How To Manage your Programs and Windows Features in Windows
For decades, Microsoft Outlook has been the Microsoft standard for Personal Information Management. But more and more, data storage is shifting to the cloud, as it offers the ability to access your data no matter where you are, so long as you have an Internet connection. Windows Live is Microsoft's answer to the cloud migration. But what of your Microsoft Outlook data? How do you get it into Windows Live? In this article we'll show you how.
Are you searching for a way to create a disc to disc copy, of a CD, DVD or Blu-Ray you have created at home? Then you are in luck. In this guide, we will discuss the steps and principles involved in making a copy of any disc. Then, we will cover some of the best tools for the job. If you are interested, don’t hesitate to read more.
It can happen that you quickly need open more than one window of the same application. It can be any application: a Windows application such as Windows Explorer or Internet Explorer, or a third-party application like Mozilla Firefox. Opening multiple windows is the same as running multiple instances of the same application. Let’s see how this is done.
Do you have troubles with any of these Windows 8 apps: People, Messaging, Calendar or Mail? You can’t get them to connect to your Google account and access your contacts, email or calendar? This tutorial will help you solve this problem.
During the early days of Windows, the operating system was the direct target of most malware creators and Microsoft has worked a lot on hardening the operating system, creating and delivering security patches to its users as timely as they possibly could. Today, Windows is a more secure operating system and the malware creators’ focus is now on finding and using vulnerabilities for popular Windows applications. Therefore, keeping your applications up-to-date has become very important for having a secure computing experience. But... how do you keep your applications up-to-date, without manually searching for updates once very few weeks? This analysis aims to answer this question and propose some good tools for this task.
NOTE: This article has been updated based on feedback received from users and the developers of some of the applications included in my tests.
When we published our first article about the Credential Manager, some of you wanted to know how secure is the data stored inside. Can it be easily cracked? We made a few tests and we managed to identify which Windows Vault passwords can be easily cracked and which not. Read more for details.
When we published our analysis of tools to keep your software up-to-date, many of you mentioned Ninite and their products. Therefore, I decided to try them and learn more about how to use the Ninite Updater or the free Ninite service to keep your software up-to-date. Here is what I learned.
Even though not many websites cover Internet Explorer extensively and write interesting articles and tutorials about it, this browser still manages to hold the title of the most used browser. One of the reasons for it is that it provides some interesting functionality that other browsers don’t have or have not fully adopted. Here is a list of 5 great features Internet Explorer has and other browser do not, which I would love to see being adopted by everybody.
In the past we covered Windows Media Player 12 extensively and we’ve shown almost anything you can do with it, including changing its looks by using skins. We would like to resume the discussion about this application and share with you some good looking skins you might want to try.
Another less known feature of Internet Explorer is that, not only it checks the websites you visit against a list of known malicious sites, but it also allows users to report malicious websites they encounter. In this tutorial, I will show how to report such websites and why it is good to report them.
Have you ever needed to know when an NTFS partition was created or when a drive was first initialized by Windows and available for use? Check out this article to learn how to find this information by yourself.