Storing your files in OneDrive is a great way to access your data more conveniently. Once your files are in the cloud, you can view or edit them using any device with Internet access. But what happens if you have a file you need but it isn't in your OneDrive account? You may think you're out of luck, but that isn't the case. As long as you've got the Fetch feature configured properly and you are using Windows 7 or Windows 8 on the computer containing the file and that computer is connected to the Internet, you can find the file and upload it right from the OneDrive website. Read on to learn how to use this simple yet awesome feature.
Tutorials, how to guides, books and reviews for Windows 7.
Telnet was developed as a network protocol in 1969 and it was popular for many years, until the rise of Internet broadband and of more secure alternatives. You might be surprised to learn that in 2014 there are still plenty of Telnet servers and resources available, including several active communities. If you are curious to learn more about Telnet, start with this guide in which we will show how to install a Telnet client in Windows, how to start and end a Telnet session, where to find documentation about Telnet commands and where to find Telnet servers to connect to.
We would like for Microsoft to release a Windows version that allows users to password protect specific folders that contain sensitive data. Until that happens, if you want to do this, you have to use third-party software made by other companies. Even though there are plenty of programs to choose from, most of them are very annoying. We made an extensive research and tested more than 20 programs of this type. In this article we would like to recommend the best five tools for the job.
There are certain situations where users prefer to use Private Browsing to make sure they don't leave any trace of their browsing history on the computer they use. Every web browser has this feature and you can easily switch from normal browsing to private browsing. If you need to use private browsing more frequently, you may want to create a set of special shortcuts that start the browser you are using directly in Private Browsing. Here's how this is done in all the major browsers: Internet Explore (both the desktop and the app version), Firefox, Google Chrome and Opera.
A very useful tool that any web browser offers is Private browsing. Even though each browser calls it by a different name (InPrivate, Private Browsing, Incognito or Private Tab), this feature always does the same thing: allows users to browse the web without saving data like cache, history or cookies. However, this is done locally, meaning that only people using your computer won't be able to find out what websites you have visited. The websites you visited, your ISP (Internet Service Provider) and, in fact, every server your requests pass through, know what you visited. In this article we will show how to enable Private browsing in all the major web browsers and how to check if you are browsing privately or not.
A couple of days ago, one of our readers asked us to explain what are all those Windows features that can be added or removed from your Windows installation. Even though all of them have some description, the information offered by Windows is either too little or too hard to understand. That's why we decided to publish this article and walk you through every Windows feature that's available in Windows 8.1 Pro. We will describe each Windows feature in a lot more detail than Windows does, so that you can decide for yourself whether to keep it or remove it.
As Microsoft continues to make changes and improvements to its operating systems, users have to get used to new ways of doing the same old things. Starting with Windows Vista, the familiar Add or Remove Programs from previous versions appeared to vanish. It wasn't really gone, of course, but Microsoft gave it a brand new name. Let's take a look at Windows 7 and Windows 8.1, learn where to find Add or Remove Programs and how it works today.
System Restore is a great tool that allows you to revert Windows and its settings to a previous state. This is useful when you encounter problems with drivers that destabilize the system or software that malfunctions. However, at times, some of the changes you make may impact your system so badly that you can no longer log into Windows. What can you do in such scenarios? How do you start System Restore and use it to repair your Windows installation? Read this guide and find out:
As discussed in some of our previous articles, you might find yourself in situations where you need to change the MAC address of your network adapter in order to connect to a certain network. But what do you do when you have to restore the original MAC address and you don't know what that is? Luckily, you can easily restore the MAC address by using either the Network and Sharing Center in Windows or a third party application, like the one we will share in this article. Read on to learn how to restore the original MAC address of your network card.
Computers on a network can be part of a workgroup or a domain. The difference between them is how resources are managed on the network. While domains are fit for enterprise networks, home networks and small business networks can work very well using a workgroup. In this article we will explain what is a workgroup, what's different about it when compared to a network domain, how to access the workgroup setting and how to change the workgroup, both in Windows 7 and Windows 8.1.
When you set up your computer for the first time, you are asked to assign it a name. Since we all humans have a name and we name even our pets, why not name our computers? But then you'll ask: What is the purpose of a computer name? Can you change it later on? To learn the answers to these questions, read this article.
While having the ability to restore your system from a restore point is one of Windows' most useful features, it may be that some people will want to turn it off for all or part of their partitions. Others may want to change how much space it is used for System Store. To help you out, we have created this guide that shares how to configure in detail how System Store works, how much space it uses and how to enable it or disable it for a partition or another.