Tips and Tricks Tips and Tricks

How About Using Google Drive as Your Online Movie Repository? by Kelly Lynn

  Paid storage on Google Drive is now cheaper than ever - $2 a month buys you 100 GB of space and $10 a month buys you 1,000 GB. At first, you might wonder what you could possibly want 100 GB for - your home videos, photos and music collection would barely take up 10% of the space you get. Here's an idea, though - you could turn the space available into your own personal online movie storage. Your first step - get all your content on Google Drive Before you are able to stream movies from Google Drive to your TV, you first need to upload your movie collection there. You have a few ways of achieving this - the most obvious one being to use Google Drive desktop … Continue reading

Is Your Wi-Fi Performance Always Slow? Here’s What You Do by Kelly Lynn

  Mass-market Wi-Fi has been around since 1999, the year that the term Wi-Fi was registered. While the standard has seen impressive improvements since then, wireless technology still isn't completely reliable. You can still run into slow speeds, poor signal quality, drop-outs and so on. People tend to have more trouble with these hiccups in some locations and with some equipment than others. If you've had enough of having your Wi-Fi stall for no apparent reason, here are three ideas that you can use. Diagnostics software If your broadband plan is fast enough but you don't see any of it over Wi-Fi, you could have a problem with how crowded the airwaves are in your neighborhood are. A free utility called ViStumbler helps you get around this problem -- it … Continue reading

Can the Websites That You Open on Chrome Use Your Camera to Spy on You? by Kelly Lynn

  In January 2014, Google was informed of new Chrome vulnerability that could allow any website to turn the microphone or camera on your computer on and spy on you. Google hasn't so far taken the vulnerability seriously. If you aren't comfortable with having this security hole on Chrome, here's what you can do. How does this vulnerability work? Any time you give permission to websites to access your camera or microphone, Chrome makes a permanent record of your preference - every page on that website will be able to access your camera and microphone any time you visit in the future. This is a threat not because the website could suddenly decide to go rogue one day and begin to listen in on your conversations, but because it could … Continue reading

What Can You Do to Sidestep Internet Censorship? by Kelly Lynn

  Depending on the part of the world that you live in, access to the Internet is nearly always restricted by the government -- and not always to protect the population from websites that most would see as criminal (websites enabling child abuse, for instance). In the US, for example, the Trading with the Enemy Act of 1917 prohibits access to websites that promote tourism to Cuba. The Digital Millennium Copyright Act bans using the Internet to even discuss pirating copyrighted content. Even if such censorship doesn't bother you, you can still have trouble with your employer banning access to certain websites on your office terminal. The question is - what can you do about the freedoms that you lose to Internet censorship? You can try using a new DNS … Continue reading

Can Anyone on Google+ Now Send You Email Through Gmail? by Kelly Lynn

  Have you ever looked around on the Internet for the email ID of someone important and come up with nothing more than their Google+ profile? As hard as you might have looked around on their Google+ profile, though, you're unlikely to have turned up their Gmail ID - all Google+ has traditionally allowed you is the ability to contact the person you're looking for through a Google+ message. In January 2014, Google+ came up with a feature to help with this problem - one that will probably get people earnestly discussing social networks and privacy issues all over again. It allows anyone arriving on your Google+ account to send you an email directly to your Gmail inbox (rather than your Google+ account). It won't matter that you've never shared … Continue reading

Where Do You Plan to Place That Wi-Fi Extender? by Kelly Lynn

  The wireless coverage that you get out of a router can be unpredictable - even when you see impressive range specifications on the box that seem to far exceed what you would need for your size of home or office. You can still fall short and struggle with dead spots. The kind of range you get can depend on a vast range of variables - how crowded a neighborhood is with Wi-Fi networks in other homes and offices, the number of microwave ovens operating in the area, router positioning, the materials used in the construction of the building you are in and so on. While you can significantly improve your wireless range sometimes by repositioning your router, in most cases, relocating your primary router may be impossible. Your only … Continue reading

Testing Your Wi-Fi Performance -- Your First Step to Addressing Speed Issues by Kelly Lynn

  If you have speed issues when accessing the Internet over Wi-Fi within your home, your first step towards addressing the problem should be to test your home's Wi-Fi performance to see what the baseline speeds are. You may find out that your ISP gives you great broadband speeds, but the Wi-Fi equipment within your home degrades it. You can then address the problem with better equipment or better router placement. Understanding the terminology The term bandwidth is usually used to refer to the speed that your broadband connection is capable of. The term throughput , on the other hand, indicates the data speed that is possible on your home network. If you have relatively new equipment, your home Wi-Fi network's throughput should at least 20 times higher than the bandwidth … Continue reading

How to Hack Your Way Into a Windows Computer by Kelly Lynn

  Just as nature allows multiple solutions to any problem, computer operating systems are complex enough that you can usually find more than one answer way in, no matter what you want to do. For instance, if a computer is password-protected, you can mostly find another way in - whether it's your own computer or the computer of another. It's usually good idea for anyone to learn how to hack into a computer - you can learn how criminals target you and then use the information to protect yourself. Here are the two top ways in which computer break-ins happen. You can use a Linux Live CD to access the files (even on Windows computers) If you only need to access a few files and not use the computer itself, … Continue reading

Carry a Computer Toolbox Around in a Flash Drive by Kelly Lynn

  You can't always expect that you will be able to work on your own laptop that's set up with all the software that you need. Sometimes, you can find yourself without access to your computer. It could stop working for some reason, you may misplace it, or you may simply not have it with you. If you're forced to work on someone else's computer or perhaps the computer in a hotel room, airport lounge, conference hall or Internet café, you could find your work stalled by a lack of the right software. You can't expect that other people will have all the right software installed on their computers. What do you do then -- you can't very well install software on someone else's computer. The answer is, you should … Continue reading

How Safe Are Your Browser Extensions? by Kelly Lynn

  Tech news reports served up shocking news in January 2014 - malware creators used both free and paid in Google Chrome extensions to spread malware. If you stick to quality, well-reviewed extensions, though, you should be safe. It's more difficult to stay out of trouble with regular that spy on you and sell your information to anyone willing to pay for it. These extensions mean trouble in three ways: . They track all your browsing habits (not just your browsing habits using the extension) and send this data to their publishers. These publishers then sell this information to any marketer who wants it. . Google Chrome and other browsers allow extensions to place advertisements on the pages you view (see ). The makers of extensions take full advantage … Continue reading