After you upgrade your Mac to OS X Yosemite, you will find the visuals of the system to be one of the biggest and most noticeable changes. Every part of the system has been transformed to a more modern, flat look. Besides the new system program icons, windows are now semi-transparent, which means the background is changed based on the color of the element below it. This change, however, may make text or visual elements on-screen harder to see. If you find it more of a nuisance than a help, follow the steps in this tutorial to turn it off in apps and increase legibility.
Google Chrome is quick, convenient, and secure. However, its data protection settings are in great need of improvement. Google Chrome offers a feature to save the username and password combinations for various websites, so when you try to log in, Chrome will fill in your username and password details automatically. This feature can be dangerous if you share a computer with multiple users. Someone could log in to websites with your saved credentials, potentially unlocking your credit card information or bank account. Fortunately, Chrome users can use expanded user settings to tweak the browser so that it has a higher degree of security.
The default setting of Windows is not to show file extensions. Getting the operating system to show file names with extensions all the time is actually beneficial. It helps us easily identify the types of files we have, and we can quickly rename an extension, if needed.
With iOS8, Apple has allowed the wildly-popular Android Swype keyboard onto the iPhone and iPad. Swype lets you drag your finger across the keyboard keys to write instead of typing. You can write much faster this way. This feature has long been available on Android and supports many languages there including difficult-to-type languages, like Hindi. Swype on iOS8 only supports English, French, Germany, Italian, and Spanish, so far.
If everyone used-two factor authentication, hackers would have to find honest work. They would not have been able to download Jennifer’s Lawrence’s nude photos from the Apple iCloud, because to login they would have needed to physically have Jennifer’s cell phone in their possession. All those emails and passwords stolen from JP Morgan, Target, Best Buy, LinkedIn, and eBay would be worthless, since without the token generated by the authenticator, the hackers cannot login.
By default, the Gear 2 can only display call and message notifications from your phone. However, the notification feature can be extended to display notifications from third-party apps on your phone. As long as your favorite apps display notifications, they can be read on your watch. This feature can be enabled using the steps provided in this tutorial. Continue reading to find out how.
Google just recently upgraded its Google Maps interface for users who use the browser version. As with any new design changes, some features from the previous version of Google Maps did not make it into the new Maps interface. For those who use such features or just prefer the older layout, you can revert to the classic Google Maps interface.
If you usually share photos with friends using Facebook Chat and now you want to find all of them, you could go back to your chat history and find every single image from there. While it is possible to find all of the images using this method, it takes a lot of time. Fortunately, Facebook provides a convenient feature that allows you to view all of your shared images in one place. Here is how to access this feature.
If your C drive is getting full, follow the steps in this tutorial to erase unnecessary files, and free up drive space.
Receiving repetitive messages or calls from strangers on your phone can be frustrating. If this has become a frequent annoyance to you, consider blocking those spamming numbers. The steps provided in this tutorial will show you how to do it on an iPhone or iPad, without any third-party software.
If your children often use your iPhone or iPad to play games, limiting the amount of time that they can use the device is probably a primary concern. This tutorial will help you control how much time they spend playing games on the device without using any third-party applications. Once the time limit that you set is over, the game that the child is playing automatically ends, and it is no longer possible to play it until you start a new session for him or her.
The hotspot feature on your phone is a convenient way to let other devices such as your laptop or tablet share your 3G connection to access the Internet. When you use your phone as a hotspot, especially in public places, you probably only want the devices that you allow to be able to use the connection. While a password can be used to prevent unauthorized access, it can still be cracked. A better solution is to have a list of known devices which exclusively have permission to use the hotspot. Here is how to do it on a Samsung smartphone.
1...220221222...516Page 221 of 516 error: Content is protected !!