The Box application for Android phones is sure one of the most convenient way to store, access, and share files with your friends. However, if your phone is stolen, your files can be accessed easily. This tutorial will show you how to set up the passcode within the application for extra security.
This is a tech-recipe for creating maximum efficiency for your PC. The steps describe setting up a dual monitor configuration.
This tech-recipe explains the basics of flashing one’s BIOS or firmwares. Although the following instructions pertain to motherboards specifically, the principles are the same throughout each realm (i.e., video card, CD/DVD Drive).
The bash shell allows a number of methods for accessing elements of variable arrays. This tech-recipe demonstrates some of these techniques.
Occasionally, you do not want people to be able to uninstall software easily from a system. This reg hack will prevent it from showing up in the Add or Remove Programs List.
Microsoft stopped shipping a TFTP server with their operating systems as of Windows NT 3.51, supposedly because it was not secure. (At least, they were giving security a passing glance back then.) There are many reasons why a TFTP server is important (for example, uploading an image to a Cisco device or resetting a PIX password). This tech-recipe describes a free, third-party TFTP server.
One of the biggest missing functions in the command prompt is the ability to extract lines from a file that match a pattern. For UNIX users, the command grep is so often used that it has become a verb. The msh has a grep-string cmdlet that performs grep-like string parsing.
With Android 4.0 or Ice Cream Sandwich (ICS), Google has brought back native screen capture abilities. This allows users to take a screen capture of any screen on their Android 4.0/ICS device.
Having an array of variables is of no use unless you can use those values somehow. This tech-recipe shows a few methods for looping through the values of an array in the bash shell.
AIM has a web-based client that will allow a user to use AIM without installing anything.
If you want to know how long it has been since a Windows system was booted, use the command included in this tech-recipe.
The net command provides an easy way to view and set account policies from the command line.
1...328329330...516Page 329 of 516 error: Content is protected !!