The Tech Guy Blog

Fully Uninstall Mac Applications

Uninstalling a Mac application seems like an easy task -- just drag the icon from the Applications folder to the trash. This doesn't get rid of all of the files associated with that application, however. It might not always be necessary to get rid of all of an app's remnants, but if you're trying to reinstall an app that isn't working properly, you may need to take some extra steps first.

What to Do if Your Only Browser Isn't Working

You may find yourself in a sort of "catch-22" if the only browser on your system won't work. If the browser keeps crashing upon launch, you can't really do anything to fix it, and in order to get an alternative browser you'd need to download it -- using a browser. Here are a few things you can try to fix your current browser, and there's even an alternative way to obtain a different browser without using a browser:

Take Ownership of Old Files and Folders in Windows

Windows, or any operating system with multiple users, assigns ownership to every file. This means if you're not the owner, you can't modify that that file. The administrator account is able to access all files on the system, but Leo doesn't recommend running as administrator for security reasons. Running as a "limited" or "standard" user will significantly decrease the chance of having malware installed on your system without your knowledge.

Calibrate Your HDTV

HDTVs, by default, come set up to be put on display in a showroom. The settings are cranked up to the extreme, with vibrant and bright colors designed to catch your eye among a sea of TVs. While it may seem desirable, it doesn't provide for much of a cinematic experience and is not at all accurate to colors in the real world. This is why calibrating the TV can make it a much better experience overall.

Set Up Your Email with IMAP or POP3

The way your email client is set up on your phone or tablet can determine how email is handled on your desktop as well. For instance, you may find that after downloading all of your email to your phone, the email disappears on your desktop. This behavior can be changed by either using IMAP (Internet Message Access Protocol) or POP3 (Post Office Protocol version 3).

How to Identify a Malicious Website

One of the ways computers can get infected online is through malicious websites or phishing scams. This happens when a scammer links a user to a website that looks exactly like a familiar site like Microsoft or Google, but is actually the scammer's site. Users will often input their username and password on the malicious site, and the scammer will then have control of their account.