If you have Windows 7 or 8, you should see an icon in your system tray that prompts you to reserve a copy of Windows 10. This upgrade will be free for all Windows 7 and 8 users, and users of the insider program have stated that it fixes a lot of the frustrations people had with Windows 8. Microsoft will be releasing Windows 10 to the public on Wednesday, but there are a few things you should do before upgrading.
The Tech Guy Blog
When your internet speed seems to slow down to a crawl, it can be useful to put it to the test and find out exactly what speeds you're getting. But it may be misleading to just check one speed test website. This is because some internet service providers actually give priority to certain speed test sites, giving you a faster reading than what is actually true for the rest of your browsing. In fact, some internet service providers encourage you to use only a site of their choosing for speed testing.
When getting a new phone, it can be a hassle to reinstall all of the apps you were previously using on your old phone. There's a few ways to make this process much quicker and easier, though. First, with Android 5.0, you can transfer your data over Bluetooth and NFC. It's called "Tap & Go," and you can transfer content by simply tapping the old phone to the new one after selecting "Tap & Go."
On June 15, 2015, password manager LastPass made an announcement that its password database was hacked and some user account information had been stolen. Since LastPass has uses encryption and many layers of protection to slow down hackers, the damage will be minimal for LastPass users. While the hackers may have obtained the database of master passwords, they still don't have immediate access to everyone's passwords. That information has been encrypted, salted, and hashed, so it would take quite a bit of effort to break into it.
Target Disk Mode is a simple and efficient way to move files from one Mac to another. This can be used if your Mac won't boot and you need to get files off of it. Or you could transfer files onto a Mac this way, just as you would with an external hard drive. Here's how to take advantage of this convenient feature built into OS X:
Google recently released a new Photos app, with free unlimited cloud storage for 1080p video files and photos up to 16 MP in quality. It makes it easy to browse and search through all of your photos, but you may have discovered some unfamiliar photos after installing it. This is because the app searches your entire device, and displays the photos it finds in the app. At first glance it may seem to be an error, but there's a way you can quickly find out where the photos came from.
There are accessibility features built into the Mac that make it easier to see things on screen. One of those settings is called "Zoom," and it lets you magnify the part of the screen that you need bigger. This can be done system-wide, meaning you can zoom in and out no matter what application you're currently running.
If you've had your email account hacked, then it may be time to take further security measures to keep it from happening in the future. Here are some simple steps you can take right now to better secure your account:
If you're experiencing a dramatic slowdown on your Mac or PC, you may be able to track down the culprit by using a process monitor. This will show you all of the programs and processes currently running on the computer, and how much of your system resources those processes are taking up. If you close out of all programs and still see a process taking up nearly 100% of the system resources, you'll know what's causing the issue. Then you can Google the name of that process and find out how to get it under control.
When browsing the web, you may have encountered a "certificate" warning from your browser. This happens when you're connecting to a site using encryption, and the browser can't verify the identity of that site. Every browser or operating system comes with a preset list of "Certificate Authorities." These authorities could be governments, companies, or other entities that issue identity certificates to websites. This is all part of the SSL encryption process, and it verifies that you're securely connected to the right place.