Computer technician blog
General - General posts, notices and other information.
Viruses - News and articles related to viruses, will be posted in this section.
Windows - How To guides for Windows users.
Mac - How To guides for Mac users.
You can subscribe to RSS Feed
Windows 8 utilizes a new Start menu, but without options to remove it. Fortunately, however, you can personalize it via customization options. This tutorial describes how to change the background 'pin' items and otherwise organize and customize the look of the Windows 8 Start menu. Users can customize by addition or removal of unwanted tiles/applications, grouping or naming the applications, and also by adding shortcuts and website bookmarks to the Start menu. Follow this tutorial to learn how to customize your Start menu.
PIN locks are common features on mobile phones, and a useful security feature available on the majority of modern devices. In this tutorial I explain how to use a PIN lock feature to log in to Windows 8. Although the lock contains only 4 digits, and thus is not highly secure, it remains a popular method. Note also that the PIN cannot contain symbols (digits only), and therefore, it is not recommended for use as a user password. Nevertheless, PIN lock is a useful option, especially to protect computers from casual users who may otherwise use your system for a quick e-mail checks or as a means to access private information. If you forget your PIN code, do not worry, as there is a simple way to restore the original User Password prompt, and we will come to this later.
A screenshot is essentially an image (or snapshot) of your computer screen, generated by pressing a single key. You can generate this image simply by pressing the Prt Screen key on your keyboard. In order to save the image, you normally require image editing software such as Photoshop or Paint. This guide, however, describes a simpler method to take a screenshot using Windows 8. Most users have faced a situation whereby capturing a screenshot immediately is important. This tutorial describes a method requiring just a single key press; using this method, the screenshot is instantly saved without the need for image editing software.
15 Essential Windows 8 Keyboard Shortcuts
Shortcuts are such a great way to reach items instantly, that it is little wonder that they are so popular with PC users. Recently, Windows 8 has introduced several changes to the operating system, including some to shortcuts. Even though these changes are relatively minor, I would like to introduce you to some of the main Windows 8 keyboard shortcuts. Here are 15 of the most useful and user-friendly key combinations, which will ease your daily computer work.
"This extension is managed and cannot be removed or disabled" (Google Chrome) - how to remove?
This article describes how to remove a 'managed' Google Chrome extension. Note that recently, there a rise in adware infections, and in many cases, these potentially unwanted programs (PUP) install on users' Internet browsers disguised as legitimate extensions. Commonly, adware is bundled with free software downloaded from the Internet, the installation of which, is often a consequence of not paying close attention to the installation steps. To avoid inadvertent adware or PUP installation, Internet users should always install freeware choosing the 'Custom Installation' option rather than 'Typical Installation' - and be sure to opt-out of any changes to your Internet browser settings. Also, disallow installation of any additional software. In this removal guide I will demonstrate how to remove the SelectionLinks managed Google Chrome extension. I chose this extension simply as an example, however, this removal guide is generic and will help you to remove any managed Chrome extension.
How to create a new user account using Command Prompt?
This tutorial describes how to create a new user account in the Windows operating system using Command Prompt. The guide is helpful when dealing with ransomware or fake antivirus programs that block Safe Mode and Safe Mode with Networking. Cyber criminals responsible for developing malicious programs develop new methods to protect their bogus software from elimination - this includes blocking users' access to Safe Mode.
Page 44 of 45<< Start < Prev 41 42 43 44 45 Next > End >>