Don't-Miss Stories

Add a PC Settings shortcut to your Windows 8 desktop

This handy hack gives you quick and easy access to Windows settings.

Turn your tablet into a guilt-free digital babysitter

Protect your tablet from destructive kiddies. (And protect your kids from grown-up content.)

on techhive.com

Security to go: Three tips to keep your mobile data safe

It’s not easy keeping your devices secure, and mobile devices like smartphones, tablets, and, of course, laptops are no exception. But you can do a few things to improve your mobile security. Here’s a look at three of them.

Ten essential tips for searching the Web

Searching for the right results among the billions of pages on the Web? You don't need just a search engine; you also need some know-how.

on macworld.com

Block online spoilers with Unspoiler for Google Chrome

This ingenious add-on lets you browse the Web, Facebook, and Twitter without fear of ruining your favorite shows.

How to open a file with a strange extension

Red Eye Rose received a file with a strange extension. She doesn't know into what program she should load it. Neither does Windows.

google-privacy

How to keep your real name and face out of Google's ads

Google just updated its terms of service to allow the company to use your real name, face, and comments in ads. Here's how to slam the brakes on it.

How to stay private now that anyone can find you on Facebook

Facebook is making it easier for people to find you, so it’s about that time again: Check your privacy settings.

on techhive.com

Understand the limits of a virtual computer

Amin Inshassi asked the Desktops forum for details about what can and can't be done with a virtual machine.

Leaving Las Pinterest: How to kill your social media accounts

Have trouble with tweets? Loathe all those likes? Pinned your last pin? Here's how to leave your 'friends' behind.

on techhive.com

evernote logo

How to set up two-factor authentication in Evernote

Even freebie accounts can now benefit from this valuable security feature.

3 essential techniques to protect your online privacy

Two-factor authentication, encrypted remote storage, virtual private networks: These are your weapons in the fight for Internet security. Use them well.

How to report spam and other violations on Twitter

Make the spam tweets stop! It only takes a few clicks.

on techhive.com

How to change your email signature on your smartphone

Nobody likes unwanted marketing. Here's how to get that annoying "sent from my phone" message out of your email signature.

on techhive.com

fire

Actually, you do need to share your passwords

No one stays healthy forever. At some point, your loved ones will need access to all of your accounts. You can make that job easier for them.