Marshall GunnellPCWorld

Based in Tokyo, Japan, Marshall is a technical writer at LINE Corp. His work can also be found on How-To Geek, Zapier, StorageReview, CareerFoundry, ITEnterpriser, and more.

pcw command prompt thumbnail

11 ways to open Command Prompt in Windows

If you want to execute a task from the command line in Windows, you first have to open Command Prompt. Here are 11 ways to do that.


12 popular Google Doodle games you can still play

Google's delightful Doodle games make for a fun way to pass a bit of free time. Read on to see 12 of our favorites.

Wi-Fi tools

Wi-Fi extenders vs. boosters vs. repeaters: Major differences explained

There are a variety of products that are meant to increase the range of your Wi-Fi network to the furthest reaches of your home and even your yard. Know the differences so you can choose the option that best meets your needs.

Plastic, magnetic letters in compartmented boxes.

How to install fonts in Windows 10

Windows 10 comes preloaded with a number of different font types, and you can also find a ton more (both free and paid) online. Installing these fonts on your Windows 10 PC is pretty simple. Here’s how.

google calendar icon

How to share your Google Calendar with others

Sharing your Google Calendar can take a lot of headache out of arranging meetings; however, you can share only from your PC. Here’s how to share and also manage access rights.


How to unzip files in Windows 10

ZIP files hold several compressed files inside, reducing how much space they take on your hard drive. They need to be unzipped to use the files, though. Here's how to do it.

Monitor with web search url

11 powerful websites that can replace your desktop software

No native app? No problem. These web apps cover everything from video editing to video games to no-nonsense productivity and project management.

abstract streamline laptop by philipp katzenberger iijruoerocq unsplash

What to do when your laptop is stolen (and how to prepare for it)

If your laptop is stolen, you'll need to act fast to keep your personal data secure—and actions you take before the hijacking can be crucial. Here's what to do.