Category: Guides

  • How to View YouTube in High Quality with the Motorola Droid

    I noticed in tech blogger Robert Scoble’s recent review of the Motorola Droid that many people are unaware that YouTube videos are set to a low quality setting by default on Verizon’s newest Android-powered phone.  I can’t say exactly why Motorola decided to do this (I’m sure the guy in charge of Verizon’s bandwidth was…

  • How to Replace Your Boring Voicemail with Google Voice

    When Google first opened Google Voice, I was very excited to check it out.  I was especially looking forward to their voicemail service, particularly the transcription feature.  However, after checking it out for a few minutes I lost interest.  Although a lot of the features were great, I would have to switch my number to a…

  • How to Prevent Extra Rings using Google Voice as Voicemail

    Now that Google Voice’s voicemail can be added to your existing phone number (giving you great features like searchable voicemail, free voice transcription, custom greetings, and email/SMS notification), you may have noticed that callers have to wait through way too many rings before your Google voicemail picks up the call. Here’s how it plays out:…

  • Windows Security Tip: Enable Windows Firewall

    Having your computer on any network, whether wired or wireless, subjects it to a countless number of security attacks everyday.  These attacks are an attempt to breach the security of your connection to collect information or damage your computer.  Since the release of Windows XP, Microsoft has included the Windows Firewall in it’s operating system. …

  • Wireless Security Tip: Secure Your Wireless Internet

    If you have your own wireless internet connection, it might be unsecured (meaning that you don’t have to type in a password to access it) or it may be using WEP encryption.  There are several important reasons why you should encrypt your internet (or switch from WEP encryption to a stronger method such as WPA…

  • Have a Virus? Let Malwarebytes Help

    It can happen to anyone:  You turn on your computer and log in, only to find pop-up advertisements, search bars, a changed desktop background, and many screens warning that you may be infected with a virus. One sign that you have been infected with a virus (or what can be referred to as malware) is…

  • Preventing Viruses Part 1: Email Viruses

    When you think of a computer virus, you might imagine a hacker in a dimly-lit room deliberately targeting your computer with malicious software.  While that might happen in movies, real viruses are nearly autonomous and are constantly scanning the internet seeking vulnerable software and hardware.  As soon as they find a viable target, they infect…

  • How to Setup Folder Sharing with VirutalBox Guests

    Having a virtual machine installed on a personal computer offers many uses.  One use is the ability to try a new operating system before it is released, such as Windows 7. Once you’ve installed a virtual operating system, you might want to access files that are stored on the host operating system.  VirtualBox offers a…

  • Can’t Find a Device Driver? Let Unknown Devices Help

    The scenario: You just reinstalled Windows on your computer and are having a difficult time finding a driver for an obscurely named device.  You have checked the manufacturer’s website and have tried several different drivers, all with no luck finding the correct the device driver.  Unknown Devices is a program that will assist with searching…

  • Brizzly Gives Twitter a Better Web Interface

    If you’ve ever wanted more from Twitter’s web interface, you’re not alone.  Although functional, the web interface only provides basic features and rolls out new features long after they have been released in 3rd-party clients. Brizzly is a free web-based Twitter client that provides a much more robust experience and adds many features that aren’t…