18 Tutorial Topics

Remove Filter
Member Avatar for
Member Avatar for captchaAI

OCR (Optical Character Recognition) is a technology that enables the conversion of images or scanned documents into machine-readable text. OCR software uses algorithms and machine learning models to recognize and extract text characters from an image, which can then be converted into an editable and searchable format. OCR technology has …

Member Avatar for richards1222
1
159
Member Avatar for happygeek

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …

Member Avatar for rproffitt
2
971
Member Avatar for happygeek

Got Android? Then you had better be on top of your security smarts. With Android cornering more than 80 per cent of the mobile operating system market, it's no surprise that Android devices are the number one target for the mobile malware merchants. Kaspersky Lab reckoned that Android malware attacks …

Member Avatar for happygeek
1
2K
Member Avatar for happygeek

Shadow IT is the usage of unauthorized tech by employees; usually cloud applications and services. A progression of the Bring Your Own Device (BYOD) debate, I have not said that the applications or services themselves are inherently insecure. Nor that usage is for malicious purposes. Quite the opposite is mostly …

Member Avatar for Subraa_1
3
1K
Member Avatar for happygeek

The Google Experience Launcher, as it was, first arrived exclusively for the Nexus 5 towards the end of last year. That changed recently when the renamed Google Now Launcher (GNL) appeared in the Play Store as a standalone app for Nexus devices and those handsets running Google Play Edition (GPE), …

Member Avatar for Yasar_2
0
439
Member Avatar for happygeek

The start button does make a comeback, sort of, in Windows 8.1 but it's still not enough to satisfy the die-hard 'I got Windows 8 but miss Windows 7' brigade. Not least as when you click the Windows 8.1 start button it doesn't pop up the old folder-structured start menu …

Member Avatar for goodtaste
1
1K
Member Avatar for happygeek

There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of …

Member Avatar for Stuugie
5
830
Member Avatar for Reverend Jim

##How to set up file synchronization using BitTorrent Sync (part 1) There are a number of services that offer file sharing/syncing via the "cloud". The free versions come with limitations on file size. As well, DropBox suffers from security issues in that encryption is done at the server meaning that …

1
842
Member Avatar for Slavi

Hello everyone! As some of you may know, Eclipse Luna appears to be broken for users of Kali Linux. There is a simple fix for that > Assuming that you have installed Eclipse Luna locate eclipse.ini `sudo nano eclipse.ini` add the following 2 lines before `--launcher.appendVmargs` --launcher.GTK_version 2 press `ctrl …

Member Avatar for zinist
2
3K
Member Avatar for happygeek

The purpose of this short and sweet tutorial is equally concise: how to get the original look and feel of the Google Chrome web browser back after installing on a Windows 8 computer. Having recently been forced into buying a new laptop, I finally took the plunge and decided to …

Member Avatar for birbilis
3
1K
Member Avatar for Adamsappleone

Many of you know how to hide your important files and folders and burn them to disc to keep them from being accessed from other users, but if you your drive has so many files that it would take too long to copy all to disc, then why not hide …

Member Avatar for sanbafunv
0
347
Member Avatar for happygeek

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. …

Member Avatar for Hiroshe
1
1K
Member Avatar for happygeek

One of the oldest technology truisms must be that you only realise the importance of backing up your systems after disaster strikes. This is especially true if you have no backups to turn to. There are, thankfully, few excuses aside from sheer laziness not to backup your data these days; …

Member Avatar for rubberman
0
513
Member Avatar for happygeek

When it comes to web browsers, my general rule of thumb is that the latest version is usually the most secure and this is certainly the case with Internet Explorer. However, when I started using Internet Explorer 11 on my new Windows 8.1 Pro laptop I soon discovered that latest …

Member Avatar for happygeek
1
719
Member Avatar for acorange2027

USING THE ACER ASPIRE 1410 LAPTOP AS AN HD MEDIA CENTER PC: A STEP-BY-STEP ILLUSTRATED TUTORIAL [I]This tutorial is not intended to be a full review of the Acer Aspire 1410 ultraportable laptop PC. It assumes that you already familiar with the machine and are looking to learn how to …

Member Avatar for Jaydesmith
2
1K
Member Avatar for Adamsappleone

With this method you can add any custom button to the Explorer Command Bar/Toolbar which I'm sure you have noticed that Vista and Windows 7 have excluded some familiar buttons, including the Delete Button/Icon. [url]http://www.aeroxp.org/2008/06/custom-explorer-buttons/[/url] If you just want the "Delete Button/Icon" as I did, then download the following zips …

0
299
Member Avatar for EddieC

If your application provides custom dialog-box features, menu items or other capabilities by making changes to the Windows Registry, you can deploy those capabilities to other computers simply by distributing an update or patch to the Registry. Updating the Registry involves nothing more than exporting the capabilities from the Windows …

1
474
Member Avatar for John A

Debian Linux is what you might call very, very flexible because it runs on nearly any hardware configuration, from Motorola chips to PowerPC to the x86 structure. So whatever your machine is Debian Linux can most likely run on it. However, because installation is so different between different setups, this …

1
546

The End.