UP

Latest articles

tutorial Quickly scan documents, business cards, whiteboards, etc with OneDrive for Android and iPhone

Quickly scan documents, business cards, whiteboards, etc with OneDrive for Android and iPhone

Scanning documents, business cards, and other types of printed text, with your smartphone, has become commonplace. It usually involves an app that can do the scanning for you and some post-processing. Microsoft managed to make things even easier than that, by implementing a scanning feature directly in its OneDrive apps for Android and iOS (iPhone and iPad). This feature is built into the OneDrive
tutorial 9 ways to boot Windows 8 or Windows 8.1 into Safe Mode

9 ways to boot Windows 8 or Windows 8.1 into Safe Mode

Are you struggling to boot Windows 8 or Windows 8.1 into Safe Mode? Have you tried pressing both F8 and Shift + F8 and they do not work? That is because the boot procedure in Windows 8 is different compared to older versions of Windows such as Windows 7. The boot is so fast that it literally cannot be interrupted by any of your
tutorial How to work with the Performance Monitor in Windows

How to work with the Performance Monitor in Windows

Have you heard about the Performance Monitor, also known as PerfMon.exe or PerfMon.msc? It is a sophisticated tool that can be used to monitor the performance of your Windows computer or device. Using it, you can see how your computer manages its resources. The information it gives you can help you make decisions about software and hardware choices, especially when your computer's performance is
article Simple questions: What is two-factor authentication or two-step verification?

Simple questions: What is two-factor authentication or two-step verification?

In recent years a new security concept has made the headlines - two-step verification or two-factor authentication (2FA). It all started with Google enabling it for its users, and since then, many companies followed their example, including Microsoft, Apple, and Facebook. Even gaming companies joined this trend. If you would like to understand what two-factor authentication is, how it works, why you should enable
tutorial How to enable and use Fortnite's 2FA (two-factor authentication)

How to enable and use Fortnite's 2FA (two-factor authentication)

If you are a gamer and you like to play online games, such as Fortnite, you should be prepared for bots and people trying to hack into your account. That is true especially if you are good at your game or if you have invested money in it. The best thing you can do to protect your account is to enable two-factor authentication. By
tutorial 7 things you can do with the existing tasks from Task Scheduler

7 things you can do with the existing tasks from Task Scheduler

You may know what the Task Scheduler is and what it does. Maybe you also know how to create new scheduled tasks. But what about managing the existing scheduled tasks? Do you know how to run or stop scheduled tasks manually? Do you know how to disable, delete, export or import some scheduled tasks? Read on and find out the essential seven things that
review Review CyberGhost: One of the best VPNs money can buy

Review CyberGhost: One of the best VPNs money can buy

CyberGhost VPN is one of the most popular VPN services in the world. Also, it is one of the easiest to use and one of the most affordable. Due to the elimination of Net Neutrality rules in the USA, and other legislative changes around the world, privacy and security have become more critical than ever. Is CyberGhost's VPN service up to the task of
tutorial How to enable or disable 2-step verification for your Google account

How to enable or disable 2-step verification for your Google account

Google's 2-Step Verification is an extra layer of security that insulates you from others trying to break into your Google or Gmail account. The internet is a scary place nowadays with automated bots that try to hack into websites and e-mails, and other nasty things. To protect your Google account as much as possible, we recommend setting up two-step verification (also known as two-step
review Security for everyone - Reviewing Heimdal Thor Premium Home

Security for everyone - Reviewing Heimdal Thor Premium Home

Heimdal is a relative newcomer to the market of security products. In the past, they offered Heimdal Free and Heimdal PRO to home users. They were efficient products, that added new layers of protection to existing antivirus products. We loved using them, and we highly recommended Heimdal to all our readers. The company has recently launched new products, with different names, that also include
review Synology MR2200ac review: Not your average mesh WiFi system!

Synology MR2200ac review: Not your average mesh WiFi system!

Synology MR2200ac is the second Synology networking device that we have tested, and we are impressed. It is clear to us that this company knows how to deliver excellent networking devices to the consumer market, with top-notch security, privacy built-in, as well as advanced controls for the users those who need them. Synology MR2200ac is not just another mesh WiFi system. Its looks are
review Synology RT2600ac review: Security, privacy, and flexibility!

Synology RT2600ac review: Security, privacy, and flexibility!

Synology is a Taiwanese company that specializes in network-attached storage products, which are famous for their quality. Two former Microsoft employees founded the company that started by coding an operating system. Today, Synology manufactures wireless routers for homes and businesses, and the company offers a few attractive models. Their most premium wireless router is Synology RT2600ac. It is a solid device, with modern specs,
review ROCCAT Horde AIMO review: A gaming keyboard for everyday use!

ROCCAT Horde AIMO review: A gaming keyboard for everyday use!

ROCCAT Horde AIMO is a gaming keyboard that is presented as being membranical. The idea behind this concept it is that the keys on the keyboard use membranes instead of physical mechanical switches, and the experience should resemble that of a mechanical keyboard. Among other extras, it is also equipped with RGB lighting and features dedicated macro keys and a tuning wheel that resembles
tutorial How to create an animated GIF using your own pictures, with GIMP

How to create an animated GIF using your own pictures, with GIMP

Animated GIF images are all over the internet. You can find them on websites, on social networks and even in messaging apps that we all use on our smartphones. Have you ever wondered if you could create a GIF animated image using your photos? If you did, in this tutorial we are going to show you an easy way of creating an animated GIF