飞颖
-
Using a U2F Key to Secure Your Google, Dropbox, and GitHub Accounts
Last week we discussed the basics of two-factor authentication (2FA) and why it's a good idea to tak...
-
Interview: What is it Like to Develop a Game in VR?
The jump scare is a trope used in many horror video games. It features a build-up of suspense, the m...
-
These 9 Devices Might Be a Waste of Your Money
Sometimes it pays to buy slightly older devices in place of tempting deals on newly released tech. B...
-
The Evolution of Ransomware
These days, not a month goes by that we hear about a new major ransomware attack. Initially, the ran...
-
Ryzen 5000 Memory Performance Guide
In this article we'll be searching for Zen 3's memory sweet spot and looking at DDR4 memory performa...
-
How We Test: CPU Gaming Benchmarks
This a topic that's often raised when we do our CPU gaming benchmarks. As you know, we perform a ton...
-
How to Save PDF Pages as JPG Images in Windows and macOS
If you want to neatly share PDF pages on social media without relying on ugly screenshots, you shoul...
-
Adobe's Flash Updater: Bloated, Confusing & Shady
Editorial Being one of the most prolific sources of security vulnerabilities in Windows and other pl...
-
Why You Can't Buy Books from the Kindle app on iPhone or iPad in 2018
Spoiler alert:It's the same reason you couldn't in 2017 or previous years for that matter.Apple user...
-
The Most Memorable Overclocking
Enthusiasts have been pushing the limits of silicon for as long as microprocessors have existed. Ear...
-
Nvidia Ampere vs. AMD RDNA 2: Battle of the Architectures
For GPU enthusiasts, it's been a long wait. Nvidia kept the Turing line going for two years before r...