林道远
-
Top 10 Hacks for Microsoft Word
Microsoft Word is the de facto standard in word processing. Simple on the surface, yet immensely cap...
-
A Surveillance Primer: 5 Eyes, 9 Eyes, 14 Eyes
As awareness of global surveillance grows, more people are looking for information about the Five Ey...
-
2016 Flagship GPU vs 2022 Budget GPU
Today's comparison is about two GPUs that we never thought about putting head to head, but after thi...
-
Intel's 100
The Z170 chipset has been available for some time now, but due to Intel's staggered launch of Skylak...
-
Google Drive Alternatives: Improving Privacy and Security
In an age of eroding online privacy and increasing corporate surveillance, many are looking for a go...
-
So, You Want to Be a Video Game Developer?
You could be the kind of person who just lives and breathes video games, loving every aspect of them...
-
50 Years Later: The Revolutionary 8008 Microprocessor
Guest author Ken Shirriff is a Silicon Valley-based computer enthusiast who enjoys reverse-engineeri...
-
Nvidia and AMD Seriously Want to Offload Current
In the lead up to next generation GPUs, current graphics card prices continue to dominate the discus...
-
How We Test: CPU Benchmarks, Misconceptions Explained
We're certain many of you already have a solid understanding of how we perform CPU benchmarks, but a...
-
How to Choose an SSD on a Flash Sale
What SSD Should You Buy? Under normal circumstances, we would simply recommend you to follow our Bes...
-
Using a U2F Key to Secure Your Google, Dropbox, and GitHub Accounts
Last week we discussed the basics of two-factor authentication (2FA) and why it's a good idea to tak...
-
The Dark Web: Exploring the Hidden Internet
In the realm of the Internet, few things carry as infamous a reputation as the Dark Web. Widely util...