崔贤俊
-
Using a U2F Key to Secure Your Google, Dropbox, and GitHub Accounts
Last week we discussed the basics of two-factor authentication (2FA) and why it's a good idea to tak...
-
How Screwed is Intel without Hyper
As we've come to learn recently, there are four new hardware vulnerabilities that affect Intel proce...
-
Windows 8.1: Six Things Microsoft Got Right and Others That Are Still Missing
Not unlike previous releases of Microsoft's ubiquitous desktop OS, Windows 8 has faced a lot of scru...
-
10 Big Misconceptions About Computer Hardware
With technology advancing so rapidly around us, sometimes misconceptions can work their way into our...
-
Screenshot Sharing in a Snap: 7 Free Alternatives to Droplr
Many of us here at TechSpot use Droplr on a daily basis to quickly share screenshots. While this sim...
-
How Blizzard Saved Diablo III From Disaster
This is an excerpt from Jason Schreier's upcoming book, "Blood, Sweat, and Pixels," which comes out...
-
How to Remote Access Your Computer with Chrome
There are plenty of scenarios and options when it comes to computer remote access. TeamViewer is a g...
-
Final Fantasy XV Mega CPU Battle
Today we're checking out Final Fantasy XV CPU performance using the new standalone benchmark release...
-
Pairing CPUs and GPUs: PC Upgrades and Bottlenecking
How bad is bottlenecking these days? Well, that all depends on how bad you are at pairing hardware....
-
We Cannot Live Without Cryptography!
You're about to wind up your day and use your smartphone to check what's in your smart fridge to dec...
-
What Ever Happened to GeoCities?
In the mid 1990s, the internet had no Facebook, Google or even Wikipedia. If you wanted to use the w...
-
What Happened Last Time AMD Beat Intel?
Seeing how quickly AMD Ryzen processors are flying off the shelves, it's not hard to see the desktop...