凉山彝族自治州
-
How to Secure Your Android Phone and Get the Most Out of Smart Lock
Hackers, malware, thieves, today's Android users are facing more threats than ever before. As such,...
-
Tweaking Windows 10 Privacy Settings
Several controversial privacy issues have kept many users from upgrading to Microsoft's latest opera...
-
Biggest Tech Fads of the Last Decade
A number of industries are well known for their fads: fashion, food, health. But technology has expe...
-
Secure Email and Cloud Alternatives to Gmail and Dropbox
Back in June last year, confidential documents leaked by Edward Snowden indicated that major email a...
-
Old School PC Gaming: Classic Games that Have Aged Well
There are some excellent games – some old enough to buy their own alcohol – that are as good today a...
-
The Most Popular Computing Device Has Yet to Be Invented: The 15
I've wanted to write this for some time, but hadn't because there was no solid data to back-up my as...
-
The Evolution of Ransomware
These days, not a month goes by that we hear about a new major ransomware attack. Initially, the ran...
-
When SSD Performance Goes Awry
An unfortunate tale about Samsung's SSD 840 read performance degradationAn avalanche of reports emer...
-
The 12 Best Games on the iPhone
You’ve got yourself an iPhone and you want to play some games on it. You might not want to just plun...
-
How USB Works
Editor's note:An updated version of this article has been published.For 25 years, the USB port has b...
-
7 Tech Predictions for 2018
After a surprisingly robust 2017, our collective attentions now turn to the new year, and many quest...
-
Windows 8.1: Six Things Microsoft Got Right and Others That Are Still Missing
Not unlike previous releases of Microsoft's ubiquitous desktop OS, Windows 8 has faced a lot of scru...