This tutorial describes how you can connect your laptop or notebook computer to your television screen using standard ports like S-Video, VGA or DVI.
The lesser known but immensely useful features of Software that you are not using.
What is the best font for PowerPoint Presentation slideshow that can be read by everyone in the audience, they are beautiful and will make your presentation stand out.
Remove vocals from Music. Yes, there is a way to get the background music from a song without the words.
JPEGs are for photographs and realistic images. PNGs are for line art, text-heavy images, and images with few colors. GIFs are just fail.
YouTube HD Video Tutorial: Learn how to make High Definition 720p screencast videos for YouTube in 16:9 widescreen format.
Some useful keyboard shortcuts and commands to help you personalize the MS-DOS Command Prompt Window without using the mouse. Do more and work faster.
The many advantages of using gmail imap with microsoft outlook – you get more storage space in google mail, less spam and better email filters. Plus you can grab pictures of your Outlook contacts from Facebook.
Apply a Creative Commons License to your photos, documents, MP3 and videos with these free software tools. For blogs and websites, use the online Creative Commons License generator.
Unlike other offline browsers (wget or httrack) which simply mirror web content, Web Book can download and also convert web pages into a variety of formats including plain text, HTML, PDF or RTF.
Command prompt (cmd.exe) users may want to switch from Lucida Console to Consolas font since it allows for more comfortable reading of text on-screen.
How to remove the useless files from Windows Vista and recover disk space.
Windows can easily detect external mice and install the appropriate drivers but the problem is that the position of the mouse pointer that you see on the screen is not accurate.
When you drag and drop files to the command line window, it automatically fills in the complete path of the file.
The transparent laptop screen you see on the right is no Photoshop trick, but a rather ancient (by internet standards) optical illusion.
The Windows Key, normally tucked away between your left ALT and CTRL keys, is a very versatile key.
While copying or moving a large number of files from one location to another folder in Windows, you may often encounter errors or warning messages saying the file you are trying to copy already exists in the target location.
Conficker (aka Downup, Downadup and Kido) is a computer virus disables system services like Windows Automatic Update, Windows Error Reporting, etc. and then connects to a web server to spread itself further.
This tutorial shows how to create a time lapse video from digital photographs or screenshot images using software that’s already on your computer. The completed movies looks just like a flipbook.
Always-on-top is the feature that allows any program window to stay on top of all other windows even when it does not have focus. This lets you watch movies in VLC media player while browsing websites in IE.
This simple keyboard shortcut allows you to jump over words while editing text in almost any Windows application.
This is a simple AutoHotKey script that can be invoked by pressing a keyboard shortcut and it lets you capture thoughts and ideas from any other Windows Application.
Windows Explorer in Windows 7 and Vista makes it very easy for you to manage large folders that have hundreds of files and sub-folders (e.g.
When you right-click on the Windows desktop, there’s an option to change the default size of desktop icons – you could either choose medium, large or the default Classic size.
One of the most frustrating times for a user can be waiting for a computer to start. You wait for the computer to boot up, wait for Windows to load, log in, and then finish waiting for all the background programs and services to load.
From US-Cert: Because there are certain characters that may appear to be the same but have different ASCII codes (for example, the Cyrillic "a" and the Latin "a"), an attacker may be able to "spoof" a web page URL.