How to Create Your Own Custom Bokeh Wallpaper in Photoshop

Why Do I Want to Do This? There are two big take-aways from today’s photo tutorial. Finally, it’s just good clean digital editing fun. What Do I Need? What Concepts Are We Using? For this tutorial, there are a few key design elements we want to keep in mind. We also want to recreate the variability of light size you would find in the real world. In other words, we don’t want a flat image with uniform circle size....

June 12, 2013 · 3 min · 516 words · Zachary Lam

How Does a Bittorrent Client Initially Discover Its Peers?

Read on as we poke around inside the mechanisms that undergird the BitTorrent protocol. If new peers are discovered, they are added to the list. My question is, how does DHT work? (Note: simple explanations are best.) But how didtheybootstrap themselves? Eventually, you’ll hit a situation where you better connect to the public Internet. The tracker that you connect to, for instance, may be itself a DHT node. The simple answer to your question in bold is,you don’t....

June 11, 2013 · 1 min · 142 words · Denise Marshall

How and Why to Back Up Your Cloud Data

But what if one of these services failed and lost your data? Isn’t My Cloud Data Safe? Your emails are probably safer in Gmail or Outlook.com than they are on your hard drive. Service providers generally back up your data to multiple locations. But you shouldn’t ignore backups entirely just because your data is in the cloud. Having a local backup is still a smart idea. Some services my not allow you to export your data....

May 29, 2013 · 1 min · 99 words · Austin Hill

8 Ways Hardware Manufacturers Are Deceiving You

We’re not the only ones calling these marketing gimmicks misleading. Some of these tricks have even been the subject of class-action lawsuits for misleading consumers. Samsung’s 16GB Galaxy S4 only offers about 8GB of usable storage space. However, this can be confusing when comparing different types of devices. This situation is a mess. For more in-depth information, readHTG Explains: Why Do Hard Drives Show the Wrong Capacity in Windows? Nowhere is this more (un)clear than with the iOS 5....

May 17, 2013 · 1 min · 207 words · Robert Murray

How to Strip the DRM from Your Kindle Ebooks for Cross-Device Enjoyment and Archiving

Quick Links Why Do I Want To Do This? Note: This tutorial will only help you strip the DRM from books you have actually purchased. What Do I Need? We won’t be covering how to install and use Calibre in this tutorial. There are a few noteworthy things before we continue. Extract the contents of the zip file to a temporary location. Scroll down to the Advanced section and hit Plugins....

May 17, 2013 · 2 min · 216 words · Shane Brown

Learn How to Use Excel Macros to Automate Tedious Tasks

Note: the same process should work in most versions of Microsoft Office. The screenshots might look slightly different. What is a Macro? For a comparable analogy, think of a document as HTML and a macro as Javascript. Macros are incredibly powerful and can do pretty much anything your imagination can conjure. Our goal is to produce a well formatted, presentable data sheet which includes summary totals for each row. To create a macro, go to View > Macros > Record Macro....

May 14, 2013 · 2 min · 322 words · Jerry Allen

How PowerShell Differs From the Windows Command Prompt

PowerShell is more complicated than the traditional Command Prompt, but it’s also much more powerful. In addition, most Command Prompt commands are usable in PowerShell, whether natively or through aliases. It uses different commands, known ascmdlets in PowerShell. Thus, you’re able to use multiple cmdlets in sequence to manipulate the same data. And pretty much everything in PowerShell is an object, including every response you get from a cmdlet. This allows PowerShell to share more complex data between cmdlets, operating more like a programming language....

May 13, 2013 · 1 min · 163 words · Laurie Johnson

Go Paperless: Stop Printing Everything and Enjoy the Digital Life

Quick Links The “paperless office” we were promised never seems to arrive for many people. Printing was necessary when computers were heavy bricks that sat attached to desks. People will need the password before they can access your documents. Image Credit:Sarah Kolb-Williams on Flickr,cellanr on Flickr,jeremyfoo on Flickr

May 12, 2013 · 1 min · 48 words · Patrick Bullock

Add Comments to Formulas and Cells in Excel 2013

We will use the function that generates a random number between a range of numbers as an example. Enter the following formula in a cell in your spreadsheet. =RANDBETWEEN(1, 49) This function will generate a random number between 1 and 49. In the Comments section of the Review tab, click New Comment. A sticky note-style box displays pointing at the selected cell. Enter any additional desired text into the comment box....

May 8, 2013 · 1 min · 116 words · Catherine Carpenter

What ActiveX Controls Are and Why They're Dangerous

Quick Links ActiveX controls are Internet Explorer’s version of plug-ins. For example, Internet Explorer’s Flash player is an ActiveX control. Unfortunately, ActiveX controls have been a significant source of security problems. ActiveX controls are like other programs – they aren’t restricted from doing bad things with your gear. ActiveX controls are actually not Internet Explorer-only. They also work in other Microsoft applications, such as Microsoft Office. ActiveX controls only function in Internet Explorer....

May 5, 2013 · 1 min · 107 words · Cathy Johnson

Why You Can't Undo Sending an Email (and When You Can)

Quick Links you could’t normally “undo” an email sent by mistake. Their email server receives it and shows it in their email client. There’s no way to go back and undo an email that’s already sent out. The copy is on someone else’s mail server, completely out of your control. Microsoft Outlook does contain a “Recall” feature that allows you to recall email messages in certain cases. Outlook’s recall featureworks by sending a message to the other person’s inbox....

April 29, 2013 · 1 min · 136 words · Robert Ortega

What's the Difference Between 127.0.0.0 and 127.0.0.1?

What’s the difference between them? Can they be used interchangeably? What kind of information can we tease out from this table? The Answer Two SuperUser contributors jumped in to help solve the mystery. First, Mmmc offers this succinct overview: No. You cannot use them both. And they are not both loopback adresses. 127.0.0.1is a loopback address127.0.0.2is a loopback address127.0.0.3is a loopback address and so on 127.0.0.0is a web connection address....

April 23, 2013 · 1 min · 136 words · Heather Pena

Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats

These terms define different groups of hackers based on their behavior. Black hats fit the widely-held stereotype that hackers are criminals performing illegal activities for personal gain and attacking others. They’re the computer criminals. White Hats White-hat hackers are the opposite of the black-hat hackers. For example, many white-hat hackers are employed to test an organizations' computer security systems. The organization authorizes the white-hat hacker to attempt to compromise their systems....

April 20, 2013 · 1 min · 102 words · Mr. Mark Evans MD