guteksk7/Shutterstock App updates deliver new features, security fixes, and improve the stability of existing software. Unfortunately, not every Mac app is updated the same way. Some take care of themselves, while others need a nudge from you. Here’s what you need to know to keep all your Mac software up […]
How to Change Nearby Share Device Visibility on Android
Share nearby is the Android version of Apple’s AirDrop. It is a universal method of sharing links, photos and files between devices. Here’s how to control who can see and send items on your device. Nearby sharing is compatible with all Android 6.0+ devices, starting with Google Pixel and Samsung […]
How to Customize Your Visual Studio
Visual Studio offers a lot of customization options, albeit somewhat buried in the menus. You can apply custom themes, change your style rules, and add custom fonts with ligatures designed for programming. Configure a custom theme Microsoft provides a few tools for this, but the newest and easiest to use […]
Why You Should Update All Your Software
Billions of photos / Shutterstock.com Software updates can be boring. They take time to install, move (or remove) the features you use, and sometimes even break things. Still, we recommend that you update (and upgrade) your software whenever possible. The Internet is a dangerous place. Security Updates 101 The operating […]
How to Encrypt Files with gocryptfs on Linux
Fatmawati Achmad Zaenuri / Shutterstock Do you want to encrypt important files, but not the entire hard drive of your Linux system? If so, we recommend gocryptfs. You will get a directory that basically encrypts and decrypts whatever you store. gocryptfs provides protection against data breaches Confidentiality is big news. […]
How to Utilize DigitalOcean Firewalls for your Droplets
Firewalls are essential for the security of any server. Allowing only the right traffic to the right resource prevents malicious traffic and potential attacks from taking advantage of your unprotected server. DigitalOcean offers virtual machines, called Droplets, which offer their own advantages of configuring, monitoring and maintaining the firewall system […]