Chromebooks have great battery life, but without a network connection, there isn't a whole lot you can do with them. Here's how to connect your Chromebook to the cloud over a Wi-Fi network:
Step 1: Click on the network icon, located in the upper right-hand corner.
Step 2: Choose the network you want to connect to from the list of detected Wi-Fi networks. If you don't see a list, make sure that Enable Wi-Fi has been selected. If you choose a secured network, you'll prompted for a password.
Google's Chrome OS uses some familiar keyboard shortcuts as well as some unique ones. A few of these access Chrome OS settings and others take the place of missing physical keys on Chromebook keyboards (Page Up, Page Down, Home, End). Here are 15 essential keyboard shortcuts in Chrome OS:
Ctrl+? Open help Shift+Esc Open task manager Ctrl+Alt+/ Open keyboard shortcut list Ctrl+M Open file manager
Navigation and text editing:
Alt+ up arrow Page Up Alt+ down arrow Page Down Ctrl+Alt+ up arrow Home Ctrl+Alt+ down arrow End Ctrl+Tab Switch to next browser … Read more
This week I cleared Vista out of my home office by upgrading a 6-year-old PC to Windows 7. The machine was in dire need of a tune-up. I figured the money spent on a Win 7 upgrade would extend the desktop PC's life span and save me hours of system maintenance time.
When I ran the Windows 7 Upgrade Advisor, the program warned me that the machine's ATI Radeon Xpress 200 display driver and Realtek Audio Manager utility were out-of-date. The PC was otherwise good to go, which was a pleasant surprise considering it shipped in 2005 with … Read more
Google's Chrome OS has the native ability to take screenshots, which is useful for support and training, among other things. We'll show you how to take a screenshot in Chrome OS, find it, and move it to another computer.
Take a screenshot To take a screenshot, press Ctrl and the switch window key (the shortcut key in the top row of the keyboard, between full screen and bright down).
Find the screenshot To find the screenshot, press Ctrl+M, to launch the file manager. You'll see a folder named File Shelf. Within File Shelf, you'll find … Read more
A new malware infection has apparently been spreading relatively rapidly among Mac users, and it's unclear both how pervasive the infection is and whether Apple is addressing the problem. What is known, however, is how to get rid of it.
What is it? Most often called MacDefender, but also known as MacProtector and MacSecurity, this bit of malware is a socially engineered threat of a type that's more familiar to Windows users. It often starts with a Web advertisement that suckers you into downloading a rogue antivirus program, which purports to protect you. In fact, once installed it … Read more
You just got your shiny Google Music beta invite and you are eager to use it, but you don't like the idea of having to have your browser (or an extra tab) open to stream music on your Mac? We can relate. We created a simple guide to show you how to turn Google Music into a Dashboard widget on your Mac, allowing you to close your browser and still enjoy your streaming music collection.
If you are a Sony PlayStation Network (PSN) customer you are probably getting a little paranoid. First there was the data breach from last month that exposed customer data and forced Sony to take the network down.
And now, just days after Sony got the service back up and running, it has taken the PSN password reset service offline because it was allowing people to change other customers' passwords if they knew their e-mail address and birth date--information that was stolen in the attack.
Sony says the hole in the PSN password reset site was not exploited in active attacks, … Read more
Update, Wednesday at 11:45 a.m. PT: Google has issued a fix that forces the affected Google apps to connect via the secure protocol HTTPS. As long as you update your apps when the fix is pushed out, this public Wi-Fi vulnerability won't affect you. Until then, it's best to use public Wi-Fi with extreme caution or follow the instructions below.
Here's how it works. The vulnerability is in the ClientLogin Protocol API, which streamlines how the Google app talks to Google's servers. Applications request access by sending an account name and password via secure connection, and the access is valid for up to two weeks. If the authentication is sent over unencrypted HTTP, an attacker could use network-sniffing software to steal it over a legitimate public network, or spoof the network entirely using a public network with a common name, such as "airport" or "library." While this won't work in Android 2.3.4 or above, including Honeycomb 3.0, that only covers 1 percent of in-use devices.
Of course, the safest solution is to avoid using public, unencrypted Wi-Fi networks by switching to mobile 3G and 4G networks whenever possible. But that's not always an option, especially for Wi-Fi-only tablet owners or those on tight data plans. … Read more
Currently, if you want to transfer a picture or video from your iPhone to your iPad, Apple requires you to sync the video on your iPhone to your computer, then sync your iPad to your computer (moving the video from the computer to the iPad). The ability to exchange pictures between your iDevices and your computer wirelessly exists; we are going to show you where to find it and how to use it. Follow along!… Read more
BitTorrent 8, released last week in beta, contains a sharp new feature that makes it easier than ever to create torrents of your personal files and share them with a personal group of friends or colleagues. The feature implementation isn't expected to change by the time that BitTorrent 8 graduates to its final version, so this How To ought to be viable for some time.
Once you've installed BitTorrent 8 beta (download), take a quick tour of some of the public content channels that come with the program. This part isn't essential, however, it's worth seeing … Read more