Have you ever gone back to your computer after letting someone use it for "just a second" and found it in disarray? Maybe they logged you out of all your accounts because they wanted to check Facebook or their e-mail. Or perhaps they did a little window-shopping on Amazon and now you're getting strange product suggestions on the home page. To help you and your guests maintain some sense of privacy while sharing the Web, you can use Chrome's guest browsing mode.
Guest browsing was first available in Chrome OS as a way to let Chromebook owners safely share their Chromebooks with others. The feature is available in Chrome for Windows too, but is considered experimental for the time being. If you're interested in trying it out, here's how to enable guest browsing in Chrome:
Not so long ago, typing was for secretaries, journalists, and would-be authors. Now we're all tapping away at keyboards and screens from morning until night.
The number of people who spend their workday coding continues to soar. In the not-too-distant future, writing code may be as commonplace as typing and other forms of text-keying are today.
Learning how to code has never been easier. Whether you're a programming newbie or an old hand looking to learn a new skill or two, these four free services have you covered. (Note that all but W3Schools.com requires that you register to use the service by providing an e-mail address and password.)
The system image tool in Windows might not be the tool that Microsoft prefers you use for backups, but it's still a good tool for migrations and disaster recovery. As CNET's Rick Broida found out painfully, Windows will behave unexpectedly every now and then, particularly after OS upgrades. This is where having a system image can be a big help.
We previously went over how to create a system image in Windows 8. However, if you upgraded to Windows 8.1 -- surprise! -- the tool isn't where it used to be. If you want to use the system image tool in Windows 8.1, here's how to find it:
Think of all the places where your old email address resides, outside of your immediate control, waiting to give people plenty of false information. There are other people's address books, old messages in people's inboxes, Web sites that use your address as your logon name, and your business cards.
Few tools of modern technology have become as prevalent as the cell phone, which allows you to be in touch from almost anywhere, almost all the time. And you can do more than just talk: Today's phones let you send and receive email and text messages, surf the Web, and play music and videos. Sifting through the sea of service plans and handsets can be difficult, but we'll walk you through what you need to know to get the phone and the service plan that are right for you.
When considering a new smartphone, whether it’s the newest iPhone, an Androidsuperphone, or a business-friendly Windows Phone, it pays do a bit of research before you hit the stores so that you'll know exactly what to look for.
Windows is so customizable, it’s tempting to tinker. Don’t like Internet Explorer’s default feel? There are settings for that! Hate the way Windows 8’s Ribbon UI looks? Tweak away! And if you’re feeling truly adventurous, a veritable universe of change awaits within the easy-to-bork Windows registry.
But there’s a dangerous downside to all that freedom: You can really, really mess things up. And yes, that includes some very vital things.
Don’t swear off your courageous exploration just yet, though. Microsoft’s built a slew of granular controls into Windows that let you reset all sorts of individual aspects of theoperating system. There’s usually no need to hit an irritating fly with that great, big "clean install" sledgehammer! Read this before you burn your installation to the ground and start all over.
If a once-fast computer has slowed to a crawl, you can't really blame the hardware. Sure, you may be able to improve speed by adding RAM, upgrading the CPU, or replacing the hard drive with an SSD. But none of those solutions--all of which cost money--address the underlying problem. Your hardware isn't underpowered. It's overloaded.
Cleaning out Windows will very likely speed up a PC. And no, I'm not suggesting reinstalling the operating system. There are less drastic fixes.
In order to skip the logon screen, you must first open the Advanced User Accounts dialog box. How you get there depends on what version of Windows you're using:
Windows 7 & Vista: Click Start, type netplwiz, and press ENTER.
Windows XP: Click Start>Run, type control userpasswords2, and pressENTER.
Windows 8: Use the Search Charm to search for netplwiz. In the Apps section, click or tap netplwiz.
Once you're in the dialog box, make sure that your account--the one you boot into--is selected. Then uncheck Users must enter a user name and password.
Finally: Windows 8.1 is a major update that brings many improvements and new features to Windows 8. In addition to a bevy of new apps and meaningful interface changes such as a resurrected Start button and a new boot-to-desktop option, Windows 8.1 will also be the only desktop OS to support DirectX 11.2. Couple that with the streamlined characteristics of the OS, and many people—game enthusiasts in particular—may now be interested inmaking the switch to the cutting edge of Windows.
Going all-out on a top-of-the-line gaming rig is probably a rash idea at this point, since the next generation of consoles is about to kick off a frenzy of game development that will push the boundaries of gaming hardware. Instead, we set out to build a totally new gaming rig running Windows 8.1 for a cool grand—a solid system that would please all but the most demanding PC gamers.
Nobody likes it when their friends suddenly start spewing links to weight-loss supplements and porn on Facebook. Don't be that person. Using Facebook's two-factor authentication feature can help keep undesireables out of your account—perhaps saving some friendships.
Two-factor authentication, for the uninitiated, requires you to enter in another piece of private data in addition to your password in order to log in. This typically takes the form of a single-use security code that gets sent to your smartphone, and it can help keep your account safe in case a hacker or data thief ever gets ahold of your username and password.
To start, visit Facebook.com and log in with your username and password. Next click the gear icon in the upper right corner, and select Account Settingsfrom the menu that pops up. On the next screen, select Security from the list on the left, then select Login Approvals. When the Login Approvals section expands, check the box labelled Require a security code to access my account from unknown browsers, and Facebook will walk you through the setup process.
By default, Facebook will send security codes through its mobile app, but it can send you text messages as a backup login method. If you don't already have a cellphone number associated with your account, Facebook will ask you to add one. When prompted, select your country from the list, enter your number, then press Continue. Facebook will send you a text message to confirm that your number is indeed yours: Enter the six-digit confirmation code texted to you when prompted, then click Confirm.
Logging in
Facebook will not pester you to enter a security code from a browser it already recognizes, so if you only use Facebook from one computer, you may never be asked to senter a security code. But if you are, here's what to expect:
The next time you log into Facebook on a new computer, enter your username and password as usual, then press Log In. On the next screen, Facebook will ask you to enter a security code.
To get that code, open the Facebook app on your phone, tap More (in the toolbar on iOS, swipe left to right to access the More menu on Android), then scroll down and tap Code Generator. Facebook will give you a single-use code that's good for 30 seconds (after 30 seconds, you'll be get a new code). Enter this in on your computer, then press Continue.
Limitations
Facebook's two-factor authentication feature won't protect everything, though. It only asks for a security code if you attempt to log in from an unrecognized device, and it only works for login requests from Web browsers—you can log into the Facebook mobile app without having to enter a code. Still, it's better than nothing.
Unsurprisingly, the feature carried over to Windows 8. Surprisingly, it vanished in Windows 8.1. The only explanation I can conceive is that... actually, no, I can't conceive of any explanation. Did Libraries generate too many tech-support calls? Did research show that not many people used it?
If you don't know what's going on, these files can be confusing--and even scary. A file appears in your Documents folder without you intentionally creating it. Aside from the strange punctuation, the file name looks familiar. The icon and, if visible, the extension tell you that you can open the file in a common application. But when you double-click the file, or try to delete it, you get an error message.
Then the file disappears as inexplicitly as it appears. Except for those occasions when it doesn't disappear at all.
Red Eye Rose received a file with a strange extension. She doesn't know into what program she should load it. Neither does Windows.
I doubt that anyone knows all of the file extensions used since the pre-DOS days of CP/M. Some of them may not even describe a file type. Before Windows started using them to associate files with an application, people used extensions for all sorts of things.
But that was a long time ago. Chances are that the extension on your mystery file does indeed identify a program. But how do you find what program?
It seems like every day you read about another password security breach. It doesn't matter how robust your actual password is; if a hacker makes off with an entire password database, he can potentially access your account.
That's why an increasing number of sites and services are turning to two-factor authentication (also known as two-step verification), which adds a second level of security to individual accounts.
Evernote started offering this option a couple months ago, but only for users with a Premium subscription. Now, however, Evernote offers two-factor authentication for all account holders. Here's how to set it up:
1. Sign into your Evernote account in your Web browser.
2. Click your account name in the upper-right corner, then choose Account Settings.
3. Click Security in the toolbar at left. You'll see a Two-Step Verification option; click Enable. Note the message about updating your mobile apps (if you use any), which is required to take advantage of the feature.
4. Follow the prompts. You'll first need to field a confirmation email, which will include a verification code you'll enter back on the site. (You can also click an embedded confirmation button that'll open another instance of Evernote in a new tab. Either way is fine.)
5. Enter your mobile phone number and click Continue. In a few seconds you should receive another verification code, which you'll need to type into corresponding box on the site.
6. Now for the tricky part. Freebie accounts aren't entitled to verification via text message (aside from that initial one), so you'll need to install and use the free Google Authenticator app, which is available for Android, BlackBerry, and iOS. Once it's installed, click Continue with for whichever mobile OS you use.
7. Evernote will display (in your browser) a QR code you can scan with the Google Authenticator app. Scan it, then enter the numeric code generated within the app. (Whew! I know, a lot of steps, right?)
8. Finally, you should see a list of single-use backup codes you can use in the event you're unable to complete two-step verification. Make sure to write these down or print a copy, as you'll need to type/paste one in on the next screen!
By now you're probably thinking, "Hey, Rick, I came here for fewer hassles, not more," I feel you. This initial setup is a pain. And if you don't have a Premium account, all future two-step authentications you do (like on a new PC or mobile device) are a bit of a pain.
However, they're a one-time pain, and they vastly improve your Evernote security. So suck it up and get it done.
No one stays healthy forever. At some point, your loved ones will need access to all of your accounts. You can make that job easier for them.
No reader questions today. Instead, I'm answering a question that someone should ask: In our password-protected digital world, how do you prepare for that inevitable day when you die or otherwise become incapacitated?
This is no small problem. When you're gone, or have otherwise lost the ability to remember or communicate, loved ones will need access to your email, contacts, bank accounts, and more. Without your pre-planned help, this can be quite a challenge.
If you don't believe me, check out Google's page for Accessing a deceased person's mail. You have to gather up and snail-mail several items, including the death certificate (each official copy of which comes with a price). Part 2 of the process "will require you to get additional legal documents, including an order from a U.S. court and/or additional materials."
It would be a lot easier if someone you trust had your Google password--and other important passwords, as well.
Few things in life are as satisfying as building your own PC. Cobbling together a softly purring, fully functional computer out of disparate parts offers a true sense of creation. Even better, rolling your own results in a cheaper and more personally tailored PC than what you can find at big-box stores.
Building a PC sounds daunting, but it’s actually pretty straightforward. Still, a few key details can trip up even seasoned geeks who are not being mindful. This handy-dandy guide can help you avoid the most common PC building mistakes—and their associated frustrations.
Before you buy
Pay attention while you’re buying your components, or your DIY PC could wind up borked before you even begin.
Not all PC parts are compatible with one another. The most obvious example is the relationship between processors and motherboards. For instance, Intel’s second- and third-generation Sandy Bridge and Ivy Bridge chips need a motherboard compatible with the LGA 1155 socket, while the fourth-gen Haswell chips use LGA 1150 and the enthusiast-focused Extreme Edition processors require pricey socket 2011 motherboards.
Defective RAM can cause all sorts of problems. If you're suffering from frequent crashes, freezes, reboots, or Blue Screens of Death, a bad RAM chip could be the cause of your travails. If these annoyances tend to happen when you're using a memory-intensive application or game, bad RAM is a very likely culprit.
But that doesn't mean it's a sure one. You still need to make sure that the problem is with your RAM, and if it is, you need to identify the bad module.
The best diagnostic tool I know for the job is the free, bootable MemTest86. Since it's bootable, you need to put it onto removable media. You can download separate versions for installing the program onto a CD or on a USB flash drive.
The CD version comes as an .iso file. The USB version comes with a program that prepares a flash drive, so that it can boot your PC and automatically run MemTest86. If you're not familiar with booting from an optical disc or a flash drive, see Boot discs explained: An overview of booting your PC from something other than your hard drive
Although that kind of move is a lot easier than moving to a new home, it can still be a hassle. Here are some suggestions for smoothing the process.
1. Don't lock yourself into your ISP's domain. For example, if you're moving from, say, SBC to Comcast, you might be tempted to use your new Comcast email address. That's fine, but what happens if you decide to switch to a different ISP again? You'll face the same hassle all over again.
Instead, start using a Web-based email service you can keep forever and access regardless of who supplies your Internet service. That means Gmail, Outlook.com, Yahoo, or a similar provider.
Building a computer is a great way to get a custom configuration, save some money and have fun. In this how-to video, we'll show you how to build one in less than two minutes.
Today, Google rolled out a Chrome update that not only relocates that useful option, but also simplifies the browser's new-tab interface.
Let's take a look. In the past, when you opened a new tab (either by pressing Ctrl-T or clicking the new-tab button), you'd see one of two pages: a collection of Chrome apps or a bunch of thumbnails for your most-visited sites.
That was kind of a hassle, having to switch between the two. Now, everything is accessible from a single, more unified, page.
Specifically, when you open a new tab, you'll see the Google Search bar. Below that, your most-visited sites, again in thumbnail form.
As for apps, you can access them by clicking in either of two places. The first is the newly added apps shortcut that was added to your bookmarks bar. (If you don't use that bar, obviously you won't see it.) Clicking that shortcut reveals the old apps screen you're familiar with.
The word malware (malicious software) describes any piece of code designed to infect your computer (or mobile device) and make it do things that you don't want it to do, such as mass-mail spam or steal your banking passwords. Trojans, worms, and rootkits are all types of malware.
Laptops long ago surpassed desktops in sales, and tablets and smartphones are taking major market share from laptops. The tendency is clearly towards smaller, lighter, and more portable computing. But there are some good reasons to stick with a big box that sits on or below your desk.
First off, there's the price/performance ratio. Whether you're spending $300 or $3,000, you will get a more powerful computer for your money if you're willing to give up portability.
The first thing you need to do is try to log onto Twitter. If you can do that, change your password. This will stop the Twitter thief in his or her tracks, and regain you control of your account--if the thief hasn't already changed the password and locked you out.
The Internet runs on ads, but when you see them in your browser, your first instinct should be to run the other way—fast. The lion’s share of the Internet is wallpapered with tacky ads that invite you to “Lose 15 lbs. with this 1 weird tip” and load your browser with spyware in the process. In other corners of the Web, you might download a free game or a piece of music from an untrustworthy site, ending up with malicious adware that hitched a ride along with it.
Legitimate sites do a decent job of screening their advertisers, weeding out those that spread viruses, malware, or scams. But even a single instance of malicious adware on your PC can inject bad ads into otherwise innocuous websites. Worse, the adware can change your homepage and redirect your searches and the URLs you try to visit. I’ve deep-cleaned countless PCs, and almost every time I remove viruses and malware from a machine, I find that adware was previously installed.
The Internet runs on ads, but when you see them in your browser, your first instinct should be to run the other way—fast. The lion’s share of the Internet is wallpapered with tacky ads that invite you to “Lose 15 lbs. with this 1 weird tip” and load your browser with spyware in the process. In other corners of the Web, you might download a free game or a piece of music from an untrustworthy site, ending up with malicious adware that hitched a ride along with it.
Legitimate sites do a decent job of screening their advertisers, weeding out those that spread viruses, malware, or scams. But even a single instance of malicious adware on your PC can inject bad ads into otherwise innocuous websites. Worse, the adware can change your homepage and redirect your searches and the URLs you try to visit. I’ve deep-cleaned countless PCs, and almost every time I remove viruses and malware from a machine, I find that adware was previously installed.
They say you can't teach an old dog new tricks. But what about old tricks? As a longtime Windows user, I can tell you that occasionally I get so accustomed to doing things a certain way, I forget that there are faster, easier ways.
With that in mind, I've rounded up three right-click tricks you may have forgotten. Or never learned. Either way, you'll be glad you know them. (Note that these are all for Windows 7/8. They may be available in XP and/or Vista as well--I don't recall--but I no longer have those operating systems on which to double-check.)
1. Right-click the desktop for bigger icons
On today's higher-resolution displays, you may find your desktop icons a little small for your liking. If so, right-click any empty spot on the desktop, mouse over View, and then click either Medium icons or Large icons. Presto! Bigger icons.
On my 13.3-inch laptop, which has a rather high native resolution (1,920 x 1,080), the Medium setting is definitely preferable.
2. Right-click Taskbar icons for recent items and shortcuts
See those icons in your Taskbar? Mine include not only Chrome and Explorer, but also Outlook, Word, and Excel.
When you right-click any of them, Windows gives you a list of time-saving shortcuts: recent documents, most-visited sites, new appointment (in the case of Outlook), and so on. In other words, instead of running an app and then going about your business, this lets you choose your business and launch the app at the same time.
It's a small thing, but it's definitely one of my favorite little Windows tricks.
3. Right-click desktop icons to pin to Start Menu or Taskbar
Speaking of icons, when you right-click any icon that's on your desktop, you'll see two options in the list that appears: Pin to Start and Pin to Taskbar.
These are great for putting your favorite programs iin your preferred launching area. For example, some old-school users still like to start with the Start Menu. Personally, I'm a fan of keeping my most-used apps on the Taskbar. This right-click option makes either one a snap.
My own personal favorite password manager, Password Safe, isn't officially portable. But in practice, it sort of is.
After you install Password Safe onto a computer, you can drag and drop the program folder onto a flash drive and safely remove the drive. Then you can connect it to another Windows PC and launch Password Safe. You'll want to keep your password database file on the flash drive too, of course.
But this doesn't work perfectly. It has two flaws, neither of them serious.
First, when you launch Password Safe from the flash drive and browse to open a password database file, the program will default to your Documents folder. You'll have to navigate drives and folders to get to the file, which will be on the flash drive.
Second, when you close the program, it leaves an icon running in the notification area. You must right-click that icon and exit the program before Windows will allow you to safely remove the flash drive.
You can find unofficial portable versions of Password Safe around the Internet. I've tried a couple, and they both had these same two problems.
Password Safe isn't the only option. The popularKeepass program is available in a portable version, which lacks Password Safe's portable annoyances.
Another option: If you have a smartphone or a tablet, both Password Safe and Keepass are available as Android and iOS apps.
Microsoft may have bungled a few things with Windows 8 (snark reply: "Just a few?!"), but File Explorer isn't one of them.
For one thing, the file manager finally earned a home on the Taskbar (even if you have to switch to the desktop to find it). Even better, Microsoft endowed it with the now-familiar Ribbon interface, making for much easier navigation of your files (and Explorer itself).
However, I think it could be even better with a little tweaking. Here are three simple changes you can make to improve the File Explorer experience:
Windows' built-in solution usually works: Click the Safely Remove Hardware icon in the notification area (aka the system tray or the systray) and select the drive. When you get the "Safe To Remove Hardware" message, it's safe to remove the hardware.
But sometimes, "usually" isn't good enough, and Windows instead tells you that "This device is currently in use."
You’ve probably read at least one story with warnings about using unsecure public Wi-Fi hotspots, so you know that eavesdroppers can capture information traveling over those networks. But nothing gets the point across as effectively as seeing the snooping in action. So I parked myself at my local coffee shop the other day to soak up the airwaves and see what I could see.
My intent wasn't to hack anyone's computer or device—that's illegal—but just to listen. It’s similar to listening in on someone’s CB or walkie-talkie radio conversation. Like CBs and walkie-talkies, Wi-Fi networks operate on public airwaves that anyone nearby can tune into.
As you'll see, it’s relatively easy to capture sensitive communication at the vast majority of public hotspots—locations like cafes, restaurants, airports, hotels, and other public places. You can snag emails, passwords, and unencrypted instant messages, and you can hijack unsecured logins to popular websites. Fortunately, ways exist to protect your online activity while you’re out-and-about with your laptop, tablet, and other Wi-Fi gadgets. I'll touch on those, too.
One of my chief complaints with Windows 8 is that Microsoft forced you to boot to the new Start screen rather than giving you the option of booting to the desktop--which is where I prefer to hang my computing hat.
You could work around this using any number of utilities (most of which were designed primarily to restore the missing Start button, essential if you are working in Desktop), but with the release of Windows 8.1, Microsoft has added the capability.
In other words, now you can boot directly to the desktop. It's not immediately obvious how--Microsoft still doesn't outfit Windows with any "guides to new features" or the like, a silly oversight--but at least it's easy once you know the steps.
1. After booting Windows 8.1 (here's how to get the preview if you don't already have it), click the Desktop tile to enter Desktop mode.
2. Right-click any open area in the taskbar, then click Properties.
3. Click the Navigation tab, then check the box next to Go to the desktop instead of Start when I sign in.
4. Click OK, then reboot. Windows should plunk you right into Desktop.
And that's all there is to it. If you want to go back to Start-screen booting, just repeat the process and uncheck the box in step 3. (Also, if you don't have a Navigation tab, leave a comment letting me know. This appears to be an issue for some users. I'm investigating why.)
You adore your laptop. It lets you get down to business wherever you happen to be—airport lounge, coffee shop, your home office. It’s the key to your competitive edge.
That is, until its battery croaks. Just as you’re putting the final details on your PowerPoint presentation. At the airport. Two hours before takeoff. And with no power outlet in sight. At that instant, you begin to wonder why you ever bought the ever-lovin’ boat anchor in the first place.
But love will bloom anew as soon as you recharge. Avoid the heartache, however temporary: Follow these five tips for maximizing your laptop’s run time.
Recently I spent a full week in a hotel, where I grudgingly paid for Wi-Fi so I could get some work done. Unfortunately, it was a per-device purchase: Only my laptop could get online. If I wanted Internet access on my phone (which had a weak indoor signal) and tablet (Wi-Fi only), I'd have to pay again. And again.
Hey, wait a minute, doesn't Windows let you set up a Wi-Fi hotspot to share its connection with other devices? It did, in Windows 7; it doesn't in Windows 8. Actually, the capability is still there, but enabling it requires some serious command-line tinkering.
Fortunately, I found Virtual Router Plus, a free utility that adds Wi-Fi hotspot capabilities to Windows 8. It works, but with a few important caveats.
First, be really careful during setup. The price of "free" here is that the installer comes packed with junkware. It's easy enough to bypass if you pay attention, but potentially troublesome if you don't.
On the first screen, choose Custom Installation, then uncheck the box below it. When you click Next, a pop-up will appear; click Cancel. Click Next again, then clear yet another checkbox. Now you're good to go with a clean install. Oy.
When you run the program, it'll pop open a help page in your browser, which you may need to verify whether you have the required device drivers. But skip that for now; instead, try using the utility.
To do so, give your network a name (i.e. SSID), then enter a password (to keep freeloaders out). Finally, choose the connection you want to share (which is probably whatever appears as the default). Now click Start Virtual Router Plus.
After a few moments, you should be able to detect your new network from your phone, tablet, or even another PC. But don't worry: your laptop will retain its own Internet connectivity at the same time.
As I noted before, the utility worked as advertised, but it did create one problem: I could no longer connect to the various virtual private networks (VPNs) I use. Your mileage may vary, and if you don't work with VPNs, you're golden. As for me, I unfortunately had no choice but to uninstall the utility to regain access.
Your Windows PC has at least one administrator-level account. If you can't access that account, you've got a problem--you can't install or uninstall programs, or change certain settings.
I'll tell you a way to gain this access, but first, ask yourself if you really should be doing this. If it's unquestionably your computer and you've forgotten your password (or if the previous owner failed to give it to you), you have every right acquire or change the password. But if it's a company computer and the IT department wants to keep full administrator control to itself, this is a good way to get fired. And if it's someone else's computer, it's a good way to get arrested.
You work hard to protect your PC from the malicious thugs of our digital world. You keep your antivirus program up to date. You avoid questionable Web sites. You don’t open suspicious email attachments. You keep Java, Flash, and Adobe Reader up-to-date—or better yet, you learn to live without them.
But against all odds, a clever new Trojan horse slipped through the cracks, and now you’re the unhappy owner of an infected PC. Or perhaps a less-vigilant friend has begged you to clean up a plague-ridden mess.
Obviously, you need to scan the computer and remove the malware. Here’s a methodical approach that you can use to determine what the problem is, how to scan, and what to do afterward to protect the PC from future invasions.
Over the years, many have touted Mozilla’s Firefox as one of the most secure Web browsers. But as with other browsers, the security level offered depends on the settings. Some security features need to be manually enabled. Those turned on by default should still be double-checked.
Follow these five steps to lock down Firefox. Start with the essentials in the browser’s own settings, then choose some useful add-ons. Finally, keep track of your plug-ins so you can patch the inevitable security holes.
Ready for an unconventional upgrade? How about this: You can turn an old, pokey external hard drive into a blazingly fast one with about 10 minutes of your time and $15 of your money.
See, most modern computers have at least one USB 3.0 port. You can plug an older, USB 2.0 drive into one, but you won't get the faster throughput afforded by the newer technology.
Thankfully, you don't need to get a new drive just to enjoy speedier file transfers; you just need a new drive enclosure.
You can buy one for around $15, give or take $5, and from there it's a fairly simply matter to transplant your old drive. Just unscrew the old enclosure, remove whatever screws are holding the drive in place, then separate the drive. Now install it in the new enclosure using the provided instructions (if you even need them; it's a pretty self-explanatory procedure).
There are only a couple important considerations here. First, make sure you choose an enclosure that matches the physical size of your current drive. For example, if it's a number of years old, it might be a 3.5-inch drive (in which case you should check to make sure it has a SATA interface, otherwise you might have trouble finding a USB 3.0 enclosure).
Or you could have a 2.5-inch drive. If so, double-check the height: most are 9.5mm, but there are 7mm and 12.5mm drives out there as well. Be sure to choose an enclosure that can accommodate your size.
Second, decide if a plastic enclosure will do the job or if you should spend a few extra dollars for an aluminum one. If you travel a lot and need a drive that can take a pounding, aluminum might be the better bet.
Newegg is one vendor that offers a wide selection of external drive enclosures. Using the column on the left, you can narrow down the options based on size and other features.
This is a surprisingly easy and effective upgrade that not many people think to try. If you have a USB 2.0 drive and a USB 3.0 port, it's well worth the time and expense. Source
1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing Win-D (that's the Windows key and the letter D).
2. Right-click in any open spot on the desktop, then choose New, Shortcut.
3. We're going to make a Shutdown shortcut, so in the location field, type shutdown /p and then click Next.
4. Choose a different name for the shortcut if you want, or leave it as "shutdown," then clickFinish.
5. Right-click the new shortcut and choose Pin to Start.
Presto! You're done. The next time you return to the Start screen (aka Metro), you should see a Shutdown tile. One click or tap and your machine should immediately shut down.
You can also use this method to create a reboot tile. Just substitute the following text in step 3: shutdown /r /t 0. (That's a zero at the end, and you shouldn't include the period after it.)
Note that using the reboot tile will immediately reboot Windows, with no second-chance warning.
You can't set a clock by your Internet download speed. A great many factors make one page faster than another. And a great many other factors can make the same page fast one day (or hour) and slow the next.
Most of these variables are completely out of your control. But it's still worthwhile to understand them.
First, there's the page itself. Pictures take more time to download than text, and large pictures take more time than small ones.
A well-written page--and I'm talking about code, not text--will take less time to load than a poorly-written one.
And then there's the server. That Web page exists on some computer--a server--somewhere on the Internet. How fast is that server? And how many other pages is it sending out to other people at the same time? Your computer slows down when you're running too many programs. So does a server.