HOME

Monday, October 28, 2013

How to build a killer Windows 8.1 gaming PC for under $1000

Finally: Windows 8.1 is a major update that brings many improvements and new features to Windows 8. In addition to a bevy of new apps and meaningful interface changes such as a resurrected Start button and a new boot-to-desktop option, Windows 8.1 will also be the only desktop OS to support DirectX 11.2. Couple that with the streamlined characteristics of the OS, and many people—game enthusiasts in particular—may now be interested inmaking the switch to the cutting edge of Windows.
Going all-out on a top-of-the-line gaming rig is probably a rash idea at this point, since the next generation of consoles is about to kick off a frenzy of game development that will push the boundaries of gaming hardware. Instead, we set out to build a totally new gaming rig running Windows 8.1 for a cool grand—a solid system that would please all but the most demanding PC gamers.

Friday, October 25, 2013

Protect your Facebook account from hackers with two-factor authentication

Nobody likes it when their friends suddenly start spewing links to weight-loss supplements and porn on Facebook. Don't be that person. Using Facebook's two-factor authentication feature can help keep undesireables out of your account—perhaps saving some friendships.
Two-factor authentication, for the uninitiated, requires you to enter in another piece of private data in addition to your password in order to log in. This typically takes the form of a single-use security code that gets sent to your smartphone, and it can help keep your account safe in case a hacker or data thief ever gets ahold of your username and password.
Setting up Facebook's Login Approval feature takes just a couple minutes.
To start, visit Facebook.com and log in with your username and password. Next click the gear icon in the upper right corner, and select Account Settingsfrom the menu that pops up. On the next screen, select Security from the list on the left, then select Login Approvals. When the Login Approvals section expands, check the box labelled Require a security code to access my account from unknown browsers, and Facebook will walk you through the setup process.
By default, Facebook will send security codes through its mobile app, but it can send you text messages as a backup login method. If you don't already have a cellphone number associated with your account, Facebook will ask you to add one. When prompted, select your country from the list, enter your number, then press Continue. Facebook will send you a text message to confirm that your number is indeed yours: Enter the six-digit confirmation code texted to you when prompted, then click Confirm.

Logging in

Facebook will not pester you to enter a security code from a browser it already recognizes, so if you only use Facebook from one computer, you may never be asked to senter a security code. But if you are, here's what to expect:
After you enter your username and password, you'll be asked to enter a security code.
The next time you log into Facebook on a new computer, enter your username and password as usual, then press Log In. On the next screen, Facebook will ask you to enter a security code.
The Code Generator in Facebook's mobile app.
To get that code, open the Facebook app on your phone, tap More (in the toolbar on iOS, swipe left to right to access the More menu on Android), then scroll down and tap Code Generator. Facebook will give you a single-use code that's good for 30 seconds (after 30 seconds, you'll be get a new code). Enter this in on your computer, then press Continue.

Limitations

Facebook's two-factor authentication feature won't protect everything, though. It only asks for a security code if you attempt to log in from an unrecognized device, and it only works for login requests from Web browsers—you can log into the Facebook mobile app without having to enter a code. Still, it's better than nothing.

Tuesday, October 22, 2013

How to bring back Libraries in Windows 8.1

You remember Libraries: It was one of the most highly touted (and useful) additions to Windows 7, a way to find and sort files without having to navigate across a zillion far-flung folders.
Unsurprisingly, the feature carried over to Windows 8. Surprisingly, it vanished in Windows 8.1. The only explanation I can conceive is that... actually, no, I can't conceive of any explanation. Did Libraries generate too many tech-support calls? Did research show that not many people used it?

Friday, October 18, 2013

The mysterious ~$ files nothing to worry about

If you don't know what's going on, these files can be confusing--and even scary. A file appears in your Documents folder without you intentionally creating it. Aside from the strange punctuation, the file name looks familiar. The icon and, if visible, the extension tell you that you can open the file in a common application. But when you double-click the file, or try to delete it, you get an error message.
Then the file disappears as inexplicitly as it appears. Except for those occasions when it doesn't disappear at all.

Tuesday, October 15, 2013

How to open a file with a strange extension

Red Eye Rose received a file with a strange extension. She doesn't know into what program she should load it. Neither does Windows.
I doubt that anyone knows all of the file extensions used since the pre-DOS days of CP/M. Some of them may not even describe a file type. Before Windows started using them to associate files with an application, people used extensions for all sorts of things.
But that was a long time ago. Chances are that the extension on your mystery file does indeed identify a program. But how do you find what program?

Friday, October 11, 2013

How to set up two-factor authentication in Evernote

It seems like every day you read about another password security breach. It doesn't matter how robust your actual password is; if a hacker makes off with an entire password database, he can potentially access your account.
That's why an increasing number of sites and services are turning to two-factor authentication (also known as two-step verification), which adds a second level of security to individual accounts.
Evernote started offering this option a couple months ago, but only for users with a Premium subscription. Now, however, Evernote offers two-factor authentication for all account holders. Here's how to set it up:
1. Sign into your Evernote account in your Web browser.
2. Click your account name in the upper-right corner, then choose Account Settings.
3. Click Security in the toolbar at left. You'll see a Two-Step Verification option; click Enable. Note the message about updating your mobile apps (if you use any), which is required to take advantage of the feature.
4. Follow the prompts. You'll first need to field a confirmation email, which will include a verification code you'll enter back on the site. (You can also click an embedded confirmation button that'll open another instance of Evernote in a new tab. Either way is fine.)
5. Enter your mobile phone number and click Continue. In a few seconds you should receive another verification code, which you'll need to type into corresponding box on the site.
6. Now for the tricky part. Freebie accounts aren't entitled to verification via text message (aside from that initial one), so you'll need to install and use the free Google Authenticator app, which is available for Android, BlackBerry, and iOS. Once it's installed, click Continue with for whichever mobile OS you use.
7. Evernote will display (in your browser) a QR code you can scan with the Google Authenticator app. Scan it, then enter the numeric code generated within the app. (Whew! I know, a lot of steps, right?)
8. Finally, you should see a list of single-use backup codes you can use in the event you're unable to complete two-step verification. Make sure to write these down or print a copy, as you'll need to type/paste one in on the next screen!











By now you're probably thinking, "Hey, Rick, I came here for fewer hassles, not more," I feel you. This initial setup is a pain. And if you don't have a Premium account, all future two-step authentications you do (like on a new PC or mobile device) are a bit of a pain.
However, they're a one-time pain, and they vastly improve your Evernote security. So suck it up and get it done.

Tuesday, October 8, 2013

Actually, you do need to share your passwords

No one stays healthy forever. At some point, your loved ones will need access to all of your accounts. You can make that job easier for them.
No reader questions today. Instead, I'm answering a question that someone should ask: In our password-protected digital world, how do you prepare for that inevitable day when you die or otherwise become incapacitated?
This is no small problem. When you're gone, or have otherwise lost the ability to remember or communicate, loved ones will need access to your email, contacts, bank accounts, and more. Without your pre-planned help, this can be quite a challenge.
If you don't believe me, check out Google's page for Accessing a deceased person's mail. You have to gather up and snail-mail several items, including the death certificate (each official copy of which comes with a price). Part 2 of the process "will require you to get additional legal documents, including an order from a U.S. court and/or additional materials."
It would be a lot easier if someone you trust had your Google password--and other important passwords, as well.

Thursday, October 3, 2013

How to avoid common PC building mistakes

Few things in life are as satisfying as building your own PC. Cobbling together a softly purring, fully functional computer out of disparate parts offers a true sense of creation. Even better, rolling your own results in a cheaper and more personally tailored PC than what you can find at big-box stores.
Building a PC sounds daunting, but it’s actually pretty straightforward. Still, a few key details can trip up even seasoned geeks who are not being mindful. This handy-dandy guide can help you avoid the most common PC building mistakes—and their associated frustrations.

Before you buy

Pay attention while you’re buying your components, or your DIY PC could wind up borked before you even begin.


The start of something beautiful.

Not all PC parts are compatible with one another. The most obvious example is the relationship between processors and motherboards. For instance, Intel’s second- and third-generation Sandy Bridge and Ivy Bridge chips need a motherboard compatible with the LGA 1155 socket, while the fourth-gen Haswell chips use LGA 1150 and the enthusiast-focused Extreme Edition processors require pricey socket 2011 motherboards.

Tuesday, October 1, 2013

Defective RAM can cause all sorts of problems. If you're suffering from frequent crashes, freezes, reboots, or Blue Screens of Death, a bad RAM chip could be the cause of your travails. If these annoyances tend to happen when you're using a memory-intensive application or game, bad RAM is a very likely culprit.
But that doesn't mean it's a sure one. You still need to make sure that the problem is with your RAM, and if it is, you need to identify the bad module.
The best diagnostic tool I know for the job is the free, bootable MemTest86. Since it's bootable, you need to put it onto removable media. You can download separate versions for installing the program onto a CD or on a USB flash drive.
The CD version comes as an .iso file. The USB version comes with a program that prepares a flash drive, so that it can boot your PC and automatically run MemTest86. If you're not familiar with booting from an optical disc or a flash drive, see Boot discs explained: An overview of booting your PC from something other than your hard drive