Thursday 6 August 2015

Great the perfect P455WORd

Great the perfect P455WORd

Remembering passwords is hard, but hacking them is easy - unless you create one that's unforgettable and unhackable. Kat Orphanides shows you how

Coming up with umpteen different passwords for your various accounts and devices is| a major challenge. What's more, hackers are using more and more sophisticated methods to crack passwords, and that makes it increasingly difficult to come up with passwords that'll keep them out.

Here, we’ll explain why seemingly good passwords and pass-phrases are putty in hackers’ hands, and then show you the latest clever tricks for quickly creating passwords that no one will crack and you'll never forget.

50 most useful Command Prompt commands. Part 2

50 most useful Command Prompt commands. Part 2

This issue, Jane Hoskyn reveals 10 ways to organise files and folders using your PC's powerful hidden tool

11 Command your Desktop


The Command Prompt’s default location is C:\Users\your name, so any commands you type apply to that directory only. To work in a different directory, you need to move the prompt to that directory.

For example, if you want to use the Command Prompt to organise files and folders on your Desktop, move the prompt to the Desktop by typing cd (‘change directory’), followed by a space, followed by desktop. When you press Enter, the prompt should be at C:\Users\ your name Desktop.

What's (secretly) Killing Your PC?

What's (secretly) Killing Your PC

Hidden processes are making your PC slow, unstable and unsafe. Jane Hoskyn reveals how to fix the 10 worst offenders - and none of them are malware!

What on Earth is your PC up to this time? There you were, happily writing an email and touring Spain in Google Earth, when your computer had another one of its funny turns. Your mouse cursor got stuck, the little spinning circle went haywire, and then the screen turned blue. Or maybe everything just ground to a halt again.

Adobe Photoshop CC (2015)

Adobe Photoshop CC

The world's best image-editing program

Photoshop isn’t just a PC program, it’s a verb. Nobody ever looks at a celebrity on a magazine cover and thinks, ‘Hmm, I bet she’s been Corel PaintShop Pro’d’. In short, there’s no disputing that Adobe’s photo editor (currently celebrating its 25th year) is the first choice. The question is whether it’s the right one for you.

Google Chromebook Pixel (2015)

Google Chromebook Pixel (2015)

The best a Chromebook can get

Remember netbooks? Tlrey were the simpler alternative to laptops, with just enough processing power for web browsing and other basic tasks. There were just two problems: netbooks were too rubbish for anyone to want them, and too cheap to make manufacturers any money. So they went away. But not completely.

Terrible Things Of The Digital Age

Terrible Things Of The Digital Age

Sometimes even we long for a simpler time

1 Trolling


Before we had the internet, if you wanted to casually insult someone, you had to do it in person or over the phone. Nowadays, of course, you just head onto an internet forum or social network and abuse people as much as you like - all without the burden of being identifiable. Predictably, this anonymity brings out the worst in many people and has led to the phenomenon known as trolling, which before the internet came along, would just have been known as being a really, really terrible human being.

Virus Alert: What to Do?

Virus Alert: What to Do?

Is your computer warning you about a virus, while your browser sounds the alarm about a hacked certificate? We’ll show you how to respond to such notifications

All of a sudden, a warning window pops up with a cryptic message: ‘‘Object c:\3df34wf4.pdf is infected with the Trojan.Win.32.Invader Trojan programme.” Right below the message are three options: Quarantine, delete and skip. Even experienced computer users don’t always know how to proceed in such a situation. Popular anti-virus programmes make it easy for themselves, and shove the responsibility onto the user. Those who hastily press the wrong button could catch a virus, or even end up permanently deleting a harmless but important file from the hard drive.

Google’s Modular Smartphone

Ara

Anyone can create and customise the Ara according to their tastes using selected modules. Will this idea revolutionise the smartphone market?

When Google sold the mobile phone manufacturer Motorola to Lenovo at the start of 2014 and made a loss of 10 billion US dollars as a result, it became the butt of many caustic comments in the industry. However in the bargain, the IT giant retained not only thousands of patents but also Motorola’s research centre “Advanced Technology and Projects” (ATAP). This department has been working on an idea for a long time – an idea that can rightly be described as revolutionary, namely, a modular smartphone, code name “Project Ara”. If Google’s plan works, its loss of billions could soon turn into a huge advantage and give Google’s competitors – from Apple to Samsung – a terrible headache.

Coding with empathy

Coding with empathy

Amanda Glosson explores what we can gain by putting ourselves in someone else’s shoes

Empathy is defined as the ability to understand and share the feelings of another. If I were to relate a story to you and ask you to empathise with me, I might say something like, ‘Imagine yourself in my shoes’. But if you were to follow these instructions, you would only be part of the way there. Empathy isn’t imagining yourself in my situation. Empathy is imagining what it’s like for me to be in my situation.