Latest Software How-To Stories
SEE SOFTWARE STORIES BY CATEGORY
How-To
Age verification laws threaten Pornhub, but a VPN can help
Recent age verification restrictions have made it difficult to access adult content in some U.S. states, except with the right VPN.How-To
Become a PowerPoint pro: 7 must-know tips and tricks
With these tricks and features, you'll learn how to make better PowerPoint presentations in less time.How-To
How to check Microsoft Word documents for plagiarism
Microsoft Word can check how closely a document resembles publications on the web, available in both online and desktop versions.How-To
How to master Excel: From beginner to pro
With these tips, you can become a true Excel magician.How-To
How to protect your website from Open AI's ChatGPT web crawlers
Anyone who runs a website can protect their content from being searched by search engine crawlers and included in their search engine index.How-To
How to check the power, current, and voltage of USB ports
To determine the power, current, and voltage of a USB socket, Windows on-board tools, freeware, and test sticks from $10 can be used.How-To
Getting started with Microsoft 365: Everything you need to know
Microsoft's consumer subscription is a large package with many programs.How-To
8 advanced Microsoft Word tricks you probably missed
Here are several lesser-known Microsoft Word tips and tricks you might have overlooked or never heard about.Tip
How to transcribe audio files in Microsoft Word
Word can automatically transcribe spoken texts. This saves time and effort when typing interviews or spoken files.How-To
The ultimate free digital security guide: Stay safe without spending a dime
Excellent security tools are available to everyone. You don’t have to pay a single cent to protect yourself.How-To
Quishing and vishing: How to protect yourself from new security threats
Quishing and vishing use modern technologies to obtain your data. Find out how you can protect yourself against these fraud methods.Tip
Microsoft says you should always ask this one security question to avoid scams
Online and offline threats (including seasonal scams) are on the rise. But you can ward off the danger with four words—and a little outside help.Tip
How to redact parts of a PDF to remove sensitive information
When you share a PDF document, you might not want all the information it contains to be visible. Here's how to simply redact parts of a PDF.How-To
Passkeys explained: How to embrace a passwordless future today
Passkeys are increasingly replacing traditional passwords. This makes logging on to the internet much more convenient and secure. You can create your first passkey in just one minute.How-To
7 once-popular PC programs that are now outdated (and their successors)
What used to be standard is now a case for the recycling center: Many programs that used to be part of the basic equipment of a PC have now been replaced by faster, nicer and better competitors.How-To
How Linux's insanely customizable desktop works
Anyone who familiarizes themselves more intensively with Linux will, over time, gain an appreciation of the advantages and disadvantages. However, this is the last link in the graphical system.Tip
Outlook: How to set up breaks between your meetings
By default, Outlook assumes that appointments in the calendar follow each other directly if you enter them one after the other. We will show you how Outlook automatically schedules breaks between consecutive appointments.Tip
This free, ancient Windows app will watch over your laptop battery
Do you want to know how much battery your laptop has left? Or how long it will take to charge? This old free Windows utility gives you all the information you need about your laptop battery.How-To
How to digitize VHS tapes the cheap way
A guide to digitizing VHS tapes using a USB capture card and OBS.How-To