Top 5 ways to track data breaches

Has one of your accounts been hacked? The short answer is probably yes. Here are five ways to be sure.

How to empower your Thunderbird contacts with CardBook

If you're looking for a Thunderbird address book tool that better works with standard formats, as well as the cloud, CardBook might be what you need.

Working from home: 5 hidden downsides no one talks about

More and more Americans are trading a cubicle for a couch, but it does come with some obstacles. Here are the main challenges and how to handle them.

The 10 tech CEOs employees love the most

Glassdoor's 2018 Employees' Choice Awards revealed the best tech CEOs to work for based on employee rating.

Timeline Photos

How are digital transformation efforts going at your company? Take this quick Tech Pro Research survey and tell us: https://tek.io/2I9v3Uk.

The blockchain explained for non-engineers | ZDNet

What is blockchain? Is blockchain tech limited to Bitcoin? What is blockchain's relationship to cryptocurrency? What are blockchain-related jobs? We answer these questions about blockchain and more. (via ZDNet)

20-year-old email bug is used to spoof signatures: Here's how to protect yourself

Email encryption tools GnuPG, Enigmail, GPGTools, and python-gnupg have all been updated to patch the critical vulnerability.

How to use Excel's conditional formatting to compare lists

Whether you're comparing a single list or several, Excel's conditional formatting can get the job done.

How to add more fonts to Google Docs

If you've found Google Docs collection of default fonts seriously lacking, here's how to add over 1,000 fonts to make your documents stand out.

20 Apple keyboard shortcuts business users need to know

Knowing useful keyboard shortcuts can make you more productive and efficient. Here are some of the most useful shortcuts for Apple users.

How to use the Linux iostat command to check on your storage subsystem

To help troubleshoot your Linux datacenter servers, you need the right tools. Jack Wallen introduces you to one such tool, iostat.

How to run VirtualBox virtual machines from the command line

VirtualBox virtual machines can be run without working with the GUI. See how to take advantage of the VBoxManage command to start, pause, and power down your VMs.

How to send text messages from your desktop using Textto

Android users, if you're looking for an incredibly easy way to text from your desktop, Jack Wallen thinks Textto is tough to beat. Here's how to install and use this efficient app.

How to check drive space on Linux from the command line

Is your Linux server running out of storage space? If you're not sure how to find that out, these three commands are important to learn.

How to set up Windows 10 on the Raspberry Pi

A beginner's guide to installing and pushing a simple app to Windows 10 IoT Core running on a Raspberry Pi.

Microsoft Azure is becoming a bigger cloud threat to Amazon, here's why

Microsoft remains second in the cloud race, but a new JP Morgan survey of CIOs gives it cause for optimism.

Create an Excel data table to compare multiple results

Suppose you want to view multiple possibilities within an Excel calculation. The answer is to create a data table.

Five free apps to help remind you to take a break

Working too long without taking a break can have a toll on your mental and physical health.

Six lines your boss should never cross

Is your boss behaving inappropriately? Here are six situations where the answer is yes.

10 most common vulnerabilities in web apps

70% of web apps are vulnerable to critical data leaks.

How to set a schedule for Android 8.1 Night Light

Android Oreo has received some much-needed improvement for its Night Light feature.

How to change the hostname on Ubuntu 18.04

Ubuntu has changed a number of configurations admins have been accustomed to for years. Changing the hostname is one of them.

How to allow users to report suspicious emails with Outlook's Report Message feature

If enabled by the Office 365 admin, Report Message allows users to report suspicious messages to Microsoft for further analysis with a single click of the mouse.

The 5 biggest challenges to digital transformation and how to overcome them

Out of 1,000 business decision makers, 98% agree the delivery of digital services and apps is critical to a successful company, but 95% encountered challenges when trying to do so.

The 5 biggest challenges to digital transformation and how to overcome them

Out of 1,000 business decision makers, 98% agree the delivery of digital services and apps is critical to a successful company, but 95% encountered challenges when trying to do so.

Extreme Networks' new AI-powered edge network solution to accelerate digital transformation

The Smart OmniEdge, is an artificial intelligence-powered network edge solution.

Extreme Networks' new AI-powered edge network solution to accelerate digital transformation

The Smart OmniEdge is an artificial intelligence-powered network edge solution.

How HR managers are handling the talent shortage problem

As talent becomes harder to find and the amount of open positions grows, HR managers are using flexible talent and investing in re-skilling initiatives.

Google AI is very good at predicting when a patient is going to die

Having been trained on 46 billion bits of electronic health data from patients, Google's AI is now showing promise in the field of predicting health outcomes for patients.

Tesla employee sabotage illustrates critical importance of user permissions

Late Sunday night, Tesla CEO Elon Musk warned employees that the company had experienced "quite extensive and damaging sabotage," as noted in an email obtained by CNBC.

Avoid ransomware payments by establishing a solid data backup plan

Paying ransom is not a sustainable situation for any business.

Adobe Project Rush: Create awesome video on your mobile device

Project Rush gives users the ability to share creative assets from Adobe regardless of the device they're working on.

Here's how the Android-x86 project brings Oreo to standard PCs

Despite recent concerns about built-in cryptocurrency miners, there are trustworthy options for running Android on standard computers.

Why blockchain won't transform IoT security

Some in the industry have proposed using blockchain to enhance IoT security, but a panel of experts at the LiveWorx 2018 conference disagreed.

Timeline Photos

Survey: Most professionals don't have experience using blockchain, but many see its potential https://tek.io/2kIHQnk (via ZDNet)

Working from home: 5 hidden downsides no one talks about

With innovations in technology and connectivity, professionals are opting to work from home instead of coming into the office. That can have it's up sides and down sides.

Windows 10 from the Fast Ring: A look at the new features coming out of the Insider program

With Fast Ring builds appearing at roughly weekly intervals, Microsoft is using the current set of previews to trial new user interface concepts and test the next edition of Windows 10 SDKs.

Google's low-code App Maker could make it easier, faster to build custom business apps

Businesses will be able to create apps with less developer expertise and connect them to popular G Suite tools.

How to export saved passwords from Chrome to a CSV file

This process shows you how to export your passwords stored in Chrome into a CSV file, so that you are able to import your account credentials into a password manager. However, there's one big caveat.

How to record your browser window in Google Chrome

Here's how you can use Openvid to record your voice and video as you explore a site with Google Chrome.

How to get better audio with the Windows Sonic For Headphones Spatial Sound format

Hidden within the depths of the Windows 10 Creators Update is an audio enhancement designed to dramatically bring out the spatial sound in games and movies. Here's how to take advantage of it.

How to assign a drive letter in Windows 10

Step-by-step instructions for assigning a specific drive letter to an external drive, SD card, or hard drive partition in Windows 10.

How to install the iOS 12 beta

Apple revealed iOS 12 at the WWDC 2018 keynote. Here's how to install it.

Top 5: Ways to improve your focus at work

The average workday is full of potential distractions. Here are five ways to eliminate them and take back your time and attention.

Top 5 ways to update your management style

If your team has been less productive lately, it might be time to tune up your management techniques. Here are some tips.

Top 5 HTTPS best practices

Browsers and search engines are starting to expect HTTPS connections. Here are some tips for ensuring that your site is compatible, safe and secure.

Beware this Android emulator, it's hijacking your GPU to mine cryptocurrency

Users have accused Andy OS Android Emulator of secretly dropping a cryptocurrency miner on your system that runs endlessly.

Windows 10 black screen problems fixed, as Microsoft patches 50 security flaws

Microsoft rolls out June patches and a host of bug fixes for its latest version of Windows 10.

3 ways to reconcile transactions using Excel 2016

If you work with transaction records, you probably need a way to track what's outstanding and what's been paid. Here are three methods.

hitech-top.com