Stumped by the video-game jargon your friends, family and co-workers toss around? Here's our glossary of gaming terms.
This article was originally published at The Conversation. The publication contributed the article to Tom's Guide's Expert Voices: Op-Ed & Insights.Coldplay has barred music streaming service Spotify from adding their latest album Ghost Stories to i
With Oculus Rift and other systems transforming gaming, how are people evolving their experiences with the new technologies?
In April, Microsoft will stop supporting Windows XP. If you're still running it, here's how to migrate to a better, safer operating system.
We hear a lot about viruses and Trojans, but not much about worms. What exactly is a computer worm, what does it do and how can you protect yourself from one?
Drive-by downloads are one of the most effective and sneaky ways of spreading malware, yet few people know they even exist. Here's an explanation of what they are, and how you can protect yourself against them.
Trojan horses are among the most prevalent forms of malware, yet there's often little explanation of how they differ from computer viruses and worms.
Ever received an email that took you to a website that asked for a lot of personal information? You may have encountered a phishing scam.
We've heard a lot about spyware, but what exactly is it and how does it differ from other kinds of malware?
Now that 3D printing is hitting its stride, mainstream technology companies are thinking about entering the 3D-printing marketplace.
This article was originally published at The Conversation. The publication contributed the article to Tom's Guide's Expert Voices: Op-Ed & Insights. The massive Consumer Electronics Show (CES), hosted annually in Las Vegas, showcases the latest disc
When hackers bring down a website, they're not really damaging it; they're just blocking your access to it. Here's how distributed denial-of-service attacks work, and what website operators can do to avoid being knocked offline.
We often hear about 'botnets' formed by countless 'zombie' computers herded together by http://admin.bestofmedia.com/contentmgr3/cybercriminals. But what exactly is a botnet, and what danger does it pose to the average computer user?
Security experts constantly tell computer users to protect themselves against viruses. But what exactly is a computer virus, and is it the same thing as a computer worm or Trojan horse?
Use these shortcuts for some of the more complicated functions in Microsoft Excel and be more productive in the use of the spreadsheet program.
News reports often mention the 'personally identifiable information' that's lost in a data breach or cyberattack. What exactly makes up such information, and how can it be used against you?
Aspiring to be the next Henri Cartier-Bresson or Bill Cunningham street photographer? Fashion photographer Marcy Swingle offers her pro tips.
Use these shortcuts to better navigate Microsoft Excel and be more productive in the use of the spreadsheet program.
LG's 105UB9 is the world's largest Ultra HD TV with a curved screen, with an ultra-wide 21:9 aspect ratio to match.
The anthology horror series starring Jessica Lange and Evan Peters has grown a cult following. Here's where you can find it online.
A Web bot is an automated software program used to perform relatively simple and repetitive online tasks that would otherwise be too difficult or mundane for a human to continuously perform.
A court ruling may soon end 20 years of 'net neutrality.' Here's how that would change the Internet as we know it.