A new generation of services allows you to share and synchronize folders via the Internet.
Many sync services also offer online backup, remote file management, and access to your synched files from any browser, even when the remote machine on which they’re stored is turned off.
For a piece of software to get onto my personal PCs, it must win a fierce Darwinian battle with the hundreds of other freeware programs I review each year.
Of all the software I looked at in the last year, only two utilities won the fight for survival, impressing me so much I installed them on all my office computers.
Every day, people ask me whether they should order their new PCs with Windows XP or Vista, while others wonder whether they should hold off for Windows 7.
And there are those who are already running Vista and want to know what they can do to overcome its problems.
You may not need a disk-hogging image-editing app to repair your less-than-perfect photos.
If you’re willing to trade a little performance and a lot of features for the convenience of free Web services, you can retouch photos right in your browser.
What will be the major security risks in 2009? More importantly, what can you do to protect your PC against these risks?
Be forewarned: the answers are not quite what you expect.
If you’d like to know how it feels to be ignored by malware authors, add Ubuntu to your existing Windows installation.
A free utility makes creating a dual-boot Windows/Ubuntu machine fast, simple, and safe.
If you share a PC with someone at home or work, you have pretty good reasons for wanting to keep your Internet activities private.
Yes, it’s easy to cloak your surfing history from casual eavesdroppers, but hiding your browser tracks from determined, technically skilled users is actually quite challenging.
Using a Wi-Fi network in a coffee shop, airport, or hotel is such a serious security risk that I simply never do it without taking additional measures to protect my data and my PC.
These three techniques will keep you safe while using a public network, often without costing you anything but a small bit of time.
You can do your best to keep your children safe by using one of two top Internet access–control utilities.
My top choices for little kids and teens cover all the bases: protocol-level filtering, usage time limits, monitoring tools, and remote management.
When I last discussed backup, in my Sept. 18
I noted that backing up your PC appears to be a simple process on the surface, but in practice it’s often complex.
Well, folks, with the release of Acronis True Image Home 2009, backups just got a little simpler, though they’re still no walk in the park.