Connect with us


How to get the most out of your Windows 10 PC



How to get the most out of your Windows 10 PC

Take advantage of all the functionality that Windows 10 offers and those hidden tools that you may not know but that will make you more efficient and productive in your day to day with your PC and Windows.

Windows 10 is the most popular desktop operating system on the planet with the software now installed on more than 1 billion devices around the world in different languages ​​and languages.

However, despite the fact that its interface has evolved over the years to become more graphical, there are features that do not always turn out to be so obvious even to the most enthusiastic of technology.

With so many people relying on Windows 10 to stay productive in their day-to-day lives, we thought it might come in handy to learn some additional tricks that allow us to get more out of its features.

Here are ten ways to get more out of your Windows 10 PC:

Task view

The Task View acts as a multitasking hub in Windows 10, offering the ability to manage all the windows that are open in the background, as well as launch virtual desktops.

There is a dedicated button on the taskbar by default, although you can also activate it with the keyboard shortcut ‘Windows + Tab’.

You can read more information in our detailed guide on how to use Task View or Task View in Windows 10.


The feature within the Task View is Timeline or Timeline, which acts as a complete history of all the windows you have opened on your device, with the ability to quickly resume a project from weeks ago.

This may not be enabled by default when you start Task View, but you will be prompted to enable it. If not, go to ‘Settings> Privacy> Activity history’ and make sure that “Allow Windows to collect my activities from PC” is activated.

Following a Windows 10 2019 update, Google Chrome history can also be synced. Just make sure you download the corresponding ‘Web Activities’ extension from Microsoft and log in.

Clipboard history

You may have ever seen a message saying that something has been saved to your Windows 10 clipboard, but where does it all go?

While pressing ‘CTRL + V’ will only paste the most recent you have copied, the clipboard history will show the last 25 items, both in text and images. It is available via the ‘Windows + V’ key shortcut.

You can also enable a clipboard in the cloud, where items you paste on one device can be available on another, as long as they are both signed in to the same Microsoft account.

Just go to ‘Start> Settings> System> Clipboard’ and make sure both “Clipboard History” and “Synchronization between devices” are both enabled.

Storage sensor

Windows 10 can free up space on your hard drive automatically through a feature called Storage Sense.

It works in a way that removes files that you don’t use but is usually found on your devices, such as the Recycle Bin and the Downloads folder. Your PC no longer needs these temporary files, so you can delete them automatically.

To activate the function, go to ‘Settings> System> Storage’ and make sure that Storage Sense is activated. From here, you have options to choose how often it runs, as well as allowing what is already in the cloud to be deleted.

Dynamic lock

As with many modern devices, Windows 10 can be configured to automatically lock itself when a trusted device is out of reach.

It’s a feature known as a dynamic lock, and you’ll need the Bluetooth connectivity of both devices to be turned on.

First, you will need to pair your phone and Windows 10 PC. Go to ‘Devices and Printers’ and click on ‘Add a device’. A quick search should find your phone, so just click to pair the two.

Then, you will need to activate the dynamic lock on both. Go to ‘Settings> Accounts> Sign-in options’ and click on the box that says ‘Allow Windows to detect when you are away and automatically lock the device’.

AirDrop for Windows

AirDrop is a very popular way to share files and other documents between Apple devices. There is an equivalent feature in Windows 10, although of course the information can only be shared between Windows computers.

It’s known as ‘Proximity Sharing’ and can be easily enabled in Windows 10 settings. Just go to ‘Start> Settings> System> Sharing experiences’ and make sure the ‘Sharing between devices’ option is turned on.

You can choose between any nearby Windows 10 PCs here, or just those linked to your Microsoft account, although both devices will need to have Bluetooth turned on for it to work.

It works mainly in File Explorer and Microsoft’s Edge browser, where it is an option within the Share tab/button. The device receiving the information will receive a “Received from …” notification.

Windows Reliability Monitor

Windows ‘Reliability Monitor’ can help you keep everything under control. Just type ‘Reliability’ in the search bar on the taskbar and select the option that says ‘View Reliability History’.

This will give you an overview of your device’s stability history, with any X or! S indicating an area that needs attention.

Advanced user settings

You may not know that for years there has been a dedicated menu for advanced users, which is still incredibly useful.

Simply right-click the Start menu (Windows icon at the bottom left of the screen) to display many additional options. Some options like ‘Event viewer’, ‘Task Manager’, ‘Powershell’, can improve the performance of your PC.

God mode?

There is another trick that gives you the ability to have more extensive control of your Windows 10 PC, hence the inherited name ‘God Mode’.

To activate it, you must create a new folder on your desktop and rename it to the following: God Mode. {ED7BA470-8E54-465E-825C-99712043E01C}

You can replace the ‘God Mode’ name if you prefer, but just make sure it’s before the first parenthesis. Press Enter and the icon will automatically change to the ‘Control Panel’. By double-clicking, you will go to a menu full of customization options.


How to show IDM on YouTube in Chrome



How to Show IDM on YouTube in Chrome

This is how to bring up IDM or Internet Download Manager on YouTube in the Google Chrome browser, follow every step, OK!

Surely you often experience it, when you want to download videos on YouTube but the IDM software doesn’t appear on Google Chrome.

Even though I have installed IDM correctly, but it still doesn’t appear, what’s the matter? If you have installed it correctly, there is one more thing that you must install on Chrome Guys.

Curious, what should you install? Let’s just see how to bring up IDM in Chrome, check this out!


  • Make sure you have IDM installed on your PC or laptop, guys.
  • Then open the Chrome browser
  • On the main Chrome page, you select Web Store.
How to Show IDM on YouTube in Chrome
  • When you enter the main page of the Web Store, you can immediately search for the IDM Integration Module in the search field.
  • If you have found it, you click the Add to Chrome button.
  • Wait until the download process is complete.
How to Show IDM on YouTube in Chrome
  • Later a dialog box will appear asking for approval and just select Add extension.
  • Close and reopen your Chrome browser.

Now go to YouTube and see IDM will appear when opening the video.
Also read: How to Delete Windows Applications, Guaranteed to Clean!

So that’s it, how to bring up IDM on YouTube in the Chrome browser. How easy is it? Now just pop up your IDM and download all the videos on YouTube!

Continue Reading


How to Prevent Pegasus Spyware Attacks on Personal Cellphones, Must Try



How to Prevent Pegasus Spyware Attacks on Personal Cellphones, Must Try

In the last few days, the internet world is being enlivened with the emergence of spyware Pegasus latest version.

Reportedly, spyware Pegasus is used by the governments of various countries to spy on the cellphones of a number of parties.

A number of names are said to have been targeted, from French President Emmanuel Macron, Telegram CEO Pavel Duvrov, to PSG football club owner Nasser Al-Khelaifi on the list.

They immediately took several actions to avoid being attacked by spyware Pegasus.

Currently, the main targets are important figures.

However, it is possible that Pegasus spyware also attacks ordinary people.

For that, we want to share how to prevent Pegasus spyware attacks on personal cellphones.

Want to know what it’s like? Continue to the next page!

Pegasus spyware can attack via messaging applications such as WhatsApp and iMessage.

If the device has been attacked, then the access on it can be said to have been taken over.

With Pegasus spyware, someone can remotely read incoming messages, emails, photos in the gallery, tap phones, track locations, and record voices.

The way to prevent Pegasus spyware attacks on personal cellphones can be said to be “hard and easy”.

University of Surrey cybersecurity professor Alan Woodward said in theory the Pegasus spyware could be removed from the device.

However, it is difficult to know whether a cellphone has been attacked by the pegasus spyware or not.

For this reason, he suggested that users routinely restart their cellphones.

In addition, users can also install anti-malware software to strengthen security.

“If you are someone who is at risk, you should install some anti-malware software on your phone,” he said as quoted by

Furthermore, another way to prevent Pegasus spyware attacks is with the help of security applications.

This application can consist of a password manager or authenticator. Morning Context co-author Advait Palepu has shared his recommendations.

Through his Twitter account @advait_px, he created a thread containing recommendations for software and applications that can be used to prevent Pegasus spyware attacks.

Some popular software names such as Bitwarden and Google Authenticator are included in the list.

In addition, there are other ways that can also be done to avoid Pegasus spyware attacks.

Launching The Washington Post, users must be diligent in updating software.

Because with software updates, automatically the security system used is also updated and stronger.

To make it easier, users can set after the device to automatic update to make it more practical.

However, the automatic update can be set specifically if the device is connected to WiFi only.

The reason is, to update the software takes a lot of quotas and a strong signal.

Then users who are still using cellphones that are more than 5 years old are also highly recommended to replace them.

Especially if the cellphone has not received the latest operating system update from the developer.

Well, those are some ways that can be done to prevent attacks spyware Pegasus.

Continue Reading


6 Tips for Keeping Twitter Accounts Safe So You Can Avoid Hackers



6 Tips for Keeping Twitter Accounts Safe So You Can Avoid Hackers

Twitter has many users, some of whom expect to avoid hackers who aim to account for bad things.

For users who want to avoid hackers can follow 6 tips to keep a safe Twitter account.

Of course, the tips for maintaining this account are done directly in the application Twitter, or his website version.

Twitter has become a fun place to find inspiration from diverse content, participate in conversations to find useful new hobbies.

Not infrequently from this platform we often find interesting things that become trending.

The experience of using Twitter will be more comfortable if everyone stays alert and takes steps to improve security.

In an effort related to security and privacy, Twitter said it always reminds people to be responsible for managing their respective Twitter accounts.

These 6 tips to keep your Twitter account safe were also given directly by the company, let’s take a look at the next page!

1. Use a unique password

Make sure you create a strong Twitter account password using a minimum of 10 characters with a combination of uppercase, lowercase, numbers, and symbols.

Try to use a different password for each website you visit.

Consider using password management software that can keep all of your login information safe.

In addition, you can go to the Password reset protection menu located in the Twitter account settings.

2. Use the two-factor authentication method

Actually, we have heard this second method quite often on various platforms including Twitter.

However, for those of you who have just discovered these tips, see how and their benefits on the next page.

Two-factor authentication (2FA) is an extra layer for your Twitter account to be secure.

In addition, to ensure that only you can access your own Twitter account.

That way only people who have access to your password and mobile number (or security key) can log in.

Starting in late June 2021, Twitter users have the option to use a security key as the only form of two-factor authentication (2FA), which is the most effective way to keep Twitter accounts secure.

3. Make sure you are logged in via the official Twitter site

Phishing will always lurk for personal information if people visit fake sites.

A Phishing web interface similar to the Twitter log-in page is very vulnerable to deceive users.

So Twitter provides tips to double-check the links you open, both from email and Direct Messages before providing your personal data including passwords.

Furthermore, to be even more secure, you can do something that you can see on the next page.

That is, those of you who are affected by phishing can change your password as soon as possible and read the guide at this link.

4. Be wary of those who act in the name of Twitter

These tips are given because there are parties who are not responsible on behalf of Twitter.

So you need to always be vigilant if there are parties claiming to be Twitter representatives who contact and ask for personal data.

Twitter says it never asks users for passwords via email, Direct Messages, or replies.

That way users are expected not to open attachments or links if they receive a message to install any software, as it’s not from Twitter.

5. Be alert for suspicious login alerts

Twitter will usually send notifications via email or push notifications if it detects suspicious activity or when you log into your Twitter account from a new device for the first time. You can check the benefits of this notification on the next page.

Incoming alert notifications usually include a location that is an approximate IP address used to access Twitter.

Through this notification, you can verify whether the person who actually entered through the device is you or not.

Otherwise, we recommend following the steps listed in the notification to secure your account, starting with changing your password.

6. Check existing links on Twitter (especially if they are shortened with

As a place for conversation to occur, people on Twitter share a lot of interesting information, and many share links to other sites, either through Tweets or Direct Messages.

If you see a link using a URL shortener, such as or TinyURL, be sure to check the direction of the link before opening it.

Or you can use a free plug-in from Chrome or Firefox to show an extended URL without having to click it first.

Of 6 tips to keep a safe Twitter account, which do you think is very important?

Continue Reading


How to find a TikTok user - Sync friends from social networks How to find a TikTok user - Sync friends from social networks
TikTok5 hours ago

How to find a TikTok user – Sync friends from social networks

SHARE How to find a TikTok user:- Since its launch, TikTok has gained a lot of popularity among various groups...

How to Lock a Document in Microsoft Word How to Lock a Document in Microsoft Word
MS Word1 day ago

How to Lock a Document in Microsoft Word

SHARE In this lesson, we will learn how to lock a document in Microsoft Word with a password. Well, for...

How to Edit PDF to Word Using Microsoft Word How to Edit PDF to Word Using Microsoft Word
MS Word1 day ago

How to Edit PDF to Word Using Microsoft Word

SHARE The easiest way to edit PDF files is with Microsoft Word, usually, this is needed to tidy up the...

How to Give Password in Excel Document How to Give Password in Excel Document
MS Excel1 day ago

How to Give Password in Excel Document

SHARE Giving a password to an Excel document is really something you need to do, especially if the document you...

How to Generate Random Numbers in Microsoft Excel How to Generate Random Numbers in Microsoft Excel
MS Excel1 day ago

How to Generate Random Numbers in Microsoft Excel

SHARE How to make random numbers or random will be easiest when you use Microsoft Excel. Make no mistake, there...

How to Save a Small Document in Microsoft Word How to Save a Small Document in Microsoft Word
MS Word2 days ago

How to Save a Small Document in Microsoft Word

SHARE Discusses how to save small documents in Microsoft Word, which some people may need. This is possible for Microsoft...

How to Print Documents of Certain Pages in Microsoft Word How to Print Documents of Certain Pages in Microsoft Word
MS Word2 days ago

How to Print Documents of Certain Pages in Microsoft Word

SHARE This time we will discuss how to print certain page documents in Microsoft Word. Printing one page may already...

How to Randomize Names in Microsoft Excel How to Randomize Names in Microsoft Excel
MS Excel2 days ago

How to Randomize Names in Microsoft Excel

SHARE If We have previously discussed how to generate random numbers, this time we will share how to randomize names...

How to Cross Out Specific Data in Microsoft Excel How to Cross Out Specific Data in Microsoft Excel
MS Excel2 days ago

How to Cross Out Specific Data in Microsoft Excel

SHARE Microsoft Excel also provides a feature that allows you to cross out or give a line based on certain...

How to Quickly Change Case in Microsoft Word How to Quickly Change Case in Microsoft Word
MS Word3 days ago

How to Quickly Change Case in Microsoft Word

SHARE You can quickly change the case of letters in Microsoft Word with the following keyboard combinations or shortcuts, let’s...




Copy link
Powered by Social Snap