How To’s

We Keep you Connected

How To’s

How To

Welcome to How To’s – A blog that provide readers with daily computer tutorials, technology news, software reviews, and personal computing tips.

A collection of Tech Tip features, which answer questions about technology, devices and apps in our lives.


  1. Microsoft just supercharged ChatGPT with Bing’s AI-powered search - Most Popular ChatGPT has proven to be an incredible AI tool capable of assisting with tasks as simple as putting together a to-do list or as complicated as starting up your own business. However, its lack of knowledge about current events has been its one major downside -- until now. At Microsoft Build 2023, Microsoft announced that it is bringing the new Bing to ChatGPT as the default search experience. Also: All the major Bing Chat… Continue Reading
  2. How to use search operators to refine your Bing AI search results - How to use search operators to refine your Bing AI search results Your email has been sent To get the best search results from Bing, users should take advantage of these 10 built-in search operators, which refine your search results, save time and boost productivity. Microsoft has spent a great deal of time and resources developing a new and improved AI-enabled version of Bing. Presumably, the plan is to make Bing more useful and more… Continue Reading
  3. How to use Bitwarden Send (and when you should) - Most Popular 'ZDNET Recommends': What exactly does it mean? ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing. When you click through from our… Continue Reading
  4. Rising to the Clouds: Unleashing the Power of Cloud Computing - Cloud computing is a technology that has revolutionized the way we store, process, and manage data. It allows users to access computing resources over the internet, including servers, storage, applications, and other services, without the need for physical infrastructure or hardware. In this article, we will discuss what cloud computing is, its benefits, and how it works. What is Cloud Computing? Cloud computing is the delivery of on-demand computing services over the internet. In simple… Continue Reading
  5. Hardening Identities With Phish-Resistant MFA - For many years, multifactor authentication (MFA) has been key to mitigating password risk. But as MFA use has increased, cybercriminals have adapted their credential theft tactics. In January 2022, the Office of the Management and Budget (OMB) issued a memo recommending that federal agencies move to passwordless MFA. And while this memo is only directed toward federal agencies, the US government is raising the cybersecurity baseline. It’s up to private-sector organizations to take notice. One… Continue Reading
  6. Patch Management Policy: Steps, Benefits and a Free Template - Patching and updating devices can be a hassle and can cause business disruption. Yet, unpatched vulnerabilities provide attackers with open opportunities to cause great damage – with studies showing unpatched vulnerabilities estimated to account for 30-60% of all breaches! A Patch Management Policy formalizes the fundamental IT requirement that all systems and software should be patched and updated in a timely manner with: This article can help organizations of all sizes start the process with… Continue Reading
  7. I tried using Bing’s AI chatbot’s tones. Here’s what happened. - Most Popular Did your mom ever tell you to "watch your tone" when you had a little too much attitude for her liking? In the same way, you can now tell Bing's AI chatbot to change its tone in its text responses to suit your own liking. On Bing's chat page, select users have access to buttons that let you choose whether you want the responses to exhibit a "precise," "balanced" or "creative" tone, as… Continue Reading
  8. Using zero trust access to stay compliant; solve common MDM issues - Using zero trust access to stay compliant & solve common MDM issues Your email has been sent Explore how zero trust can provide solutions for enterprises and users with the CEO of Kolide. James Maguire, editor-in-chief of eWeek, recently interviewed Jason Meller, chief executive officer of Kolide, a zero-trust access company for organizations that use Okta. In this interview for TechRepublic, they discussed the challenges businesses face with mobile device management as well as possible… Continue Reading
  9. 15 Best Encryption Software & Tools - As attackers continue to evolve their tactics, protecting exposed data with encryption remains a critical security practice. However, the type of encryption tool an organization needs depends upon its sophistication and use cases. While banks and government agencies might be worried about quantum-computing-proof encryption, many small and home offices (SOHO) have yet to shop for their first encryption tool. Fortunately, a huge variety of encryption vendors provide options to satisfy a broad range of needs.… Continue Reading
  10. These crooks have stolen millions of passwords. Here’s how to avoid becoming their next victim - Gangs targeting Amazon, PayPal, Steam and other accounts have stolen over 50 million passwords during the first half of 2022 alone, along with bank account details, cryptocurrency wallet data and other sensitive information from victims. Detailed by cybersecurity researchers at security company Group-IB, the password-stealing campaign is attributed to 34 different Russian-speaking cyber-criminal groups involved in distributing malware-as-a-service schemes. People have fallen victim to the attacks across the world, with the US, Brazil, India, Germany,… Continue Reading