One of the reasons a Windows user won’t use a Linux distribution is that he can not use Photoshop on this OS. But what this user does not know is that there are alternatives to this graphics editor, or even if they know it, they can not stand up to the standard of Adobe’s product. The JPEG format is for unprofitable photos, they are comported and ready for printing. JPEG also offers...
What is Apache Open Office
OpenOffice.org is a free open source software suite. After in April 2010 Oracle bought Sun Microsystems and is also in possession of OpenOffice.org, on June 1, 2011, Oracle officially announced its decision to donate the OpenOffice.org project to the Apache Software Foundation. In September 2010, some of the former developers of OpenOffice.org created the LibreOffice project that practically...
What is LibreOffice
LibreOffice is a free, platform-independent office suite that is compatible with the files from other major office suites. The purpose of the project is to create a provider-independent office suite that has ODF default file format and is free from any copyright responsibility. On behalf of the project, the words Libre (“free”) and Office refer to a suite of free office programs. As a...
How does User Account Control (UAC) work
In Windows, applications run by default without administrator permissions. They have the same rights as a standard user account: they can not make changes in the operating system, in system files, and in system registry keys. They can also not change anything that is related to other user accounts. Applications can only change their own files and registry keys or the settings and registers of the...
How do I access User Account Control (UAC) settings
User Account Control is a security feature of the Windows operating systems introduced in Windows Vista. Those who have ever used a Linux operating system know that they require an administrator’s approval before installing the programs and making changes to the system settings. Well, the same thing is making the User Account Control in Windows and therefore, for security reasons, I...
The location of the wallpapers used in Windows 10 (desktop and lock screen)
Windows 10 comes with beautiful pictures for the desktop background and lock screen. We especially like the background image used for Windows 10 May 2019 Update. If you want to find the location of these images on disk, you can use them as wallpapers on other PCs and devices, you just have to read this article. Where do we see the background images used by Windows 10 Windows 10 uses a set of...
Enable or disable the dark mode in Mail and Calendar apps in Windows 10
Mail and Calendar applications which are preinstalled in Windows 10 have been updated with a new functionality: the dark mode. The dark theme has been available in Windows 10 for some time already, but Mail and Calendar have only partially implemented it. It now applies to all displayed items and allows you to set it independently from the rest of the operating system and other apps you use...
What is the difference between Windows UAC levels
When you start a desktop application that needs administrative permissions, you’ll see a prompt called User Account Control (UAC) asking you: “Do you allow this app to make changes to your PC?”. This prompt also appears when you want to change a system setting that requires administrative permissions. User Account Control (UAC) is a Windows security feature that exists since...
How to install May 2019 Update with the Windows 10 Update Assistant
On May 21, 2019, Microsoft began distributing the May 2019 Update for Windows 10 through Windows Update. This update is also known as Windows 10 version 1903 or 19H1. It is not received by all computers at the same time. If you do not have the patience until Microsoft will distribute your update, you can use the Windows 10 Update Assistant. Here’s how to install May 2019 Update on all your...
Users and groups of users in Linux and how to calculate the permissions
Everything in a Linux system happens in a very strict way. Nothing is accidental. Let’s have a look at the tables below: The following table shows us the codes for granting access rights to a file: Each user of a Linux system has a name (for example: mvps); this user is associated with certain groups; to see the groups in which a particular user is located, there will be run the following...