<?xml version="1.0" encoding="UTF-8"?><rss version="0.92">
<channel>
	<title>Contributor</title>
	<link>https://www.pcworld.com</link>
	<description>PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.</description>
	<lastBuildDate>Tue, 04 Jun 2024 10:30:00 +0000</lastBuildDate>
	<docs>http://backend.userland.com/rss092</docs>
	<copyright>Copyright (c) 2024 IDG Communications, Inc.</copyright>
	<!-- generator="WordPress/6.4.5" -->

		<item>
			<title>Why you should reset your Windows PC every year</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/06/Microsoft-Surface-Laptop-Go-2_review_8.jpg?quality=50&#038;strip=all" length="618336" type="image/jpeg" />
			<pubDate>Tue, 04 Jun 2024 10:30:00 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>In daily use, your Windows PC saves countless data, installs and uninstalls programs &mdash; and in the process becomes increasingly slower and more susceptible to problems. But there is a simple solution to breathe new life into your PC: Reset your computer once a year. </p>



<p>Here&rsquo;s why it&rsquo;s a good idea to reset Windows periodically, followed by information on how to do it.</p>



<h2 class="wp-block-heading" id="3-advantages-of-regularly-resetting-windows-pcs">3 advantages of regularly resetting Windows PCs</h2>



<h3 class="wp-block-heading" id="1-create-order-and-free-up-storage-space">1. Create order and free up storage space</h3>



<p>Resetting your PC every year helps you to tidy up your digital life. It removes old programs and files that you no longer need &ndash; even those that you didn&rsquo;t want to delete for various reasons &ldquo;because you&rsquo;re bound to need them again at some point.&rdquo;</p>



<p>The truth is: 9 out of 10 of these files are guaranteed never to be needed again. An annual clear-out not only frees up more storage space, but also ensures a tidy system that works more efficiently. And your precious files should be backed up before you reset Windows, so you can still dig them up in a pinch</p>



<h3 class="wp-block-heading" id="2-eliminate-errors-and-malware">2. Eliminate errors and malware</h3>



		<div class="wp-block-product-widget-block product-widget is-half-width is-float-right">
			<div class="product-widget__block-title-wrapper">
				<h4 class="product-widget__block-title" id="get-windows-11-pro-for-cheap">
					get windows 11 pro for cheap				</h4>
			</div>

			<div class="product-widget__content-wrapper">
									<div class="product-widget__title-wrapper">
						<h3 class="product-widget__title" id="windows-11-pro">Windows 11 Pro</h3>
					</div>
				
									<div class="product-widget__image-outer-wrapper">
						<div class="product-widget__image-wrapper">
							<img decoding="async" width="2368" height="1330" class="product-widget__image" src="https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png" loading="lazy" alt="Windows 11 Pro" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?quality=50&amp;strip=all 2368w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=768%2C431&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=1200%2C674&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=1536%2C863&amp;quality=50&amp;strip=all 1536w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=2048%2C1150&amp;quality=50&amp;strip=all 2048w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=150%2C84&amp;quality=50&amp;strip=all 150w" sizes="(max-width: 300px) 100vw, 300px" />
						</div>
					</div>
				
				
				<div class="product-widget__information">
												<div class="product-widget__information--rrp-wrapper">
									<span class="product-widget__information--rrp-label">
															</span>
									<span class="product-widget__information--rrp-value">
																</span>
								</div>
								
									</div>
			</div>
		</div>

		


<p>Over time, software bugs and malware can accumulate on your PC and affect performance. A system reset can fix many of these issues and restore your operating system to a fresh state. This can eliminate faulty drivers and other system problems.</p>



<p>It also removes potentially harmful programs that could jeopardize your system. In some cases, a complete reinstallation via a USB stick with Windows installation may be necessary to ensure that all problems are completely resolved, but that should be exceedingly rare if you <a href="https://www.pcworld.com/article/407277/best-antivirus-for-windows-pc.html">run antivirus protection</a>.</p>



<h3 class="wp-block-heading" id="3-performance-boost-for-older-systems">3. Performance boost for older systems</h3>



<p>If your PC is a little older, a reset can significantly improve performance. Over the years, many programs accumulate, run in the background, and consume resources.</p>



<p>By resetting your PC and reinstalling only the necessary programs, you can noticeably increase performance. This will result in fewer delays, faster loading times and overall better performance, both at work and when playing games.</p>



<h2 class="wp-block-heading" id="step-by-step-guide-how-to-reset-your-windows-pc">Step-by-step guide: How to reset your Windows PC</h2>



<h3 class="wp-block-heading" id="1-back-up-your-data">1. Back up your data</h3>



<p>Before you reset your PC, you should make sure that all important data is backed up. Use cloud services such as Google Drive to save documents, images and other important files in a pinch, but it&rsquo;s better to use a <a href="https://www.pcworld.com/article/407021/best-windows-backup-software.html">proper Windows backup program</a> or <a href="https://www.pcworld.com/article/407149/online-cloud-backup-services-carbonite-idrive-backblaze-livedrive.html">online backup services</a> if you can. Drop your backed-up files<a href="https://www.pcworld.com/article/406861/best-external-drives.html"> on an external drive</a> for data safety, too.</p>



<h3 class="wp-block-heading" id="2-reset-your-pc">2. Reset your PC</h3>



<p>Use the integrated Windows Reset feature to reset your operating system. Here&rsquo;s how it works in Windows 11:</p>



<ul>
<li>Open the &ldquo;Settings&rdquo;.</li>



<li>Select &ldquo;System&rdquo;.</li>



<li>Click on &ldquo;Recovery&rdquo;.</li>



<li>Select &ldquo;Reset this PC&rdquo; and follow the instructions on the screen.</li>
</ul>



<h3 class="wp-block-heading" id="3-reinstall-software">3. Reinstall software</h3>



<p>After the reset, you can use tools such as <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://ninite.com/&amp;xcust=2-1-2354780-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" rel="nofollow">Ninite</a> to install all standard programs at once. This saves time and effort. Make sure you only install the applications you actually need. Our guide to the <a href="https://www.pcworld.com/article/443089/best-free-software-for-pc.html">best free software for your PC</a> can help you find great no-cost tools.</p>



<h3 class="wp-block-heading" id="4-restore-games-and-data">4. Restore games and data</h3>



<p>If you&rsquo;re a gamer, queue up your favorite titles on Steam or Epic and let them download overnight, if you didn&rsquo;t back them up as well. You can copy your important documents and files from your backup to your PC.</p>



<h2 class="wp-block-heading" id="conclusion">Conclusion</h2>



<p>An annual reset of your Windows PC offers numerous benefits, from digital decluttering and troubleshooting to improved performance. By regularly resetting your PC, you ensure that your system runs smoothly and is free of unnecessary clutter. </p>



<p>Want to go deeper? Here are <a href="https://www.pcworld.com/article/1793414/make-windows-pc-run-faster-better-tips.html">13 free ways to make your Windows PC run faster and better</a>.</p>

<category>Windows</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2354780/why-you-should-reset-your-windows-pc-once-a-year.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2354780</post-id>		</item>
				<item>
			<title>What are catfishing scams? How to not become a victim yourself</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/06/Internet-Fraud.jpg?quality=50&#038;strip=all" length="436237" type="image/jpeg" />
			<pubDate>Mon, 03 Jun 2024 10:30:00 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>Have you ever met someone online who turned out to be not who they said they were? If so, you&rsquo;ve fallen victim to a so-called &ldquo;catfish&rdquo; (sometimes also called &ldquo;catfishers&rdquo;).</p>



<p><strong>Catfishing</strong>&mdash;pretending to be someone else online&mdash;is an increasingly common phenomenon that can have serious consequences.</p>



<p>In this article, you&rsquo;ll learn exactly what catfishing is, how it works, what the signs are, and how you can protect yourself against it.</p>



<blockquote class="wp-block-quote">
<p><strong>Further reading: </strong><a href="https://www.pcworld.com/article/407277/best-antivirus-for-windows-pc.html">The best security suites we&rsquo;ve tested</a></p>
</blockquote>



<h2 class="wp-block-heading" id="what-is-catfishing">What is catfishing?</h2>



<p>Catfishing is the creation and use of a false identity on the internet to deceive other people. Catfishers often have fraudulent intentions and aim to take financial advantage of their victims.</p>



<p>The phenomenon was made famous by the 2010 documentary film <em>Catfish</em> and it usually takes place on dating apps and social networks.</p>



<h2 class="wp-block-heading" id="how-does-catfishing-work">How does catfishing work?</h2>



<p>Catfishers use stolen photos and fabricated information to create credible online profiles, typically on popular social media and dating platforms where they can find many potential victims.</p>



<p>They use flattery, emotional manipulation, and exploitation of vulnerabilities to build trust with their victims. One catfishing scam could run for months before the victim is asked for money or personal information.</p>



<p>Some catfishers also use special apps to disguise their appearance or voice, making the deception even more believable.</p>



<h2 class="wp-block-heading" id="notable-examples-of-catfishing">Notable examples of catfishing</h2>



<h3 class="wp-block-heading" id="the-case-of-manti-teo">The case of Manti Te&rsquo;o</h3>



<p><strong>Manti Te&rsquo;o</strong>, a well-known college football player, was the victim of a catfisher in 2012 who not only pretended to be his girlfriend but even faked her death. Behind the false identity was a man named Ronaiah Tuiasosopo, who abused Te&rsquo;o&rsquo;s trust.</p>



<p>The events surrounding this case were later explored in the Netflix documentary <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.netflix.com/title/81580141&amp;xcust=2-1-2341544-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" rel="nofollow"><em>Untold: The Girlfriend Who Didn&rsquo;t Exist</em></a>.</p>



<h3 class="wp-block-heading" id="the-isis-recruiter">The ISIS recruiter</h3>



<p><strong>Mohamad Jamal Khweis</strong> thought he was communicating with a young woman named Umm Isa al-Amrikiya, who was in fact a catfisher. The catfisher was working on behalf of ISIS and recruited Khweis online. Khweis was arrested in 2015 when he tried to join ISIS.</p>



<h3 class="wp-block-heading" id="the-fake-soldier">The fake soldier</h3>



<p>In 2018, <strong>John Edward Taylor</strong> was sentenced to 14 years in prison in the USA after defrauding numerous women on dating sites.</p>



<p>Taylor posed as a retired Navy SEAL or CIA agent to impress his victims, gain their trust, and get them to transfer thousands of dollars to him. He was eventually convicted of multiple counts of fraud and identity theft.</p>



<h2 class="wp-block-heading" id="typical-warning-signs-of-catfishing">Typical warning signs of catfishing</h2>



<p>There are several warning signs that may indicate you&rsquo;re dealing with a catfisher. Watch out for the following to protect yourself from fraud:</p>



<ul>
<li><strong>Early demands for money:</strong> If someone asks for money conspicuously early in the relationship, this could be a warning sign. Often this is disguised as an emergency where the catfisher pretends to need money for traveling or other urgent expenses.</li>



<li><strong>Avoiding personal contact:</strong> A catfisher will usually find excuses to avoid video chats and face-to-face meetings. This is so they can hide their true identity and keep the ruse going.</li>



<li><strong>Unrealistically beautiful profile pictures:</strong> Profile pictures that appear too perfect or are blurry could be stolen or fake.</li>



<li><strong>Poor grammar and irregular communication times:</strong> Messages with poor grammar or messages sent at odd times may indicate that the catfisher is not from your region.</li>



<li><strong>Shifting the conversation:</strong> A desire to move the conversation from the original platform to another can be a warning sign.</li>



<li><strong>Short-notice cancellations of meetings or calls:</strong> Catfishers tend to cancel scheduled meetings or calls at the last minute.</li>



<li><strong>Circumstances are too perfect:</strong> If the person or situation seems too good to be true, it probably is.</li>
</ul>


<div class="extendedBlock-wrapper block-coreImage center"><figure data-wp-context='{ "core":
					{ "image":
						{   "imageLoaded": false,
							"initialized": false,
							"lightboxEnabled": false,
							"hideAnimationEnabled": false,
							"preloadInitialized": false,
							"lightboxAnimation": "zoom",
							"imageUploadedSrc": "",
							"imageCurrentSrc": "",
							"targetWidth": "none",
							"targetHeight": "none",
							"scaleAttr": "",
							"dialogLabel": "Enlarged image"
						}
					}
				}' data-wp-interactive class="wp-block-image aligncenter size-large is-resized wp-lightbox-container"><img decoding="async" data-wp-effect--setstylesonresize="effects.core.image.setStylesOnResize" data-wp-effect="effects.core.image.setButtonStyles" data-wp-init="effects.core.image.initOriginImage" data-wp-on--click="actions.core.image.showLightbox" data-wp-on--load="actions.core.image.handleLoad" src="https://b2c-contenthub.com/wp-content/uploads/2024/05/shutterstock_2260902619.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Chat Money Fraud" class="wp-image-2335007" style="width:765px;height:auto" width="1200" height="676" loading="lazy" /><button class="lightbox-trigger" type="button" aria-haspopup="dialog" aria-label="Enlarge image: Chat Money Fraud" data-wp-on--click="actions.core.image.showLightbox" data-wp-style--right="context.core.image.imageButtonRight" data-wp-style--top="context.core.image.imageButtonTop">
				<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewbox="0 0 12 12">
					<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z"></path>
				</svg>
			</button><figcaption class="wp-element-caption"><p>If an online acquaintance asks for money, you should be cautious&mdash;no matter how dramatic the plight seems.</p> </figcaption>		<div data-wp-body="" class="wp-lightbox-overlay zoom" data-wp-bind--role="selectors.core.image.roleAttribute" data-wp-bind--aria-label="selectors.core.image.dialogLabel" data-wp-class--initialized="context.core.image.initialized" data-wp-class--active="context.core.image.lightboxEnabled" data-wp-class--hideanimationenabled="context.core.image.hideAnimationEnabled" data-wp-bind--aria-modal="selectors.core.image.ariaModal" data-wp-effect="effects.core.image.initLightbox" data-wp-on--keydown="actions.core.image.handleKeydown" data-wp-on--touchstart="actions.core.image.handleTouchStart" data-wp-on--touchmove="actions.core.image.handleTouchMove" data-wp-on--touchend="actions.core.image.handleTouchEnd" data-wp-on--click="actions.core.image.hideLightbox" tabindex="-1">
				<button type="button" aria-label="Close" style="fill: #000" class="close-button" data-wp-on--click="actions.core.image.hideLightbox">
					<svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24" width="20" height="20" aria-hidden="true" focusable="false"><path d="M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z"></path></svg>
				</button>
				<div class="lightbox-image-container"><div class="extendedBlock-wrapper block-coreImage center"><figure class="wp-block-image aligncenter size-large is-resized responsive-image"><img decoding="async" data-wp-bind--src="context.core.image.imageCurrentSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Chat Money Fraud" class="wp-image-2335007" style="width:765px;height:auto" width="1200" height="676" loading="lazy" /><figcaption class="wp-element-caption"><p>If an online acquaintance asks for money, you should be cautious&mdash;no matter how dramatic the plight seems.</p> </figcaption></figure><p class="imageCredit">Celia Ong</p></div>
</div>
				<div class="lightbox-image-container foundry-lightbox"><div class="extendedBlock-wrapper block-coreImage center"><figure class="wp-block-image aligncenter size-large is-resized enlarged-image"><img decoding="async" data-wp-bind--src="selectors.core.image.enlargedImgSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Chat Money Fraud" class="wp-image-2335007" style="width:765px;height:auto" width="1200" height="676" loading="lazy" /><figcaption class="wp-element-caption"><p>If an online acquaintance asks for money, you should be cautious&mdash;no matter how dramatic the plight seems.</p> </figcaption></figure><p class="imageCredit">Celia Ong</p></div>
</div>
				<div class="scrim" style="background-color: #fff" aria-hidden="true"></div>
		</div></figure><p class="imageCredit">Celia Ong</p></div>



<h2 class="wp-block-heading" id="motives-of-a-catfisher">Motives of a catfisher</h2>



<p>Catfishers have a variety of motives, ranging from financial gain to emotional gratification. Many catfishers are after money and pose as romantic partners in distress to gain financial support from their victims.</p>



<p>Others seek attention and validation. They resort to catfishing to grab the limelight and get the attention they lack in real life. By pretending to be someone else, they enjoy the recognition they crave.</p>



<p>The internet also offers the opportunity to hide behind a new identity and present yourself differently than you really are. This freedom and anonymity allow catfishers to push boundaries and live lives that seem unattainable in the real world.</p>



<p>Finally, there are also those who use catfishing to take revenge on others and cause them harm.</p>



<h2 class="wp-block-heading" id="dangers-and-effects-of-catfishing">Dangers and effects of catfishing</h2>



<p>Catfishing can have a significant impact on victims. The most common dangers and effects include:</p>



<ul>
<li><strong>Financial losses:</strong> According to Federal Trade Commission (FTC) data, romance scams are among the most lucrative scams in the US. In 2021, victims of these scams <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://consumer.ftc.gov/articles/what-know-about-romance-scams&amp;xcust=2-1-2341544-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" rel="nofollow">lost a total of $547 million</a> (an increase of 80 percent compared to 2020).</li>



<li><strong>Reputational damage:</strong> If a victim shares private or embarrassing information, the catfisher can use that to blackmail the victim and ruin their reputation. Celebrities, athletes, and other public figures are especially at risk and can suffer considerable reputational damage as a result of catfishing.</li>



<li><strong>Identity theft:</strong> The catfisher can use the victim&rsquo;s personal data for fraudulent activities.</li>



<li><strong>Emotional distress:</strong> Victims of catfishing can experience severe emotional distress, including anxiety and depression. Older and marginalized populations are particularly affected. If the catfisher feels discovered, they may display an altered personality and respond with accusations or threats to intimidate victims. This adds to the emotional distress and can have a lasting impact on the victim&rsquo;s confidence in future relationships.</li>
</ul>



<h2 class="wp-block-heading" id="how-to-protect-yourself-from-catfishing">How to protect yourself from catfishing</h2>



<p>Catfishing is often difficult to recognize and can be well-disguised. To protect yourself, you should consider the following strategies:</p>



<ul>
<li><strong>Research the person:</strong> Verify the person&rsquo;s identity before entering into an online relationship. Look for inconsistencies in their history and check their online presence.</li>



<li><strong>Meet in person:</strong> Try to meet the person in a public place to confirm their identity. If they refuse, this could be a red flag.</li>



<li><strong>Avoid giving out personal information:</strong> Do not disclose sensitive information&mdash;such as home address or financial details&mdash;until you&rsquo;re sure the person is trustworthy.</li>



<li><strong>Trust your instincts:</strong> If something seems too good to be true, it probably is. Be careful and listen to your gut.</li>



<li><strong>Be extra careful on social media:</strong> Don&rsquo;t accept friend requests from strangers and always check your privacy settings. Avoid having private conversations with people you don&rsquo;t know.</li>
</ul>



<blockquote class="wp-block-quote">
<p><strong>Further reading:</strong> <a href="https://www.pcworld.com/article/447171/dont-get-catfished-tips-for-vetting-a-strangers-online-identity.html">How to vet a stranger&rsquo;s online identity</a></p>
</blockquote>



<h2 class="wp-block-heading" id="be-on-alert-for-catfishing">Be on alert for catfishing</h2>



<p>Catfishing is a serious problem that can affect anyone, especially if you let your guard down. The scams are often well-disguised and difficult to see through. It&rsquo;s important to be careful with personal information and remain vigilant whenever things sound a little too &ldquo;fairy tale.&rdquo;</p>



<p>Someone who has nothing to hide will usually be willing to meet in person or video chat to confirm their identity. If not, better to not take any risks and even block the person on all social media channels.</p>



<p><em>This article was translated from German to English and originally appeared on pcwelt.de.</em></p>



<p></p>

<category>Security Software and Services</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2341544/what-does-catfishing-mean-and-how-do-you-recognise-it.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2341544</post-id>		</item>
				<item>
			<title>This dead-simple trick reveals if a battery is full or empty</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/05/Alkaline-Batterien-2.jpg?quality=50&#038;strip=all" length="538907" type="image/jpeg" />
			<pubDate>Wed, 15 May 2024 14:02:30 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>When your remote control gives up the ghost or your kid&rsquo;s favorite toy stops working, you&rsquo;re often faced with the question: Did the batteries die or is the device defective? </p>



<p>A dead-simple, wonderfully nifty test offers a quick and reliable way to check the actual charge state of a battery, keeping you from rashly discarding good batteries or buying new ones unnecessarily. </p>



<blockquote class="wp-block-quote">
<p><strong>Further reading: </strong><a href="https://www.pcworld.com/article/394918/how-to-check-your-laptops-battery-health.html">How to check your laptop&rsquo;s battery health</a></p>
</blockquote>



<h2 class="wp-block-heading" id="battery-full-or-flat-this-simple-test-reveals-it">Battery full or flat? This simple test reveals it</h2>



<p>All you need for this test is the battery you want to check. If available, have a new, fully charged battery ready to compare the results. This is how it works:</p>



<ol>
<li>Make sure you have a flat and firm surface, such as a table, in front of you.</li>



<li>Drop the battery vertically onto the surface from a height of about 20 centimeters (roughly 8 inches).</li>



<li>Pay close attention to how the battery hits the surface and how it behaves afterwards: A fully charged battery usually tips over and stays put. An empty battery, on the other hand, often bounces back a little and bounces up a few centimeters.</li>
</ol>



<p><strong>Why?</strong> Alkaline batteries contain a gel-like substance that absorbs the impact when fully charged. When the battery is flat, this substance dries out and hardens, making the battery more likely to bounce back.</p>



<h2 class="wp-block-heading" id="extend-battery-life-with-these-4-tips">Extend battery life with these 4 tips</h2>



<ul>
<li><strong>Switch off devices correctly</strong>: Make sure you switch devices off completely when they are not in use. Even in standby mode, some devices can continue to consume energy, which puts unnecessary strain on the batteries.</li>



<li><strong>Remove batteries:</strong> If you are not using an appliance for an extended period of time, remove the batteries completely. This not only prevents energy loss, but also protects against battery leakage, which could damage the appliance.</li>



<li><strong>Avoid extreme temperatures: </strong>Do not store batteries in places with high or very low temperatures. Extreme cold or heat can impair the chemical processes in the batteries and shorten their service life.</li>



<li><strong>Use batteries of the same type: </strong>Do not mix old and new batteries in the same appliance and avoid combining batteries of different brands or types (such as alkaline and NiMH). Different voltage levels and discharge rates can affect performance and reduce the service life of all batteries used.</li>
</ul>



<p><strong>Further reading: </strong><a href="https://www.pcworld.com/article/2242518/is-fast-charging-harmful-to-the-mobile-phone-battery-the-answer.html">Does fast charging hurt your phone battery?</a></p>

<category>Power</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2332899/this-dead-simple-trick-reveals-if-a-battery-is-full-or-empty.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2332899</post-id>		</item>
				<item>
			<title>Quishing and vishing: How to protect yourself from new security threats</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/05/Gangster-1.jpg?quality=50&#038;strip=all" length="179326" type="image/jpeg" />
			<pubDate>Fri, 10 May 2024 10:30:00 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>In the ongoing battle against cybercrime, we are constantly coming across new methods that fraudsters use to try and obtain our sensitive data. While vishing is already a well-known threat, quishing is an even newer and more sophisticated method. Read on to find out what these terms mean and how you can protect yourself.</p>



<blockquote class="wp-block-quote">
<p><strong>Further reading:</strong> <a href="https://www.pcworld.com/article/407277/best-antivirus-for-windows-pc.html" data-type="link" data-id="https://www.pcworld.com/article/407277/best-antivirus-for-windows-pc.html">The best antivirus software for Windows</a> </p>
</blockquote>



<h2 class="wp-block-heading toc" id="what-is-vishing">What is vishing?</h2>



<p>Vishing is a combination of the words &ldquo;voice&rdquo; and &ldquo;phishing&rdquo; and refers to fraudulent activities in telecommunications. The perpetrators pretend to be trustworthy persons or organizations in order to obtain sensitive data such as bank account information, credit card details, or passwords. Like many other scams, vishing falls under the heading of social engineering.</p>



<h2 class="wp-block-heading toc" id="how-to-recognize-vishing">How to recognize vishing</h2>



<p>Typical signs of vishing are calls requesting urgent action or contact from organizations that you do not normally interact with.</p>



<p>For example, the caller claims to be an employee of your bank and says that there&rsquo;s a problem with your account. You may be asked to provide your account information or credit card details in order to resolve the problem. The caller may also threaten you with consequences such as freezing your account or other penalties if you do not cooperate.</p>



<p>In other cases, fraudsters pretend to be Microsoft technicians after secretly infecting and locking the victim&rsquo;s computer via a malware link. The person called is asked to pay for the repair or to purchase special software. </p>



<p>The so-called &ldquo;police officer tactic&rdquo; is also widespread. The perpetrators slip into the role of police officers and warn older people in particular about criminal gangs. They then urge the victims to hand over their valuables and cash reserves to the supposed &ldquo;police&rdquo; for safekeeping.</p>



<blockquote class="wp-block-quote">
<p><strong>Further reading:</strong> <a href="https://www.pcworld.com/article/2245853/how-to-turn-on-microsoft-windows-built-in-ransomware-protections.html" data-type="link" data-id="https://www.pcworld.com/article/2245853/how-to-turn-on-microsoft-windows-built-in-ransomware-protections.html">Windows includes built-in ransomware protections. Here&rsquo;s how to turn it on</a></p>
</blockquote>



<h2 class="wp-block-heading" id="quishing-fraud-scam-via-qr-codes">Quishing: Fraud scam via QR codes</h2>



<p>Quishing is the latest phenomenon in cybercrime and is proving to be particularly insidious. This method uses QR codes to lure users to fake websites where attempts are then made to obtain their data. The prevalence and ease of use of QR codes in everyday life make quishing a serious threat.</p>



<h3 class="wp-block-heading" id="how-does-quishing-work">How does quishing work?</h3>



<p>Quishing attacks skillfully exploit the increasing interconnectedness of our digital environment. As it becomes more common to combine different devices and platforms for everyday tasks such as bank transfers, users are used to switching between their devices &mdash; from computer to smartphone, for example. </p>



		<div class="wp-block-product-widget-block product-widget is-half-width is-float-right">
			<div class="product-widget__block-title-wrapper">
				<h4 class="product-widget__block-title" id="the-best-security-suite-weve-tested">
					the best security suite we've tested				</h4>
			</div>

			<div class="product-widget__content-wrapper">
									<div class="product-widget__title-wrapper">
						<h3 class="product-widget__title" id="norton-360-deluxe">Norton 360 Deluxe</h3>
					</div>
				
									<div class="product-widget__image-outer-wrapper">
						<div class="product-widget__image-wrapper">
							<img decoding="async" width="2400" height="1600" class="product-widget__image" src="https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?quality=50&amp;strip=all" loading="lazy" alt="Norton 360 Deluxe" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?quality=50&amp;strip=all 2400w, https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?resize=300%2C200&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?resize=768%2C512&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?resize=1200%2C800&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?resize=1536%2C1024&amp;quality=50&amp;strip=all 1536w, https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?resize=2048%2C1365&amp;quality=50&amp;strip=all 2048w, https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?resize=1240%2C826&amp;quality=50&amp;strip=all 1240w, https://b2c-contenthub.com/wp-content/uploads/2023/12/IMG_3647-sm.jpg?resize=150%2C100&amp;quality=50&amp;strip=all 150w" sizes="(max-width: 300px) 100vw, 300px" />
						</div>
					</div>
				
									<div class="review product-widget__review-details">
													<div class="product-widget__rating-and-review-link">
								<div class="product-widget__review-details--rating">
											<div class="starRating" style="--rating: 4;" aria-label="Rating of this product is 4 out of 5"></div>
										</div>									<a class="product-widget__review-link" href="https://www.pcworld.com/article/393283/norton-360-deluxe-antivirus-review.html" target="_blank">Read our review</a>
									
							</div>
											</div>
				
				<div class="product-widget__information">
												<div class="product-widget__information--rrp-wrapper">
									<span class="product-widget__information--rrp-label">
															</span>
									<span class="product-widget__information--rrp-value">
																</span>
								</div>
								
									</div>
			</div>
		</div>

		


<p>Cybercriminals are capitalizing on this habit by sending fraudulent emails pointing out a supposed security problem or claiming that the user urgently needs to download a document, accessible by scanning a QR code with their smartphone. </p>



<p>The devious intention is that users are directed to a fake website that is not recognized as such by smartphones. Two things can happen there: Either users download malware-infected documents or they enter their login details, which are then forwarded directly to the fraudsters. </p>



<h2 class="wp-block-heading toc" id="protective-measures-against-vishing-and-quishing">Protective measures against vishing and quishing</h2>



<p>Cyber criminals are learning and becoming ever more cunning. People affected often find it difficult to assess the case and react calmly, especially if they are threatened with penalties or other consequences. Here are some important measures you can take against vishing and quishing.</p>



<h3 class="wp-block-heading" id="protect-against-vishing">Protect against vishing:</h3>



<ul>
<li>Ask for the name and location of the person calling you and make a note of this information. Then call the official phone number of the organization from which the call is supposedly coming to verify the identity of the caller.</li>



<li>Do not give out any personal or financial information over the phone unless you have verified the caller&rsquo;s identity and are sure it&rsquo;s a legitimate enquiry.</li>



<li>You can block unwanted calls from known scammers or suspicious numbers with call protection. The <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.fcc.gov/call-blocking&amp;xcust=2-1-2324510-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" data-type="link" data-id="https://www.fcc.gov/call-blocking" rel="nofollow">FCC provides a list of tools and resources</a> to help.</li>
</ul>



<h3 class="wp-block-heading" id="protection-against-quishing">Protection against quishing:</h3>



<ul>
<li>Be careful when scanning QR codes, especially if they come from an unknown or insecure source. If the message seems strange to you, we advise you to contact the supposed sender via official channels.</li>



<li>Check the URL to which the QR code leads before entering any personal information. Reputable sites use encrypted connections (https).</li>



<li>Activate multi-factor authentication for your online accounts. This provides an extra layer of security because even if fraudsters get hold of your login details, they will still need the second or third authentication factor to log in on your behalf.</li>
</ul>



<h2 class="wp-block-heading toc" id="conclusion">Conclusion</h2>



<p>Both vishing and quishing are serious threats that cybercriminals skillfully use to gain access to your personal and financial data. By being aware of the specific tactics and warning signs associated with these scams and taking appropriate protective measures, you can effectively defend yourself. </p>



<p>Always be vigilant, avoid giving out sensitive information, whether over the phone or by carelessly scanning QR codes, and take the time to check the credibility of sources. Your security and the protection of your data should always come first.</p>



<blockquote class="wp-block-quote">
<p><strong>Further reading: </strong><a href="https://www.pcworld.com/article/2328217/microsoft-says-you-should-always-ask-this-one-security-question.html">Microsoft says you should always ask this one security question to avoid scams</a></p>
</blockquote>



<p><em>This article was translated from German to English and originally appeared on pcwelt.de.</em></p>

<category>Antivirus, Security Software and Services</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2324510/the-new-threat-of-quishing-and-vishing-how-to-protect-yourself.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2324510</post-id>		</item>
				<item>
			<title>These are the 10 most-watched YouTube videos of all time</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/03/4339568_original-1.jpg?quality=50&#038;strip=all" length="272020" type="image/jpeg" />
			<pubDate>Tue, 26 Mar 2024 10:30:00 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>Since 2005, YouTube has been entertaining us with clips and internet phenomena of all kinds. While viral videos were initially more in demand, music videos have been the most popular since 2010. The song &ldquo;Hello&rdquo; by Adele is currently at the top of the list of videos that have reached over a billion views the fastest &ndash; with an incredible 87 days. </p>



<p>But it&rsquo;s still not among the top 10 most clicked videos. In the following ranking of the <b>ten most-clicked YouTube videos</b> (as of February 2024), we reveal what they are:</p>



<h2 class="wp-block-heading" id="10th-place-iroschka-v-learning-colors-colourful-eggs-on-a-farm">10th place: &#1052;iroschka &#1058;V &ndash; &ldquo;Learning Colors &ndash; Colourful Eggs on a Farm&rdquo;</h2>



<ul>
<li>Release date: 26 February 2018</li>



<li>Views: 5 billion</li>
</ul>



<p>In tenth place is an educational video from the Russian channel Miroshka TV to teach children the different colors in Russian. The clip shows several animated eggs on a farm that are colored in stages. The video has been clicked on more than 5 billion times since 2018.  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="&#1059;&#1095;&#1080;&#1084; &#1094;&#1074;&#1077;&#1090;&#1072; &#1056;&#1072;&#1079;&#1085;&#1086;&#1094;&#1074;&#1077;&#1090;&#1085;&#1099;&#1077; &#1103;&#1081;&#1094;&#1072; &#1085;&#1072; &#1092;&#1077;&#1088;&#1084;&#1077; Miroshka Tv" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/_nAu9D-8srA?start=224&amp;feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="9th-place-mark-ronson-ft-bruno-mars-uptown-funk">9th place: Mark Ronson ft. Bruno Mars &ndash; &ldquo;Uptown Funk&rdquo;</h2>



<ul>
<li>Release date: 19 November 2014</li>



<li>Views: 5.18 billion</li>
</ul>



<p>In ninth place is the music video &ldquo;Uptown Funk&rdquo; by music producer Mark Ronson and Bruno Mars. Ronson won the 2015 Brit Awards in the <i>British Single of the Year</i> category with the song. Fun fact: Fleur East performed the song in the semi-final of the 11th season of <i>The X Factor</i> (at the end of 2014), even though it had not yet been released at the time.  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Mark Ronson - Uptown Funk (Official Video) ft. Bruno Mars" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/OPf0YbXqDm0?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="8th-place-chuchu-tv-phonics-song-with-two-words-a-for-apple">8th place: ChuChu TV &ndash; &ldquo;Phonics Song with TWO Words &ndash; A For Apple&rdquo;</h2>



<ul>
<li>Release date: 06 March 2014</li>



<li>Views: 5.74 billion</li>
</ul>



<p>This video is an English-language children&rsquo;s song for learning the alphabet. Ten years after its release, the video has reached more than 5.7 billion views.  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Phonics Song with TWO Words - A For Apple - ABC Alphabet Songs with Sounds for Children" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/hq3yfQnllfQ?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="7th-place-chuchu-tv-wheels-on-the-bus">7th place: ChuChu TV &ndash; &ldquo;Wheels on the Bus&rdquo;</h2>



<ul>
<li>Release date: 24 May 2018</li>



<li>Views: 5.98 billion</li>
</ul>



<p>In 7th place is once again the children&rsquo;s channel ChuChu TV with the song &ldquo;Wheels on the Bus&rdquo;. This children&rsquo;s song vividly conveys the sounds and actions that can be experienced during a bus journey. Although it was released 4 years after the Phonics song, it has collected over 5.8 billion views so far.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Wheels on the Bus | @CoComelon Nursery Rhymes &amp; Kids Songs" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/e_04ZrNroTo?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="6th-place-wiz-khalifa-ft-charlie-puth-see-you-again">6th place: Wiz Khalifa ft. Charlie Puth &ndash; &ldquo;See You Again&rdquo;</h2>



<ul>
<li>Release date: 06 April 2015</li>



<li>Views: 6.21 billion</li>
</ul>



<p>The song &ldquo;See You Again&rdquo; is not only the soundtrack title of the 2015 film <i>Fast &amp; Furious 7</i>, but also a dedication to the actor Paul Walker, who died in an accident during filming. Among other things, the song was honored with the Hollywood Film Award.  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Wiz Khalifa - See You Again ft. Charlie Puth [Official Video] Furious 7 Soundtrack" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/RgKAFK5djSk?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="5th-place-ed-sheeran-shape-of-you">5th place: Ed Sheeran &ndash; &ldquo;Shape of You&rdquo;</h2>



<ul>
<li>Release date: 30 January 2017</li>



<li>Views: 6.23 billion</li>
</ul>



<p>The chart-topper &ldquo;Shape of You&rdquo; by Ed Sheeran, his most successful song to date, takes 5th place. To date, the song has reached 6.2 billion views on YouTube and over 3.7 billion streams on Spotify. Sheeran originally wrote the song for another artist &ndash; until his music label convinced him to record it himself. </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Ed Sheeran - Shape of You (Official Music Video)" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen data-src="https://www.youtube.com/embed/JGwWNGJdvx8?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="4th-place-cocomelon-nursery-rhymes-bath-song">4th place: Cocomelon &ndash; Nursery Rhymes &ndash; &ldquo;Bath Song&rdquo;</h2>



<ul>
<li>Release date: 02 May 2018</li>



<li>Views: 6.65 billion</li>
</ul>



<p>Just before the winner&rsquo;s podium is the &ldquo;Bath Song&rdquo;, a 3D animation or rather an English nursery rhyme about the bathing experience of the little boy Cody. The fun catchy tune is a hit: the clip has been viewed more than 6.6 billion times since 2018.  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Bath Song | @CoComelon Nursery Rhymes &amp; Kids Songs" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/WRVsOCh907o?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="3rd-place-looloo-kids-johny-johny-yes-papa">3rd place: LooLoo Kids &ndash; &ldquo;Johny Johny Yes Papa&rdquo;</h2>



<ul>
<li>Release date: 08 October 2016</li>



<li>Views: 6.89 billion</li>
</ul>



<p>Third place goes to the English children&rsquo;s music video &ldquo;Johny Johny Yes Papa&rdquo;, which, like the bathing song (4th place), was designed for learning and educational purposes. In it, the toddler Johny tries to get hold of a sugar bowl, but is repeatedly caught by his father. The video has been clicked on over 6.8 billion times since 2016.  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Johny Johny Yes Papa &#128118; THE BEST Song for Children | LooLoo Kids" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/F4tHL8reNCs?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="2nd-place-luis-fonsi-ft-daddy-yankee-despacito">2nd place: Luis Fonsi ft. Daddy Yankee &ndash; &ldquo;Despacito&rdquo;</h2>



<ul>
<li>Release date: 12 January 2017</li>



<li>Views: 8.40 billion</li>
</ul>



<p>One of the most viewed videos of the YouTube era is &ndash; unsurprisingly &ndash; the single &ldquo;Despacito&rdquo; by Luis Fonsi and rapper Daddy Yankee. Although released in winter, &ldquo;Despacito&rdquo; is considered <i>the</i> summer hit par excellence and one of the biggest global successes in the music industry. In fact, the single was the most-clicked video on YouTube for more than three years, but has now had to settle for second place and &ldquo;only&rdquo; 8.38 billion views.  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Luis Fonsi - Despacito ft. Daddy Yankee" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/kJQP7kiw5Fk?feature=oembed"></iframe>
</div></figure>



<h2 class="wp-block-heading" id="1st-place-pinkfong-kids-songs-stories-baby-shark-dance">1st place: Pinkfong! Kids&rsquo; Songs &amp; Stories &ndash; &ldquo;Baby Shark Dance&rdquo;</h2>



<ul>
<li>Release date: 17 June 2016</li>



<li>Views: 14.27 billion</li>
</ul>



<p>&lsquo;Despacito&rsquo; was replaced by the popular children&rsquo;s dance video &lsquo;Baby Shark&rsquo; in November 2020. This is actually an American children&rsquo;s and folk song, but the well-known version was only recorded in 2016. At the beginning of 2022, &ldquo;Baby Shark&rdquo; broke a new YouTube record with over 10 billion views. So officially: here is the most clicked YouTube video of all time. Have fun watching and dancing!  </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Baby Shark Dance | #babyshark Most Viewed Video | Animal Songs | PINKFONG Songs for Children" width="500" height="281" src="" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen data-src="https://www.youtube.com/embed/XqZsoesa55w?feature=oembed"></iframe>
</div></figure>



<p><br></p>



<p><em>This article was translated from German to English and originally appeared on pcwelt.de.</em></p>

<category>Personal Software, Streaming Media</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2278707/10-most-watched-youtube-videos-of-all-time.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2278707</post-id>		</item>
				<item>
			<title>Does fast charging hurt your phone battery?</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/05/4338797_original.jpg?quality=50&#038;strip=all" length="809913" type="image/jpeg" />
			<pubDate>Wed, 28 Feb 2024 14:00:00 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>The fast charging function is, without a doubt, one of the most popular trend features of modern smartphones. That&rsquo;s understandable, as it&rsquo;s more than practical during the day when you don&rsquo;t have to wait for an eternity to fully charge your phone.</p>



<p>The whole thing has now gone so far that there is a real competition between manufacturers to see who can provide the best and most powerful charging technology. At last year&rsquo;s MWC, Xiaomi demonstrated its impressive charging technology, which pumped a Redmi mobile phone with 4,300 mAh to a full charge with a whopping 300 watts in just five minutes.</p>



<p>As fascinating as those figures above are, many smartphone users are becoming increasingly concerned. After all, can this be healthy for the mobile phone battery? A legitimate question, which we address in this article. Find out what fast charging does to your mobile phone and whether or not it can actually ruin the battery.</p>



<blockquote class="wp-block-quote">
<p><strong>Further reading: </strong><a href="https://www.pcworld.com/article/395115/the-best-usb-c-cables-for-charging-and-transferring-data.html">The best USB-C cables for charging and transferring data</a></p>
</blockquote>



<h2 class="wp-block-heading toc" id="what-happens-during-the-charging-process">What happens during the charging process</h2>



<p>All modern smartphones use either <b>lithium-ion batteries</b> or <b>lithium-polymer batteries</b> (LiPo batteries for short). However, cell chemistry is the same for both. There is a negative electrode (cathode), a positive electrode (anode), and electrolytes. The energy that powers a mobile phone is generated when the negative lithium ions flow through the electrolytes to the positive side. When the battery is empty, this flow stops. During the charging process, the lithium ions are moved back to the negative side so that the cycle can start again.</p>



<p>The charging process is not exclusively linear because batteries function like a kind of sponge. They absorb most of the energy when they are empty and absorb less when they are almost full. So the closer to saturation, the less efficient the charge and the flatter the charging curve. The charging voltage, on the other hand, starts at maximum power and then drops relatively quickly.</p>



<div class="extendedBlock-wrapper block-coreImage"><figure class="wp-block-image size-large"><img decoding="async" src="https://bilder.pcwelt.de/4338798_640x320_r.webp" data-src="https://bilder.pcwelt.de/4338798_640x320_r.webp" alt="Vereinfachte Darstellung eines Handy-Ladevorgangs: Rund ab der H&auml;lfte des Akkustands nimmt die Ladeeffizienz ab." title="Vereinfachte Darstellung eines Handy-Ladevorgangs: Rund ab der H&auml;lfte des Akkustands nimmt die Ladeeffizienz ab." width="1282" height="838" loading="lazy" /><figcaption class="slideBody">			Simplified illustration of a mobile phone charging process: The charging efficiency decreases from around half the battery level.</figcaption></figure></div>




<h2 class="wp-block-heading toc" id="mobile-phone-batteries-degrade">Mobile phone batteries degrade</h2>



<p>Whether fast charging or not, all batteries wear out over time. This is because the flow of lithium ions always releases some heat, to which the chemical processes react very sensitively. For this reason, you should not plug in your mobile phone when the battery is still relatively full, as inefficient charging releases even more heat.</p>



<p><b>Note:</b> On iPhones, this natural wear and tear can even be viewed. Under <i>Settings &gt; Battery &gt; Battery Status</i> <em>&amp; Charging Process</em>, you will find a percentage indication of the maximum battery capacity that is still available.</p>



<p>Heat is therefore the main reason why batteries degrade. Many users see this problem with the &ldquo;fast charging function,&rdquo; because the more current flows into the battery, the more excess heat is generated. Acute overheating can even cause the electrolytes to crystallize and the ion current between the electrodes to fail completely.</p>



<p>But &ndash;and this is the crux of the matter&ndash;manufacturers know this<b>,</b> of course. That is why there are a number of important precautions to prevent more heat than normal being generated during fast charging.</p>



<h2 class="wp-block-heading toc" id="fast-charging-requires-new-technologies">Fast charging requires new technologies</h2>



<p>In recent years, various fast charging standards have been developed to increase the transmission performance of power supply units. Qualcomm&rsquo;s Quick Charge protocol, for example, is widely used. <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.qualcomm.com/products/features/quick-charge&amp;xcust=2-1-2242518-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" data-type="URL" data-id="https://www.qualcomm.com/products/features/quick-charge" target="_blank" rel="nofollow">Version 5 enables charging from 0 to 50 percent in just 5 minutes</a> at 100+ watts.</p>



<p>OnePlus&rsquo; WarpCharge technology manages 65 watts. Another standard is VOOC Flash Charge from Oppo, for example, which has also replaced the Warp Charge technology at OnePlus since the two companies became part of the same group. The OnePlus 10T mentioned above, for example, comes with a 150 watt SUPERVOOC power supply. Other standards include USB Power Delivery, Adaptive Charge (Samsung) and TurboPower (Motorola).</p>



<p>There are now several ways and options for protecting mobile phone batteries. The most common solutions include&hellip;</p>



<ul>
<li>Power supply unit with integrated power management</li>



<li>Parallel charging</li>



<li>Additional cooling hardware</li>
</ul>



<p>Many smartphones with a fast-charging function are supplied with power supply units that have integrated circuits. These ensure that the heat energy can escape before it gets close to the mobile phone. The disadvantage of this solution is that the adapters are often larger than usual.  </p>



<p>Another option is parallel charging. The idea is simple. Instead of sending the entire current into a single battery cell, it is split into two parallel cells. The two solutions are now frequently combined for the best possible charging performance. The downside of this charging technology is a slightly lower overall capacity. This is simply because the volume of two battery cells, including the housing and hardware, takes up more space.</p>



<div class="extendedBlock-wrapper block-coreImage"><figure class="wp-block-image size-large"><img decoding="async" src="https://bilder.pcwelt.de/4338799_640x320_r.webp" data-src="https://bilder.pcwelt.de/4338799_640x320_r.webp" alt="Beim parallelen Laden wird die Leistung auf mehrere Akkuzellen aufgeteilt." title="Beim parallelen Laden wird die Leistung auf mehrere Akkuzellen aufgeteilt." width="1161" height="813" loading="lazy" /><figcaption class="slideBody">			With parallel charging, the power is divided between several battery cells.</figcaption></figure><p class="imageCredit">&copy;Xiaomi</p></div>




<p>Cooling hardware is always a solution for regulating heat development. The better the cooling system, the more power can flow into the device without overheating it. There are plenty of options: heat shields, vapor chambers, even entire fans (especially on gaming smartphones) are used to protect the batteries from excessive temperatures.</p>



<p>Which brings us back to the initial question. Does fast charging ruin mobile phone batteries or not? Do the solutions listed work? How quickly does a battery have to degrade to be considered &ldquo;ruined&rdquo;?</p>



<p>There are even official industry standards for the latter: Xiaomi guarantees that 80 percent of the original battery capacity is still available after 800 full charging cycles with its <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.mi.com/de/product/xiaomi-11t-pro-120w-xiaomi-hypercharge/&amp;xcust=2-1-2242518-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" rel="nofollow">11T Pro</a> (with 120 watt fast charging). Apple promises a capacity of 80 per cent after <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://support.apple.com/de-de/HT208387&amp;xcust=2-1-2242518-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" rel="nofollow">500 charging cycles</a>. And then there is Oppo. <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.oppo.com/chde/newsroom/press/schnelladetechnologie/&amp;xcust=2-1-2242518-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" rel="nofollow">At the beginning of February 2023, the Chinese manufacturer</a> presented two new fast charging standards: 150W SuperVOOC and 240W SuperVOOC technology with 80 percent battery capacity after no less than 1,600 charging cycles. We are excited to see what breakthroughs await us this year.</p>



<h2 class="wp-block-heading toc" id="does-fast-charging-ruin-the-mobile-phone-battery-or-not">Does fast charging ruin the mobile phone battery or not?</h2>



<p>Without long-term studies, it&rsquo;s not possible to answer this question definitively, but so far everything points to the fact that fast charging does not accelerate the normal wear and tear of a battery.</p>



		<div class="wp-block-product-widget-block product-widget is-half-width is-float-right">
			<div class="product-widget__block-title-wrapper">
				<h4 class="product-widget__block-title" id="the-best-usb-c-charging-cable-weve-tested">
					the best usb-c charging cable we've tested				</h4>
			</div>

			<div class="product-widget__content-wrapper">
									<div class="product-widget__title-wrapper">
						<h3 class="product-widget__title" id="belkin-boostcharge-240-watt-charging-cable">Belkin BoostCharge 240-watt charging cable</h3>
					</div>
				
									<div class="product-widget__image-outer-wrapper">
						<div class="product-widget__image-wrapper">
							<img decoding="async" width="1500" height="1500" class="product-widget__image" src="https://b2c-contenthub.com/wp-content/uploads/2023/11/belkin-boost-cable.jpg?quality=50&amp;strip=all" loading="lazy" alt="Belkin BoostCharge 240-watt charging cable" srcset="https://b2c-contenthub.com/wp-content/uploads/2023/11/belkin-boost-cable.jpg?quality=50&amp;strip=all 1500w, https://b2c-contenthub.com/wp-content/uploads/2023/11/belkin-boost-cable.jpg?resize=150%2C150&amp;quality=50&amp;strip=all 150w, https://b2c-contenthub.com/wp-content/uploads/2023/11/belkin-boost-cable.jpg?resize=300%2C300&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2023/11/belkin-boost-cable.jpg?resize=768%2C768&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2023/11/belkin-boost-cable.jpg?resize=1200%2C1200&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2023/11/belkin-boost-cable.jpg?resize=1240%2C1240&amp;quality=50&amp;strip=all 1240w" sizes="(max-width: 300px) 100vw, 300px" />
						</div>
					</div>
				
				
				<div class="product-widget__information">
												<div class="product-widget__information--rrp-wrapper">
									<span class="product-widget__information--rrp-label">
															</span>
									<span class="product-widget__information--rrp-value">
																</span>
								</div>
								
											<div class="product-widget__pricing-details  ">
															<span class="product-widget__pricing-details--label">
									Best Prices Today:
								</span>
														<span class="product-widget__pricing-details--links-wrapper">
								<a class="product-widget__pricing-details--link" href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.amazon.com/dp/B0CB83QY4L?tag=pcworld02-20&amp;linkCode=ogi&amp;th=1&amp;psc=1&amp;xcust=2-1-2242518-5-2159527-9938&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" data-vars-product-name="Belkin BoostCharge 240-watt charging cable" data-vars-product-id="2159527" data-vars-category="Consumer Electronics" data-vars-manufacturer-id="9938" data-vars-manufacturer="Belkin" data-vars-vendor="" data-vars-po="" data-product="2159527" data-vars-link-position-id="005" data-vars-link-position="Product Sidebar" data-vars-outbound-link="https://www.amazon.com/dp/B0CB83QY4L?tag=pcworld02-20&amp;linkCode=ogi&amp;th=1&amp;psc=1" rel="nofollow">$17.99 at  Amazon</a>							</span>
						</div>
									</div>
			</div>
		</div>

		


<p>However, it&rsquo;s also a fact that fast charging generates more heat due to the higher wattage, from which the phone must be protected. To this end, manufacturers use various measures aimed at improving energy management&ndash;be it through optimized power supply units, parallel charging or smart hardware, and sensors to regulate temperature fluctuations.</p>



<p>The users themselves actually have the greatest influence on battery life. Here are some quick tips on how to keep your mobile phone battery fit for longer:  </p>



<ul>
<li>Always charge with a cable if possible, <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.pcwelt.de/article/1206805/bevor-sie-ihr-handy-kabellos-laden-sollten-sie-das-wissen.html&amp;xcust=2-1-2242518-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" rel="noreferrer noopener">even if your phone offers inductive charging</a>.</li>



<li>Avoid complete discharges. The optimum battery level is between 20 and 80 percent.</li>



<li>Do not charge your battery if it is still relatively full (over 60 percent).</li>



<li>Avoid extreme temperature fluctuations, whether heat or cold.</li>



<li>Always use the charging accessories supplied by the manufacturer (plug adapter, charging cable).</li>



<li>Do not charge your mobile phone when performance-intensive apps or games are running.</li>



<li>Do not leave your mobile phone plugged in for longer than necessary when the battery is fully charged.</li>
</ul>



<p><em>This article was translated from German to English and originally appeared on pcwelt.de.</em></p>

<category>Smartphones</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2242518/is-fast-charging-harmful-to-the-mobile-phone-battery-the-answer.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2242518</post-id>		</item>
				<item>
			<title>Make your VPN faster: 10 tips and tricks</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/04/NordVPN-Windows-2024-1.jpg?quality=50&#038;strip=all" length="275271" type="image/jpeg" />
			<pubDate>Wed, 31 Jan 2024 12:30:00 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>A virtual private network (VPN) is an ideal solution for protecting your privacy and hiding your location from the view of others on the web. However, using a VPN can sometimes lead to reduced internet speed. In this article, we will present various methods and tips on how you can optimize the speed of your VPN.</p>



<p><strong>Further reading: </strong><a href="https://www.pcworld.com/article/406870/best-vpn-services-apps-reviews-buying-advice.html" data-type="URL" data-id="https://www.pcworld.com/article/406870/best-vpn-services-apps-reviews-buying-advice.html">Best VPN services</a></p>



<h2 class="wp-block-heading" id="1-test-the-speed-of-your-internet-connection">1. Test the speed of your internet connection</h2>



<p>Firstly, disconnect from your VPN such as <a href="https://www.pcworld.com/article/398777/nordvpn-review-3.html" data-type="URL" data-id="https://www.pcworld.com/article/398777/nordvpn-review-3.html">NordVPN</a> or <a href="https://www.pcworld.com/article/394108/cyberghost-vpn-review-2.html" data-type="URL" data-id="https://www.pcworld.com/article/394108/cyberghost-vpn-review-2.html">CyberGhost</a> and then test the speed of your internet connection with <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://www.speedtest.net/&amp;xcust=2-1-2219351-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" data-type="URL" data-id="https://www.speedtest.net/" rel="nofollow">SpeedTest</a>. Run the test again when you are connected to the VPN to see if the problem is really with the VPN or with your broadband provider.</p>



<h2 class="wp-block-heading" id="2-change-the-location-of-your-vpn-server">2. Change the location of your VPN server</h2>



<p>One of the most effective ways to speed up your VPN is to change the location of your server. The location of the VPN server has a direct impact on your internet speed. </p>



<p>For example, if you are in the United States and the geographical location of the server is not critical for your activities, you should choose a server in your region of the country. This keeps the distance short and improves the speed.</p>



<p>The latency time, i.e. the time it takes for data to reach the server and back, is significantly higher with a distant server. Even a high-quality VPN cannot change this physical fact, although the latency can vary depending on the quality of the VPN provider.</p>



		<div class="wp-block-product-widget-block product-widget is-half-width is-float-right">
			<div class="product-widget__block-title-wrapper">
				<h4 class="product-widget__block-title" id="best-vpn-for-server-locations">
					best VPN for server locations				</h4>
			</div>

			<div class="product-widget__content-wrapper">
									<div class="product-widget__title-wrapper">
						<h3 class="product-widget__title" id="cyberghost">CyberGhost</h3>
					</div>
				
									<div class="product-widget__image-outer-wrapper">
						<div class="product-widget__image-wrapper">
							<img decoding="async" width="800" height="1015" class="product-widget__image" src="https://images.idgesg.net/images/article/2017/07/cyberghostbox-100729131-orig.jpg?quality=50&amp;strip=all" loading="lazy" alt="CyberGhost" sizes="(max-width: 800px) 100vw, 800px" />
						</div>
					</div>
				
									<div class="review product-widget__review-details">
													<div class="product-widget__rating-and-review-link">
								<div class="product-widget__review-details--rating">
											<div class="starRating" style="--rating: 4;" aria-label="Rating of this product is 4 out of 5"></div>
										</div>									<a class="product-widget__review-link" href="https://www.pcworld.com/article/394108/cyberghost-vpn-review-2.html" target="_blank">Read our review</a>
									
							</div>
											</div>
				
				<div class="product-widget__information">
												<div class="product-widget__information--rrp-wrapper">
									<span class="product-widget__information--rrp-label">
															</span>
									<span class="product-widget__information--rrp-value">
																</span>
								</div>
								
									</div>
			</div>
		</div>

		


<p>Another important aspect is server utilization. An overloaded server responds more slowly than a less frequented one. It is therefore worth choosing a server with a smaller number of users. </p>



<p>In most VPN applications, you will find a list of available servers, often with information on the current utilization or ping, i.e. the response time. For activities such as online gaming, where every millisecond counts, you should choose a server with the lowest possible ping in your geographical area to minimize latency. These small adjustments can make a big difference to the speed and performance of your VPN.</p>



<h2 class="wp-block-heading" id="3-restart-your-device">3. Restart your device</h2>



<p>It is possible that your device&rsquo;s operating system is overwhelmed by the complex encryption of the VPN service. A restart can provide a quick and easy solution here.</p>



<p>Another tip: Test the VPN connection on another device. This will help you to determine whether the problem is specific to your original device.</p>



<h2 class="wp-block-heading" id="4-restart-your-router">4. Restart your router</h2>



<p>Restarting your router can also be helpful if your VPN is slow. Disconnect the router either by unplugging it from the power supply or by pressing the power button. Then wait 10 to 15 seconds before switching the device back on. Please note that it may take a short moment for the router to re-establish the internet connection.</p>



<h2 class="wp-block-heading" id="5-connect-router-and-pc-via-cable">5. Connect router and PC via cable</h2>



<p>An effective way to improve your VPN connection is to connect your laptop or PC directly to the router via a LAN cable. This avoids potential performance issues that could arise from a Wi-Fi connection. While Wi-Fi is practical and convenient, it can lead to increased latency, especially if objects in the room or walls affect the signal strength.</p>



<h2 class="wp-block-heading" id="6-choose-a-different-protocol">6. Choose a different protocol</h2>



<p>Each VPN protocol uses different encryption standards to secure your data. While some protocols are more performance orientated, others offer higher security, but often at the expense of performance. WireGuard, for example, is a modern and fast protocol that is also supported by providers such as <a href="https://www.pcworld.com/article/397825/ivpn-for-windows-vpn-review.html" data-type="URL" data-id="https://www.pcworld.com/article/397825/ivpn-for-windows-vpn-review.html">IVPN</a>. IKEv2 and OpenVPN , on the other hand, are two established, reliable standard protocols, but they can lag behind WireGuard in terms of speed.</p>



<p>With <a rel="nofollow" href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://openvpn.net/&amp;xcust=2-1-2219351-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank">OpenVPN</a>, you also have the option of choosing between the TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols. UDP is faster, which is why it is normally used for streaming. You should therefore switch from TCP to UDP as a trial.</p>



		<div class="wp-block-product-widget-block product-widget is-half-width is-float-right">
			<div class="product-widget__block-title-wrapper">
				<h4 class="product-widget__block-title" id="fastest-vpn">
					Fastest VPN				</h4>
			</div>

			<div class="product-widget__content-wrapper">
									<div class="product-widget__title-wrapper">
						<h3 class="product-widget__title" id="hotspot-shield">Hotspot Shield</h3>
					</div>
				
									<div class="product-widget__image-outer-wrapper">
						<div class="product-widget__image-wrapper">
							<img decoding="async" width="1200" height="1200" class="product-widget__image" src="https://b2c-contenthub.com/wp-content/uploads/2022/04/hotspot-shield-logo-icon-2.png" loading="lazy" alt="Hotspot Shield" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/04/hotspot-shield-logo-icon-2.png?quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/04/hotspot-shield-logo-icon-2.png?resize=150%2C150&amp;quality=50&amp;strip=all 150w, https://b2c-contenthub.com/wp-content/uploads/2022/04/hotspot-shield-logo-icon-2.png?resize=300%2C300&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/04/hotspot-shield-logo-icon-2.png?resize=768%2C768&amp;quality=50&amp;strip=all 768w" sizes="(max-width: 300px) 100vw, 300px" />
						</div>
					</div>
				
									<div class="review product-widget__review-details">
													<div class="product-widget__rating-and-review-link">
								<div class="product-widget__review-details--rating">
											<div class="starRating" style="--rating: 3.5;" aria-label="Rating of this product is 3.5 out of 5"></div>
										</div>									<a class="product-widget__review-link" href="https://www.pcworld.com/article/395084/hotspot-shield-vpn-review.html" target="_blank">Read our review</a>
									
							</div>
											</div>
				
				<div class="product-widget__information">
												<div class="product-widget__information--rrp-wrapper">
									<span class="product-widget__information--rrp-label">
															</span>
									<span class="product-widget__information--rrp-value">
																</span>
								</div>
								
									</div>
			</div>
		</div>

		


<p>In addition to OpenVPN and IKEv2/IPsec, there are also protocols such as L2TP/IPsec that you can try out. Please note, however, that L2TP is less secure. If you use a VPN primarily for security reasons and less to access regionally restricted content, this step is not recommended.</p>



<h2 class="wp-block-heading" id="7-change-the-port">7. Change the port</h2>



<p>In addition to adjusting the protocol and security settings, you should also pay attention to the port selection. When a VPN connects to the web, it does so via a previously defined port. In general, this is fine. However, some networks can also throttle or restrict the use of this port, which in turn can lead to problems.  <br> <br>Check the settings of your VPN to see if there is a way to change the port used. If so, try opting for port 443. This is the most common solution for VPN speed issues related to port selection.</p>



<h2 class="wp-block-heading" id="8-switch-off-your-firewall-and-antivirus-software">8. Switch off your firewall and antivirus software</h2>



<p>Just as encryption can overload your PC&rsquo;s data processing workload, so can antivirus and firewall settings. If you notice a drop in performance, switch off the firewall and antivirus program temporarily and see if this improves the situation. </p>



<p>If this solves the problem, you should look for alternative software that does not affect PC performance.  However, do not leave your PC running without security software.</p>



<h2 class="wp-block-heading" id="9-use-split-tunnelling">9. Use split tunnelling</h2>



<p>Premium providers such as <a href="https://www.pcworld.com/article/395012/expressvpn-review-2.html" data-type="URL" data-id="https://www.pcworld.com/article/395012/expressvpn-review-2.html">ExpressVPN</a> or <a href="https://www.pcworld.com/article/398777/nordvpn-review-3.html" data-type="URL" data-id="https://www.pcworld.com/article/398777/nordvpn-review-3.html">NordVPN</a> are among the best split-tunnelling VPNs. Split tunnelling is a function that allows you to split your device&rsquo;s data traffic: Part of the data is routed through the VPN, while the other part goes directly through your normal internet connection. This method can significantly improve the internet speed and efficiency of your VPN, as not all data needs to be rerouted through the VPN server.</p>



		<div class="wp-block-product-widget-block product-widget is-half-width is-float-right">
			<div class="product-widget__block-title-wrapper">
				<h4 class="product-widget__block-title" id="best-vpn-overall">
					Best VPN overall				</h4>
			</div>

			<div class="product-widget__content-wrapper">
									<div class="product-widget__title-wrapper">
						<h3 class="product-widget__title" id="expressvpn">ExpressVPN</h3>
					</div>
				
									<div class="product-widget__image-outer-wrapper">
						<div class="product-widget__image-wrapper">
							<img decoding="async" width="708" height="348" class="product-widget__image" src="https://b2c-contenthub.com/wp-content/uploads/2022/02/Red.png" loading="lazy" alt="ExpressVPN" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/02/Red.png?quality=50&amp;strip=all 708w, https://b2c-contenthub.com/wp-content/uploads/2022/02/Red.png?resize=300%2C147&amp;quality=50&amp;strip=all 300w" sizes="(max-width: 300px) 100vw, 300px" />
						</div>
					</div>
				
									<div class="review product-widget__review-details">
						<img decoding="async" class="product-widget__review-details--editors-choice-logo" src="https://www.pcworld.com/wp-content/uploads/2021/09/PC-ED-CHOICE.png" alt="Editors' Choice" loading="lazy" />							<div class="product-widget__rating-and-review-link">
								<div class="product-widget__review-details--rating">
											<div class="starRating" style="--rating: 4.5;" aria-label="Rating of this product is 4.5 out of 5"></div>
										</div>									<a class="product-widget__review-link" href="https://www.pcworld.com/article/397547/expressvpn-2019-vpn-review.html" target="_blank">Read our review</a>
									
							</div>
											</div>
				
				<div class="product-widget__information">
												<div class="product-widget__information--rrp-wrapper">
									<span class="product-widget__information--rrp-label">
															</span>
									<span class="product-widget__information--rrp-value">
																</span>
								</div>
								
									</div>
			</div>
		</div>

		


<p>This is particularly useful if you want to access local network resources and access the internet via the VPN at the same time. For example, you can use local services such as printers or file shares while simultaneously accessing geographically restricted content via the VPN. By reducing the amount of data routed through the VPN, you can increase the speed and reduce the load on the VPN server.</p>



<h2 class="wp-block-heading" id="10-change-your-vpn-provider">10. Change your VPN provider</h2>



<p>Some VPNs are faster than others. If the one you are currently using is not fast enough for you, go to another provider. However, keep in mind that VPN speeds change depending on the time of day, day of the week, and other factors, such as server selection. Here you will find a <a href="https://www.pcworld.com/article/406870/best-vpn-services-apps-reviews-buying-advice.html" data-type="URL" data-id="https://www.pcworld.com/article/406870/best-vpn-services-apps-reviews-buying-advice.html">comparison of the best VPN services</a> currently available.</p>



<p>As many VPN providers offer refunds or free trials, you can at least download their app, sign up, and try the service.</p>



<p><em>This article was translated from German to English and originally appeared on pcwelt.de.</em></p>

<category>VPN</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2219351/speed-up-your-vpn-these-10-tricks-will-help.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2219351</post-id>		</item>
				<item>
			<title>How to delete your personal information from the internet</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2024/01/Data-removal.jpg?quality=50&#038;strip=all" length="355923" type="image/jpeg" />
			<pubDate>Tue, 23 Jan 2024 10:30:00 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>Whether to protect against identity theft, to protect our privacy or to regain control over our information, there are numerous reasons for wanting to delete personal data from the internet. And there are more of them than we would like. </p>



<p>With every click we make, more and more information about ourselves ends up in the databases of websites, search engines, and the like. Here are some things you can do about it.</p>



<h2 class="wp-block-heading toc" id="1-utilize-the-security-functions-of-websites-hardware-and-apps">1. Utilize the security functions of websites, hardware, and apps</h2>



<p>There are some basic steps you can take to better protect yourself online. Start by disabling cookies on the websites you visit and using the &lsquo;Do Not Track&rsquo; features of your favorite browser. Another good approach is to use your browser&rsquo;s private mode.</p>


<div class="extendedBlock-wrapper block-coreImage undefined"><figure data-wp-context='{ "core":
					{ "image":
						{   "imageLoaded": false,
							"initialized": false,
							"lightboxEnabled": false,
							"hideAnimationEnabled": false,
							"preloadInitialized": false,
							"lightboxAnimation": "zoom",
							"imageUploadedSrc": "",
							"imageCurrentSrc": "",
							"targetWidth": "none",
							"targetHeight": "none",
							"scaleAttr": "",
							"dialogLabel": "Enlarged image"
						}
					}
				}' data-wp-interactive class="wp-block-image size-large wp-lightbox-container"><img decoding="async" data-wp-effect--setstylesonresize="effects.core.image.setStylesOnResize" data-wp-effect="effects.core.image.setButtonStyles" data-wp-init="effects.core.image.initOriginImage" data-wp-on--click="actions.core.image.showLightbox" data-wp-on--load="actions.core.image.handleLoad" src="https://b2c-contenthub.com/wp-content/uploads/2024/01/Chrome-third-party-cookies.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Chrome third party cookies" class="wp-image-2212688" width="1200" height="698" loading="lazy" /><button class="lightbox-trigger" type="button" aria-haspopup="dialog" aria-label="Enlarge image: Chrome third party cookies" data-wp-on--click="actions.core.image.showLightbox" data-wp-style--right="context.core.image.imageButtonRight" data-wp-style--top="context.core.image.imageButtonTop">
				<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewbox="0 0 12 12">
					<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z"></path>
				</svg>
			</button><figcaption class="wp-element-caption"><p>In the browser settings (here Google Chrome), you can specify whether you want to allow or block third-party cookies.</p>
</figcaption>		<div data-wp-body="" class="wp-lightbox-overlay zoom" data-wp-bind--role="selectors.core.image.roleAttribute" data-wp-bind--aria-label="selectors.core.image.dialogLabel" data-wp-class--initialized="context.core.image.initialized" data-wp-class--active="context.core.image.lightboxEnabled" data-wp-class--hideanimationenabled="context.core.image.hideAnimationEnabled" data-wp-bind--aria-modal="selectors.core.image.ariaModal" data-wp-effect="effects.core.image.initLightbox" data-wp-on--keydown="actions.core.image.handleKeydown" data-wp-on--touchstart="actions.core.image.handleTouchStart" data-wp-on--touchmove="actions.core.image.handleTouchMove" data-wp-on--touchend="actions.core.image.handleTouchEnd" data-wp-on--click="actions.core.image.hideLightbox" tabindex="-1">
				<button type="button" aria-label="Close" style="fill: #000" class="close-button" data-wp-on--click="actions.core.image.hideLightbox">
					<svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24" width="20" height="20" aria-hidden="true" focusable="false"><path d="M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z"></path></svg>
				</button>
				<div class="lightbox-image-container"><div class="extendedBlock-wrapper block-coreImage undefined"><figure class="wp-block-image size-large responsive-image"><img decoding="async" data-wp-bind--src="context.core.image.imageCurrentSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Chrome third party cookies" class="wp-image-2212688" width="1200" height="698" loading="lazy" /><figcaption class="wp-element-caption"><p>In the browser settings (here Google Chrome), you can specify whether you want to allow or block third-party cookies.</p>
</figcaption></figure><p class="imageCredit">Foundry</p></div>
</div>
				<div class="lightbox-image-container foundry-lightbox"><div class="extendedBlock-wrapper block-coreImage undefined"><figure class="wp-block-image size-large enlarged-image"><img decoding="async" data-wp-bind--src="selectors.core.image.enlargedImgSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Chrome third party cookies" class="wp-image-2212688" width="1200" height="698" loading="lazy" /><figcaption class="wp-element-caption"><p>In the browser settings (here Google Chrome), you can specify whether you want to allow or block third-party cookies.</p>
</figcaption></figure><p class="imageCredit">Foundry</p></div>
</div>
				<div class="scrim" style="background-color: #fff" aria-hidden="true"></div>
		</div></figure><p class="imageCredit">Foundry</p></div>



<p>You should also be vigilant when downloading new apps. Check the privacy settings of each new app to control what information it collects and shares. Be especially careful with gaming apps, as they often tend to collect and share data.</p>



<blockquote class="wp-block-quote">
<p><strong>Further reading:</strong> <a href="https://www.pcworld.com/article/406870/best-vpn-services-apps-reviews-buying-advice.html" data-type="URL" data-id="https://www.pcworld.com/article/406870/best-vpn-services-apps-reviews-buying-advice.html">The best VPN services</a></p>
</blockquote>



<h2 class="wp-block-heading toc" id="2-uninstall-unused-apps-from-your-smartphone-tablet-and-computer">2. Uninstall unused apps from your smartphone, tablet, and computer</h2>



<p>The apps on your mobile devices and computers are often more than just little helpers in everyday life &mdash; in many cases they collect a large amount of user data. The more access you have to authorize for an app, the more problematic.</p>



<p>However, before you simply delete unused apps, you should first remove your data from the provider&rsquo;s systems. You can do this as follows:</p>



<ul>
<li>Open the app settings on your device and find out how your data is collected and used.</li>



<li>Switch off all data collection options.</li>



<li>If necessary, log in to the account you created to use the app, delete your personal data, and deactivate or close the account.</li>
</ul>



<p>The next time you download a new app, take a look at the privacy settings first. If an app asks for too much information, it&rsquo;s better to look for an alternative app.</p>



<h2 class="wp-block-heading toc" id="3-delete-old-email-addresses">3. Delete old email addresses</h2>



<p>Of course, this point is only relevant if you have email addresses that you no longer use. However, this is a huge security factor.</p>



<p>Email addresses are an archive of personal information, from private messages and shopping receipts to sensitive banking and health data. A hacked email account can therefore have far-reaching consequences.</p>



<p>To delete an old email account, follow the instructions from your email provider, which you can usually find in the account settings. Before you close an account permanently, you should always back up all important data, such as photos and documents, as an account cannot be restored once it has been deleted.</p>



<h2 class="wp-block-heading toc" id="4-remove-personal-information-from-google">4. Remove personal information from Google</h2>



<p>Google is the world&rsquo;s most popular search engine &mdash; and unfortunately also the biggest data trader (how else could Google offer its many services for free). Fortunately, removing your information from Google search results is relatively straightforward. Here are some ways you can go about it:</p>



<ul>
<li>Contact Google <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://support.google.com/websearch/contact/content_removal_form&amp;xcust=2-1-2212613-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank" rel="nofollow">using a simple online form</a> to remove personal information from search results.</li>



<li>Follow the instructions <a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://support.google.com/websearch/answer/6349986?hl&amp;xcust=2-1-2212613-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" data-type="URL" data-id="https://support.google.com/websearch/answer/6349986?hl" target="_blank" rel="nofollow">in this Google article</a> to remove outdated information or images from websites that appear in Google search results.</li>



<li><a href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://support.google.com/websearch/answer/9673730?hl&amp;xcust=2-1-2212613-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" data-type="URL" data-id="https://support.google.com/websearch/answer/9673730?hl" target="_blank" rel="nofollow">This process</a> allows you to request the removal of specific personal data or content that could be misused for doxing (the wilful publication of personal data to the detriment of the person concerned).</li>
</ul>



<p>Please note, however, that your data can never be 100 percent guaranteed to be removed from the internet, especially if you continue to use social media, your name is associated with a company or you are a well-known personality.  </p>



<h2 class="wp-block-heading toc" id="5-close-old-websites-and-unused-accounts">5. Close old websites and unused accounts</h2>



<p>We&rsquo;ve all been there: We quickly create an account with an online shop for a small discount or free shipping. It&rsquo;s just as easy to create profiles on social media platforms or set up personal blogs. But we often forget about these accounts once they have served their purpose. Our personal data accumulates there &mdash; from our address to payment information.</p>



<p>The first step to cleaning up your digital footprint is to delete such unused accounts. Think about which online shops you really use regularly and delete the others. The next time you make a purchase, it is often better to choose the guest option to avoid accumulating new data unnecessarily.</p>



<p>It&rsquo;s similar with social media accounts. You may have an old Myspace profile or be registered on platforms such as Facebook and Instagram that you no longer use. Even if you haven&rsquo;t been active there for years, your data could still be accessible. Closing such inactive accounts helps to minimise your online presence.</p>


<div class="extendedBlock-wrapper block-coreImage undefined"><figure data-wp-context='{ "core":
					{ "image":
						{   "imageLoaded": false,
							"initialized": false,
							"lightboxEnabled": false,
							"hideAnimationEnabled": false,
							"preloadInitialized": false,
							"lightboxAnimation": "zoom",
							"imageUploadedSrc": "",
							"imageCurrentSrc": "",
							"targetWidth": "none",
							"targetHeight": "none",
							"scaleAttr": "",
							"dialogLabel": "Enlarged image"
						}
					}
				}' data-wp-interactive class="wp-block-image size-large wp-lightbox-container"><img decoding="async" data-wp-effect--setstylesonresize="effects.core.image.setStylesOnResize" data-wp-effect="effects.core.image.setButtonStyles" data-wp-init="effects.core.image.initOriginImage" data-wp-on--click="actions.core.image.showLightbox" data-wp-on--load="actions.core.image.handleLoad" src="https://b2c-contenthub.com/wp-content/uploads/2024/01/Delete-binary-code.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Delete binary code" class="wp-image-2201401" width="1200" height="720" loading="lazy" /><button class="lightbox-trigger" type="button" aria-haspopup="dialog" aria-label="Enlarge image: Delete binary code" data-wp-on--click="actions.core.image.showLightbox" data-wp-style--right="context.core.image.imageButtonRight" data-wp-style--top="context.core.image.imageButtonTop">
				<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewbox="0 0 12 12">
					<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z"></path>
				</svg>
			</button><figcaption class="wp-element-caption"><p>Delete any accounts and pages you no longer use to remove old information about yourself.</p>
</figcaption>		<div data-wp-body="" class="wp-lightbox-overlay zoom" data-wp-bind--role="selectors.core.image.roleAttribute" data-wp-bind--aria-label="selectors.core.image.dialogLabel" data-wp-class--initialized="context.core.image.initialized" data-wp-class--active="context.core.image.lightboxEnabled" data-wp-class--hideanimationenabled="context.core.image.hideAnimationEnabled" data-wp-bind--aria-modal="selectors.core.image.ariaModal" data-wp-effect="effects.core.image.initLightbox" data-wp-on--keydown="actions.core.image.handleKeydown" data-wp-on--touchstart="actions.core.image.handleTouchStart" data-wp-on--touchmove="actions.core.image.handleTouchMove" data-wp-on--touchend="actions.core.image.handleTouchEnd" data-wp-on--click="actions.core.image.hideLightbox" tabindex="-1">
				<button type="button" aria-label="Close" style="fill: #000" class="close-button" data-wp-on--click="actions.core.image.hideLightbox">
					<svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24" width="20" height="20" aria-hidden="true" focusable="false"><path d="M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z"></path></svg>
				</button>
				<div class="lightbox-image-container"><div class="extendedBlock-wrapper block-coreImage undefined"><figure class="wp-block-image size-large responsive-image"><img decoding="async" data-wp-bind--src="context.core.image.imageCurrentSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Delete binary code" class="wp-image-2201401" width="1200" height="720" loading="lazy" /><figcaption class="wp-element-caption"><p>Delete any accounts and pages you no longer use to remove old information about yourself.</p>
</figcaption></figure><p class="imageCredit">Lightspring</p></div>
</div>
				<div class="lightbox-image-container foundry-lightbox"><div class="extendedBlock-wrapper block-coreImage undefined"><figure class="wp-block-image size-large enlarged-image"><img decoding="async" data-wp-bind--src="selectors.core.image.enlargedImgSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Delete binary code" class="wp-image-2201401" width="1200" height="720" loading="lazy" /><figcaption class="wp-element-caption"><p>Delete any accounts and pages you no longer use to remove old information about yourself.</p>
</figcaption></figure><p class="imageCredit">Lightspring</p></div>
</div>
				<div class="scrim" style="background-color: #fff" aria-hidden="true"></div>
		</div></figure><p class="imageCredit">Lightspring</p></div>



<p>Think about your old blogs or websites too. Are they still up to date? Do they show data that you would rather keep private today? Personal information can often be found on old websites and in forums where you used to be active. A regular check and, if necessary, closing or updating these pages can help to better protect your data.</p>



<h2 class="wp-block-heading toc" id="6-remove-your-data-from-data-brokers">6. Remove your data from data brokers</h2>



<p>Data brokers are companies that work behind the scenes and specialize in collecting, bundling, and reselling your personal data. This data ranges from your name and age to more sensitive information such as your health or income. Data brokers track your online activity through social media, apps and e-commerce websites as well as your offline activity through public documents and loyalty cards.</p>



<p>Every time you search the internet, use apps, or interact on social media platforms, you generate data that can easily end up in the hands of these companies. Data brokers use web tracking software installed on most websites and apps to track your online activities such as clicks, page views, and even mouse movements. This information is then used to analyze your purchasing behavior and interests and to classify you into specific consumer categories.</p>



<p>Who buys this data, you may ask? The answer ranges from advertising agencies and political parties to financial institutions and potential employers. This information can be used to target adverts, assess your creditworthiness, or even assess your suitability as a tenant.</p>



<p>But how do you escape this digital surveillance network? One option is to manually remove your data, but this can be very time-consuming as there are countless data brokers out there. A more efficient alternative is offered by services such as <a rel="nofollow" href="https://www.anrdoezrs.net/links/8200811/type/dlg/sid/2-1-2212613-1-0-0/https://www.avg.com/breachguard" data-type="URL" data-id="https://www.avg.com/breachguard" target="_blank">AVG BreachGuard</a> or <a rel="nofollow" href="https://go.skimresources.com?id=111346X1569483&amp;xs=1&amp;url=https://incogni.com/&amp;xcust=2-1-2212613-1-0-0&amp;sref=https://www.pcworld.com/author/florian_kastner/feed" target="_blank">Incogni</a>, which specialize in removing your data from the lists of data brokers. They continuously monitor your online privacy and inform you if your personal data is at risk. However, even these services can only cover some of the data brokers, so some of your data may remain in circulation.</p>



<p><em>This article was translated from German to English and originally appeared on pcwelt.de.</em></p>

<category>Online Services, Security Software and Services</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2212613/how-to-delete-your-personal-information-from-the-internet.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2212613</post-id>		</item>
				<item>
			<title>This clever Windows keyboard shortcut saves you a ton of keystrokes</title>
			<enclosure url="https://www.pcworld.com/wp-content/uploads/2023/10/win11-1.jpg?quality=50&#038;strip=all" length="337472" type="image/jpeg" />
			<pubDate>Mon, 16 Oct 2023 15:37:10 +0000</pubDate>
			<description><![CDATA[
<div id="link_wrapped_content">
<body><section class="wp-block-bigbite-multi-title"><div class="container"></div></section>



<p>How much easier and faster could you do your daily PC tasks if you could simply speak text, rather than typing it? Windows 11 offers a practical key combination for this very purpose, and it works in Windows 10 too.</p>



<h2 class="wp-block-heading" id="secret-dictation-function-in-windows-11-and-10">Secret dictation function in Windows 11 and 10</h2>



<p>If you&rsquo;re lazy like me and would like a simple solution to avoid constant typing on the PC, try the key combination <strong>[WINDOWS]+H</strong> . This activates the start program for voice input as soon as you have opened a text input field (see picture on the left below). Just start speaking and the tool converts your words into text.</p>


<div class="extendedBlock-wrapper block-coreImage undefined"><figure data-wp-context='{ "core":
					{ "image":
						{   "imageLoaded": false,
							"initialized": false,
							"lightboxEnabled": false,
							"hideAnimationEnabled": false,
							"preloadInitialized": false,
							"lightboxAnimation": "zoom",
							"imageUploadedSrc": "",
							"imageCurrentSrc": "",
							"targetWidth": "none",
							"targetHeight": "none",
							"scaleAttr": "",
							"dialogLabel": "Enlarged image"
						}
					}
				}' data-wp-interactive class="wp-block-image size-large wp-lightbox-container"><img decoding="async" data-wp-effect--setstylesonresize="effects.core.image.setStylesOnResize" data-wp-effect="effects.core.image.setButtonStyles" data-wp-init="effects.core.image.initOriginImage" data-wp-on--click="actions.core.image.showLightbox" data-wp-on--load="actions.core.image.handleLoad" src="https://b2c-contenthub.com/wp-content/uploads/2023/10/Spracheingabe-Windows.jpg?quality=50&amp;strip=all&amp;w=1200" alt="Spracheingabe Windows 11" class="wp-image-2105728" width="1200" height="587" loading="lazy" /><button class="lightbox-trigger" type="button" aria-haspopup="dialog" aria-label="Enlarge image: Spracheingabe Windows 11" data-wp-on--click="actions.core.image.showLightbox" data-wp-style--right="context.core.image.imageButtonRight" data-wp-style--top="context.core.image.imageButtonTop">
				<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewbox="0 0 12 12">
					<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z"></path>
				</svg>
			</button><figcaption class="wp-element-caption"><p>Left: Press WIN+H to open the dictation function. Right: Settings menu for microphone and automatic punctuation.</p>
</figcaption>		<div data-wp-body="" class="wp-lightbox-overlay zoom" data-wp-bind--role="selectors.core.image.roleAttribute" data-wp-bind--aria-label="selectors.core.image.dialogLabel" data-wp-class--initialized="context.core.image.initialized" data-wp-class--active="context.core.image.lightboxEnabled" data-wp-class--hideanimationenabled="context.core.image.hideAnimationEnabled" data-wp-bind--aria-modal="selectors.core.image.ariaModal" data-wp-effect="effects.core.image.initLightbox" data-wp-on--keydown="actions.core.image.handleKeydown" data-wp-on--touchstart="actions.core.image.handleTouchStart" data-wp-on--touchmove="actions.core.image.handleTouchMove" data-wp-on--touchend="actions.core.image.handleTouchEnd" data-wp-on--click="actions.core.image.hideLightbox" tabindex="-1">
				<button type="button" aria-label="Close" style="fill: #000" class="close-button" data-wp-on--click="actions.core.image.hideLightbox">
					<svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24" width="20" height="20" aria-hidden="true" focusable="false"><path d="M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z"></path></svg>
				</button>
				<div class="lightbox-image-container"><div class="extendedBlock-wrapper block-coreImage undefined"><figure class="wp-block-image size-large responsive-image"><img decoding="async" data-wp-bind--src="context.core.image.imageCurrentSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Spracheingabe Windows 11" class="wp-image-2105728" width="1200" height="587" loading="lazy" /><figcaption class="wp-element-caption"><p>Left: Press WIN+H to open the dictation function. Right: Settings menu for microphone and automatic punctuation.</p>
</figcaption></figure><p class="imageCredit">IDG</p></div>
</div>
				<div class="lightbox-image-container foundry-lightbox"><div class="extendedBlock-wrapper block-coreImage undefined"><figure class="wp-block-image size-large enlarged-image"><img decoding="async" data-wp-bind--src="selectors.core.image.enlargedImgSrc" data-wp-style--object-fit="selectors.core.image.lightboxObjectFit" src="" alt="Spracheingabe Windows 11" class="wp-image-2105728" width="1200" height="587" loading="lazy" /><figcaption class="wp-element-caption"><p>Left: Press WIN+H to open the dictation function. Right: Settings menu for microphone and automatic punctuation.</p>
</figcaption></figure><p class="imageCredit">IDG</p></div>
</div>
				<div class="scrim" style="background-color: #fff" aria-hidden="true"></div>
		</div></figure><p class="imageCredit">IDG</p></div>



<p>The prerequisite is, of course, that you have a microphone. If you want to select a specific microphone, click on the cogwheel symbol on the left to open the settings of the speech tool (see picture on the right above). There you can select the respective microphone as well as activate automatic punctuation if you do not want to dictate punctuation marks.</p>



<blockquote class="wp-block-quote">
<p><strong>Further reading: </strong><a href="https://www.pcworld.com/article/1981483/using-windows-voice-access-and-dictation.html">I used Windows Dictation to write this article with my voice</a></p>
</blockquote>



		<div class="wp-block-product-widget-block product-widget">
			<div class="product-widget__block-title-wrapper">
				<h4 class="product-widget__block-title" id="get-windows-11-pro-for-cheap-in-pcworlds-software-store">
					Get windows 11 pro for cheap in pcworld's software store				</h4>
			</div>

			<div class="product-widget__content-wrapper">
									<div class="product-widget__title-wrapper">
						<h3 class="product-widget__title" id="windows-11-pro">Windows 11 Pro</h3>
					</div>
				
									<div class="product-widget__image-outer-wrapper">
						<div class="product-widget__image-wrapper">
							<img decoding="async" width="2368" height="1330" class="product-widget__image" src="https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png" loading="lazy" alt="Windows 11 Pro" srcset="https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?quality=50&amp;strip=all 2368w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=768%2C431&amp;quality=50&amp;strip=all 768w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=1200%2C674&amp;quality=50&amp;strip=all 1200w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=1536%2C863&amp;quality=50&amp;strip=all 1536w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=2048%2C1150&amp;quality=50&amp;strip=all 2048w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https://b2c-contenthub.com/wp-content/uploads/2022/05/Windows-Insider-search-bar.png?resize=150%2C84&amp;quality=50&amp;strip=all 150w" sizes="(max-width: 300px) 100vw, 300px" />
						</div>
					</div>
				
				
				<div class="product-widget__information">
												<div class="product-widget__information--rrp-wrapper">
									<span class="product-widget__information--rrp-label">
															</span>
									<span class="product-widget__information--rrp-value">
																</span>
								</div>
								
									</div>
			</div>
		</div>

		


<p><em>This article was translated from German to English and originally appeared on pcwelt.de.</em></p>

<category>Windows</category></body></div>
]]></description>
			<link>https://www.pcworld.com/article/2107167/this-clever-windows-keyboard-shortcut-saves-you-a-ton-of-keystrokes.html</link>
			<post-id xmlns="com-wordpress:feed-additions:1">2107167</post-id>		</item>
		</channel>
</rss>
