Narrow your search
Scan, repair, and optimize your Windows registry.
Get detailed info about which handles and DLL processes are opened or loaded on your system.
Change all kind of file and folder attributes, date, time, and even NTFS compression.
Recover data lost to viruses, malicious attacks, hardware failures, and operating system crashes.
View and edit photos, Web graphics, animations, movies, game graphics, and icons.
Try this audio grabber that is loaded with features.
Edit XML files with an editor that uses a synchronized table-tree-and-text display.
Update this real time strategy empire building game.
Statistical data modeling tool.
Back up, restore, and manipulate the hard disk's MBR.
The vehicle was traveling well under the 35 mph speed limit -- legally, police in Google's hometown say.
November is National Novel Writing month, when aspiring scribes commit to drafting a new novel. CNET's Eric Mack plans to write his first sci-fi book, and he wants the world to join in the process.
At the tech megacorporation's fall festival of product announcements, Google focused on new devices and services based around its Android 6 (Marshmallow) operating system.
Almost none of the attacks showed a North Korean IP address, although it's not difficult for hackers to hide their origin.
Just in time for the company's next device, the OnePlus 2, the much-ballyhooed original is available to the general public. But is it still a good deal?
"This is for Everyone" showcases how the internet has grown into a place of sharing, learning and discovering.
An FBI official says the agency can't yet prove who was behind the devastating cyberattack on Sony.
Scott Loxley is an Australian man with a mission: he's walking the borders of his home continent, hoping to raise AU$100,000 for a Melbourne children's hospital, all while wearing a stormtrooper costume. Lord Vader might not be impressed by Loxley's huge heart, but we sure are.
Jeff's on vacation, but the show goes on. CNET's how-to expert Dan Graziano drops by to talk about trolling from both sides of the fence.
The geopolitical landscape is ripe for hacks, attacks, and exploits, but just because big breaches are being reported more often doesn't mean you should stop caring.