Advanced Search on Reddit Like a Pro

Over the past decade, Reddit has gone from a simple Digg competitor to a complete replacement for a large portion of the internet’s forum and chat communities.

Today, with over 26 million active users, it’s the go-to social news and discussion platform. If you don’t use Reddit, you’re missing out on a wealth of breaking information and some very interesting conversations.

The good news is, if you’re just recently
joining Reddit, there’s a backlog of millions of posts for you to search
through! Want to know tips for getting started on the keto diet? Reddit’s got
them. Need information on which credit card is the best option for a teenager?
Reddit can help. However, finding exactly what you’re looking for requires you
to know a few tricks.

In this article, let’s go over Reddit’s
advanced search operators and learn how to navigate through Reddit’s search
like a pro.

Keyword Search Operators for

Reddit’s keyword search operators use terms
that tell the text thereafter how to filter results. Using them is the most
advanced way to narrow down your search to the content you’re looking for.
There are currently nine of these, all shown below.


The “title” search operator limits
results to posts where the text thereafter (requiring quotation marks if more
than one word) is found within the title. This can be used as a way to find
entire threads about a particular topic.


The “author” search operator limits
results to posts made by a specific user. This is not case sensitive.


The “selftext” search operator limits results
to self-posts where the text thereafter (requiring quotation marks if more than
one word) is found within the body. This can sometimes behave strangely when
used with more than one word, even if wrapped in quotation marks.


The “url” search operator limits results to
link posts that contain the exact URL thereafter. This can sometimes return a
small percentage of link posts that don’t match the URL.


The “site” search operator limits results to
link posts that contain URLs that belong to a specific domain name.


The “nsfw” search operator allows you to
toggle showing (with “yes” or “1”) or hiding (with “no” or “0”) NSFW posts.


The “self” search operator allows you to
toggle showing (with “yes” or “1”) or hiding (with “no” or “0”) self-posts.


The “subreddit” search operator limits results
to posts made within a specific subreddit.


The “flair” search operator limits results to
posts tagged with a certain flair text.

Boolean Search Operators for

Reddit’s boolean search operators use strict
conditions to limit search results. I’ve noticed that these operators do not
seem to work properly when using Reddit’s new design, so you’ll need to revert
to the old design if you want to make use of these.


The “AND” search operator limits results to
posts that include both terms. This works by default for basic query searches,
meaning you don’t have to use it, but this may be required in advanced cases
where several different operators are used.


The “OR” search operator limits results to
posts that include either term. You must surround a term with quotation marks
if it contains more than one word.


The “NOT” search operator limits results to
posts that do not include the text thereafter. You must surround a term with
quotation marks if it contains more than one word.

The best part about Reddit’s advanced search
operators is that they can be used together! By surrounding each operator in
parentheses, you can string together a long set of conditions that can help you
narrow down millions of posts to just a small handful.

Another big tip is to try your search using
both the new and old Reddit designs. For some reason, certain operators seem to
behave differently across each. As noted above, the boolean operators actually
only work while using the old design. While Reddit clearly hasn’t ironed out
all of the kinks in their search feature, there’s no doubt that with the dozen
operators listed above, searching through Reddit is a breeze.

Curious to know how you can use similar tricks with Google’s search? Check out our article on Google search operators.

Advanced Search on Twitter Like a Pro

Did you know that Twitter churns through over
500 million tweets per day? While plenty of that is content that you and I
might not care about, if even 1% interests us then we’ve got a never-ending
supply of fresh material on our hands! However, how are we supposed to go
through millions of tweets on a daily basis? The answer is a bit cliché—very
carefully, of course.

Twitter is very generous with the number of search operators that it supports. These operators allow us to dig down and search through videos, images, retweets, lists, and much more.

However, most of us aren’t taking advantage of these and are only performing simple keyword-based searches. When you’re searching for something specific, that just doesn’t cut it.

In this article, let’s go over Twitter’s many
different search operators and learn how to narrow our searches down to get the
exact content we’re looking for.

Basic Search Operators for

Twitter’s most basic search operators are a
set that you expect out of most search engines. The ability to exclude certain
terms and search for an exact phrase are things we’ve come to expect, and
Twitter doesn’t sell us short.

“” (quotation marks)

The quotation marks search operator limits
results to tweets that contain an exact phrase. This is not case sensitive, and
it’s the default behavior for single-word search terms.

– (hyphen)

The quotation marks search operator limits
results to tweets that do not include the term thereafter. This operator can’t
be used by itself, and you must surround the term with quotation marks if it
uses more than one word.

? (question mark)

The quotation marks search operator limits
results to tweets that contain a question.


The “OR” search operator limits results to
tweets that include either term. You must surround a term with quotation marks
if it uses more than one word.

Interaction-Based Search Operators
for Twitter

As a social media site that revolves heavily
around communicating with others, Twitter supports multiple search operators
that allow us to filter through user interactions. These include mentions,
replies, and lists.

@ (“at” sign)

The “at” sign search operator limits results
to tweets that mention the Twitter user thereafter.


The “to” search operator limits results to
tweets that are directed to or made in reply to the Twitter user thereafter.


The “from” search operator limits results to
tweets that are sent by the Twitter user thereafter.


The “list” search operator limits results to
tweets that are sent by members of the Twitter list thereafter. This requires
both the username of the Twitter user who owns the list and the list’s URL

Filter-Based Search Operators for

Some of Twitter’s most powerful and specific
filtering options revolve around the “filter” operator. With this operator, we
can narrow down tweets by what type of media they contain, when they were
tweeted, and which sites they link to.


The “filter:safe” search operator limits
results to tweets that are marked as safe and not potentially sensitive. This
operator can’t be used by itself.


The “filter:media” search operator limits
results to tweets that contain an image or video. This operator can’t be used
by itself.


The “filter:retweets” search operator limits
results to tweets that are not retweets. This operator can’t be used by itself.


The “filter:native_video” search operator
limits results to tweets that contain video from Amplify, Periscope, or Vine.
This operator can’t be used by itself, and you can also filter specifically by
video platforms with “filter:periscope” and “filter:vine”.


The “filter:images” search operator limits
results to tweets that contain images. This operator can’t be used by itself,
and you can only search for natively-hosted images with “filter:twimg”.


The “filter:links” search operator limits
results to tweets that contain links. This operator can’t be used by itself and
will include tweets with comments on a retweet that contains a link.


The “url” search operator limits results to
tweets that contain a link including the text thereafter. This operator can’t
be used by itself.


The “since” search operator limits results to
tweets that have been tweeted after the date thereafter (year-month-day
format). This operator can’t be used by itself.


The “until” search operator limits results to
tweets that have been tweeted after the date thereafter (year-month-day
format). This operator can’t be used by itself.

A great trick you can use is combining the
hyphen search operator with any of the “filter” operators. This will allow you
to do things like search for tweets that don’t contain images or contain
potentially sensitive material. Stringing together more than one operator can
really laser-focus your search to the exact results that you’re looking for.

Get creative when you’re searching through
Twitter! Your search is only limited by your mastery of Twitter and these
search operators, and there are billions of tweets for you to browse through.
You’re guaranteed to find something that will surprise you.

Want to know how you can achieve these same results with Google’s search? Check out our article on Google search operators.

What is Cryptojacking and How Do I Stop It?

You know about malware and ransomware. You know what a computer virus is and probably had one. But do you know about cryptojacking?

Cryptojacking is a bit like ransomware, but stealthy and potentially worth more money to the criminals that use it. While ransomware takes your data hostage until you pay the ransom, cryptojacking uses your computer or phone’s resources to mine cryptocurrencies like Monero or Ethereum.

You may never know that it is there. The only thing you might notice is that your computer isn’t working as well or fast as it used to.

Why is Cryptojacking a Big Deal?

You might be thinking, “If I won’t even notice
cryptojacking, it doesn’t cost me anything, and it doesn’t harm anything, why
should I care?”

The money made from these sorts of criminal operations don’t
just go to hacker’s living in the basement buying expensive booze and fancy
watches. The money could be supporting organized crime or state-sponsored

According to, over 81% of hacking events in 2018 were cybercrime based and almost 3% were classified as cyberwarfare. They’ve got to pay for all that hacking somehow.

How Does Cryptojacking Malware Get on a Computer?

Cryptojackers invade your computer in several ways. Sometimes you can get it from opening an infected attachment in an e-mail or clicking on a phishing link on a website. Or it might show up inside of a browser attachment that you installed for a legitimate reason.

That’s like the traditional way that viruses were spread. If the cryptojacker gets on your computer this way, it will run in the background on your computer all the time, quietly digging up cryptocoins.

The drive-by cryptojacking is more devious. It will hide on
a website or in an ad just waiting to show up on your computer. Then it will
start mining with your computer if you are on that website or that ad is
showing.  The cryptojacker is unloaded
when you leave the site, leaving no trace that it was ever there.

Do I Have a Cryptojacker on My Computer or Phone?

It used to be obvious. Your CPU usage would spike to near 100% and your computer would crawl when you only had maybe one program open or just browsing a website.

Hackers using cryptojackers are getting wiser though and it
will get harder and harder to stop. When they first started, they would consume
as much of your CPU power as they could. This alarmed people to its existence
though. Now, they’re using less resources on any single computer, but trying to
hit as many computers as possible.

How Do I Stop Cryptojacking?

Keep practicing good computer security and use your smartphone’s security features. Make sure you’re using an antivirus app, keep your operating system up to date, and allow your browser to update freely.

Most major security apps have cryptojacker detection and protection now. Look at getting antivirus and security apps like ESET, Avast!, or Norton.

If you want to make sure a drive-by cryptojacker isn’t running in your browser, you can try extensions for Chrome like Coin-Hive Blocker, No-Coin, or minerBlock. Try No-miner or minerBlock for Firefox. All major browsers are continuing to bake-in security features with each update, so let those updates happen.

Is There a Good Use for Cryptojacking?

There might be. It could be used as an alternate revenue
source to support web sites and apps. Some sites will ask you if they may use a
javascript-based cryptominer on your computer while you’re on their site, some
will not.

The Pirate Bay,,, and others have tried
this in the past. People did not respond well. As a method of revenue
generating, it appears to have small gains for the high cost of user

The Future of Cryptojacking

Is cryptojacking going to be an ongoing threat? If cryptocurrencies
continue to have real world value, it will. But how much of a threat will it be
to you?

Hackers are getting wiser. They’re realizing that stealing
pennies from millions is much harder to stop than stealing thousands from a
few. Cryptojacking will be a minor nuisance to you and your computer use. The
social cost from it being used to fund more evil schemes may continue to grow.

Do what you can to stop it. Keep your antivirus up to date
and continue to update your operating system and browser. If most of us can do
that, we’ll keep cryptojacking a minor threat.

7 Ways to Print Documents When You’re Out of the House

Printing when you’re on the road is never a simple matter.
Where you choose to print depends on when you need your printed document.

If you only need to pick up your printout when you get home,
printing over the Internet to your home computer is the way to go. This is
possible from either your laptop or your cellphone.

However, if you need a printout immediately, there are lots
of kiosks and printing centers around the country where you can send your
printout and pick it up immediately.

In this article, you’ll learn about all the options
available to print documents whenever you’re out of the house.

1. Using Google Cloud Print

One of the best services ever offered by Google is Google Cloud Print. This service lets you safely and securely connect your wireless printer to the Internet. Once connected to the Google Cloud Print service, you can use your Google account to print anything from your laptop or your smartphone.

Setting up this service is very easy if you have a printer supported by the service. Just visit the Google Cloud Print page to get started. You’ll need to log into your Google account if you haven’t already.

If this is your first time setting up one of your printers
with Cloud Print, click Add a
Cloud-Ready Printer
to see if your model of printer is compatible.

If your printer isn’t a Cloud-Ready model, then click Add a Classic Printer to see the setup
instructions for adding a regular printer to Google Cloud Print (see simple
instructions below).

Connecting Your Computer to Google Cloud Print

To set up your Google Cloud ready printer:

  1. Make sure your computer is turned on
  2. Open your Chrome browser, click the three dots
    in the upper-right, and select Settings.
  3. Scroll down and select Advanced.
  4. Scroll down further to Printing and expand Google
    Cloud Print
  5. Select Manage
    Cloud Print Devices

You may be prompted to sign into your Google account. If you
see the cloud-ready printer that your computer is already connected to, click
the Register button. Otherwise,
under the Classic Printers section, click the Add printers button.

If you register a cloud-ready printer, you’ll need to confirm the registration on the printer itself. Adding a classic printer will detect printers connected to your computer and walk you through a wizard to add them to Google Cloud Print.

Printing to Google Cloud Print

Once you’ve set up your printers on Google Cloud Print,
using the service is very easy.

In the Google Chrome browser, you can print as you normally do by clicking the three dots in the upper right and selecting Print.

You’ll see the Google Cloud printer available to print to
along with its internet address.

Select this printer and click the Print button to print.

Having a Google Cloud Print connected computer, you’ll see
the same printer available on different Google services like Google Docs,
Google Sheets, and Gmail. It’ll also let you print from your Chromebook if you
own one.

On your mobile phone, printing is typically available under
the Share feature in different apps.

When you choose the Print option, you’ll see your new cloud
printer available.

Send your printout to that printer, and it’ll show up on
your home printer, no matter where in the world you are.

2. Set Up a Home VPN

Another, slightly more complicated solution to print to your
home printer from anywhere is setting up a VPN network you can connect to from
the internet.

You can do this using a hidden VPN service included with
your Windows 10 computer. You’ll need to follow this procedure from your
computer that has access to print to your home printer.

First, you’ll need to allow users to connect to your
computer through the internet.

Open the Control Panel and select Network and Sharing Center. Select Change Adapter Settings and press Alt-F on the keyboard.  Select
New Incoming Connections.

Enable the user accounts you want to give access to, or
create a new ID and Password you want to use to allow incoming connections.

Click Next and
enable Through the internet.

Click Next to finish off the Wizard. You’ve now provided access to your
computer through the network via VPN.

Next, you’ll need to log into your home network router and add port forwarding for VPN connections. If this sounds hard, read our post on understanding what port forwarding is and how to setup port forwarding. Make sure to use port 1723 if using PPTP. LT2P uses port 1701.

The Windows VPN uses PPTP so
select that as the service. Type the internal IP of your computer that’s
connected to the printer for the Server IPv4 Address, and leave all other
fields as is.

Now, when you want to connect to your computer for printing,
you can connect to it via VPN. First, click the Start menu and type VPN. Click on VPN Settings.

Click on the plus icon to add a new VPN connection.

Before you can fill out the fields, you’ll need your computer’s public IP address. You can see this by visiting a site like

Fill out the VPN form as follows:

  • Provider:
    Windows (built-in)
  • Connection
    : Name the connection anything you like
  • Server
    name or address
    : Give this your computer’s public IP address.
  • User name
    and password
    : Provide the ID and Password you created when you enabled
    Internet access to your computer.

Once you’re done setting this up, you’ll see the VPN
connection listed in the VPN settings window. Just click connect while you’re
connected to the internet away from home to connect to your home computer. Once
connected, you’ll have access to all the network devices, like your home

There are several issues that may cause a VPN setup like
this to not work. Your virus software, firewall settings, or other computer
security settings could block the connection.

3. User Free PrinterShare Software

Another solution that’s a whole lot simpler than trying to
figure out what security settings is blocking your VPN connection is just
installing free software that will share out your connected printer to the

Install the PrinterShare software on a computer on your home network. To use the web printing option, you’ll need to create a free PrinterShare account and password.

The software will randomly generate a user account number
that will display in the software. Remember this ID, and the password you
configured for it.

Launch the software on the computer and share the printer
that you want to allow internet printing to.

Install the PrinterShare application on the second computer
that you’re using outside of your home. Next time you run the software while
you’re sitting in an internet café somewhere, you’ll see the printer you shared
under the Remote Printers list.

Now, when you try to print a document or anything else on
your computer, you’ll see the PrinterShare printer available under your list of

Printing to this printer will send the print over the
internet to the printer connected to your other computer on your home network.

As you can see, you don’t have to configure the router or
change any security settings. The print is transmitted directly over the
internet via the internet connection on your home computer.

4. Online Printing Services

If you don’t mind spending some money and you won’t need the
printout for a few days, you can order printouts online.

There are several services where you can upload documents
and have the service print them and mail them to you.

A few of these services include:

  • PrintDog: Order anything from brochures and greeting cards to posters or color and black and white document copies. Prices are very reasonable at just a few cents per page for regular documents.
  • UPrinting: You can use this service to print regular documents. But you can also order flyers, posters, brochures and more. You can even order a design printed on t-shirts or mugs.
  • Best Value Copy: If you just want fast and cheap copies, this is probably the best service for it. Prices are just a few cents a page at a flat rate. There’s also no minimum order, so if you want to just print a few pages, you can.

5. Shipping Print Kiosks

If you want your document printouts immediately, using a
local shipping service is the best option.

These companies offer either web-based file transfers, or
you can transfer documents from your computer using a memory stick to a
computer in the shop. There, you can use their printer to print out your

A few of the most popular print kiosks you’ll find all
around the country (and in some cases the world) are the following:

  • UPS: You either print online or at your local UPS shipping center.
  • FedEx: Print using their website and pick it up at a local FedEx center.

6. Local Print Shops

Beside large shipping services, there are also lots of print
shops around the world where you can bring in a memory stick with your
documents on it and print those documents for very cheap per-page prices.

A few of these include:

  • Staples: Use the website to find a Staples print center near you.
  • Office Depot: Do in-store document printing quick and easy.
  • CVS: Visit the CVS photo center where you can also print documents.
  • Costco: If you have a Costco membership, visit a location for your document printing needs.

7. Your Local Library

One of the most overlooked resources is the local library.
Almost every town in the country has a library. Even the smallest libraries
offer printing services for their patrons.

Usually, you can buy a card that works on the printer and
you load the card with a set amount of money that you can use to make copies.
Modern printers at libraries have a memory card slot so you don’t even need a
computer to print to the library printer. Or, you connect to the library
network and print to the printer that way.

Usually, library printing services are dramatically
discounted from the prices you’ll find at commercial printing centers.

Wiping a Hard Drive in 4 Easy Steps

When it’s time to
sell your computer, you’d want to wipe out the hard drive completely. After
all, you don’t want to leave any personal or work-related files that other
parties could exploit. In this post, we’ll show you how you can delete all the
data in your PC permanently.

Deleting vs Wiping Data

Anyone can delete
data. Moving items to the Trash Bin is not hard to do. But that’s not the same
as wiping data. A deleted file can be recovered through a file recovery program
or hardware. Formatting a hard drive before selling is good practice but even
that won’t be enough to wipe out data.

That said, you
need to be sure that you want to wipe out your hard drive before you proceed.
You will no longer be able to recover the wiped data after the process is complete.

Wiping Your Data

Follow the
instructions below to wipe data off your Windows 10 computer.

1: Do some prep work

Before you begin,
you need to prepare for the hard drive cleanup. Here are some of the things you
will need.

Data destruction software

You need to do some research. Some sanitization software can only wipe hard drives but not SSDs (solid state drives). You should also look for software that can work on bootable drives like flash drives if you’re wiping the entire computer.

We have already written an in-depth guide on the 5 best hard drive wiping utilities, so read that after you finish this article.

Data Backup

Needless to say,
back up all important files before you proceed. You can copy-paste all your
data to a temporary location outside of the drive you’re wiping.

Explore your
backup options. In Windows 10, go to Windows
> Update & Security
> Backup. Here you’ll find
several options for backing up your files.

Product Information

Be sure to have
all your product information on-hand. Make sure you secure serial numbers for
your Windows 7 OS, for example. You will need those if you’ll be reinstalling
software on another machine down the line.

Bootable Disk

You will need a
dedicated USB drive for your data destruction software. You won’t be able to
run an application in your computer if you’re wiping it clean. That’s why you
need to save the program on an external drive. Saving it on a CD would also

Most sanitization
programs are saved as an ISO image file. Simply copy-pasting the ISO file
wouldn’t work. Look into how to burn an ISO file to a CD or flash drive if
unsure how to continue.

Step 2: Do a Windows Reset First

Go to Windows Settings > Update & Recovery > Recovery. Under Reset This PC, click Get

You will then be
asked to choose an option. You can either keep all your files or remove
everything. Click Remove Everything.

Windows will
proceed to delete all your files.

Note: If asked whether you’d
like to not only remove files but also clean the drives, select Remove Files and Clean the Drive.

Step 3: Run the Data Wiping Program

Each program runs
differently but most come with easy-to-follow instructions. You will likely
need to reboot your computer to run the program. Insert the CD or flash drive
and then restart your PC. As it restarts, your PC should give you access to the
data destruction software.

If you’re having
trouble loading the program, you’ll likely need to make some changes in your
BIOS settings.

To access BIOS,
go to Windows Settings > Update and Security > Recovery. Under Advanced Startup, click Restart

On the next
screen, go to Troubleshoot > Advanced Options > Select UEFI Settings > Restart. This will open BIOS after the
system reboots.

interface will vary depending on what motherboard you use. However, all BIOS
will allow you to revise the boot order. Edit the order to prioritize CD/DVD or
removable devices. This will let your computer run the content of your CD or
flash drive respectively.

Step 4: Physically Wipe the Hard Drive (optional)

If there are no
plans to use the hard drive again, you should consider physically wiping it.
You can use a rare earth metal to do so. Others resort to dismantling the drive
by screwing it apart before disposing of the entire thing.