We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet MWC 3D Storage IFA
 
2,673 Tutorials

More Security How-To

  • How-Tos: How to run Defender in Windows Vista

    Advice on what to do if you can't get Defender to work correctly in Windows Vista.

  • How-Tos: How to shop safely online

    PC Advisor explains the selling regulations that exist to protect your purchase online, and what to do if you are unhappy with a product you have purchased over the web.

  • How-Tos: Keep Your Data in Sync Across Platforms and Devices

    People are no longer tied to any specific location or device as they roam about getting work done on laptops, tablets, or even smartphones. The challenge is to keep everything synced so you can access the same data from each of those platforms.

  • How-Tos: How to prevent Windows Security Center switching itself off

    I'm having problems with Windows Security Center, which keeps switching itself off. I get a warning flag pop-up in the Taskbar, but when I try to activate the service Action Center reports that 'The Windows Security Center service can't be started'. When I restart it in Control Panel Services, Action Center immediately reports it's off again.

  • How-Tos: How to stop a Facebook app posting to your wall

    Third-party apps for Facebook can give the social network plenty of extra functionality. However, many apps insist of posting content, such as gaming updates , on your wall, which can get a little annoying. However, you can remove the app's right to post on your wall.

  • How-Tos: The complete guide to backing up your PC

    Backing up isn't hard to do, but it's definitely a chore. PC Advisor explains the methods most suited to various computing scenarios, and review a range of backup services that make the whole process run like clockwork.

  • How-Tos: How to erase data from an Android phone or tablet

    We show you how to wipe an Android phone or Android tablet so that you can pass on the hardware without giving away your details.

  • How-Tos: How to secure a Google Android phone or tablet

    Whether you paid a small fortune for the hottest Android device or got it for ‘free’ with a modest contract, it’s a good bet that the data stored on your mobile is at least as valuable as the hardware itself. If your phone or tablet is ever lost or stolen, you’ll either be glad you took precautions to protect all your content, or you’ll sorely wish you had. In this article, we’ll walk you through setting up Android’s built-in security tools and suggest a few third-party extras that can add valuable safeguards for your personal information.

  • How-Tos: How to block someone on Facebook

    With more than 500 million members, there's no doubt Facebook is one of the web's most popular social networks. But what happens if someone starts harassing you or causing problems from you on the site. Rather than remove yourself completely, you can in fact block the specific offender, so they are unable to contact you through the social network. Here's how.

  • How-Tos: Remove Windows Defender

    Windows Defender isn't in Control Panel's list of uninstallers. Spiritchaser asked the Answer Line forum how to remove it.

  • How-Tos: How to turn off location services on an Apple iPhone

    Scared that Apple is tracking your iPhone? Here's how to switch off location services.

  • How-Tos: How to access Facebook using a secure connection

    Facebook has improved user account security by providing the option to access the social network through a secure HTTPS connection. With more and more of us using Wi-Fi hotspots to access social networks, this secure mode is a useful means to protect our information.

  • How-Tos: How to limit access to your Facebook profile

    We all know the dangers of giving away too much information about our personal lives on social-networking sites such as Facebook, so it's important to accept friend requests only from people you know and trust, locking down your profile from strangers. But sometimes this isn't enough, and we want to keep certain details from particular groups of friends - that our boss or our mum might see dubious holiday snaps or messages written on our Facebook Wall is a daunting thought.

  • How-Tos: How to deal with the PlayStation Network hack

    Sony has warned that hackers may have obtained PSN users' personal details, potentially including credit card information. How can you tell if you've been affected, and what should you do now?

  • How-Tos: How to beat latest security threats from Avast, Apple and Microsoft

    We're only halfway through April and there are already too many vulnerabilities to count. This month avast! released a false-positive virus definition that affected a number of innocent websites. Then, for their monthly Tuesday patch, Microsoft released 17 new security bulletins which addressed 64 vulnerabilities. Also, two days later, Apple released four security updates which cover software updates for iOS 3.0 through 4.3.1, Safari 5.0.5, and a security update to the Certificate Trust Policy for iOS.

  • How-Tos: How to avoid backup disasters

    Don't get caught out and lose all your emails and digital music. Here are some essential tips to keep your well-planned backup from going astray.

  • How-Tos: How to stop your boss spying on you

    If you use a company-supplied PC on a corporate network and carry around a company smartphone, you're almost certainly being watched. But with a bit of forethought and these tips, you can enjoy a little digital liberty in the workplace.

  • How-Tos: How to communicate your firm's security strategy

    Security professionals often lament the way they are perceived. But there's a reason for that. Here are seven communication failures that are common among security experts, and how you can effectively communicate your security strategy within a business.

  • How-Tos: How to tell if you have a freeloader on your Wi-Fi network

    If a stranger successfully gets onto your Wi-Fi network, they may be stealing more than bandwidth. After all, they have access to your computers. Your home network should be more secure than the café's down the street. But how you can tell if you have a freeloader on your home network?

  • How-Tos: How to monitor your employees' PCs

    Do you know what your employees are doing on the web? At a minimum, they're probably goofing off watching YouTube videos. At worst, they could be steering your company toward financial ruin. In this quick guide, I'll show you how to keep an eye on employee internet use and monitor just about everything else they do with their PCs.


IDG UK Sites

Samsung Galaxy Note 4 release date, price and specs 2014

IDG UK Sites

iOS 8 features wishlist: the changes iPhone and iPad users want in Apple's iOS 8

IDG UK Sites

25 Years of the World Wide Web: Happy Birthday, Intenet

IDG UK Sites

Developers get access to more Sony camera features