We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: How to use System Restore in Windows 8

    System Restore is one of the features that makes Windows worth having - the ability to roll back Windows to a point where you know it was working well can rescue your PC or laptop from all manner of ills. You can quite literally restore a laptop to a previous date, a date at which you knew it was working well. Here's how to use System Restore in Windows 8.

  • How-Tos: How to turn on Defender in Windows 8

    Windows Defender protects your PC from spyware and other potentially unwanted programs. Here we explain how to turn it on in Windows 8, XP, Vista and 7.

  • How-Tos: How to dispose of a laptop or PC

    What do you do with a laptop or PC that’s come to the end of its life? We explain everything you need to know about recycling, selling and ensuring your personal data is removed

  • How-Tos: How to Protect Personal, Corporate Information When You Travel

    Before flying from Rome to Philadelphia earlier this summer, I stopped in the hotel lobby to print my boarding pass. The hotel had one computer dedicated solely to this task. It was the only public computer available to guests. I could access only airline websites and input my name and confirmation number for the ticket. That was it.

  • How-Tos: How to create an anonymous email account

    A reader recently asked me how they could use aliases in Outlook.com to create an anonymous email account. My answer was simple: you really can't.

  • How-Tos: Take precautions when using Gmail--or any other email service

    G. Jitchaku asked me if Gmail was "safe." That's a very broad question, so I'm offering a very broad answer.

  • How-Tos: How to achieve better third-party security: Let us count the ways

    No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties -- outside vendors, contractors, affiliates, partners and others.

  • How-Tos: How to protect yourself against privileged user abuse

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • How-Tos: Five questions to answer before paying for a VPN

    If you work on a computer or mobile device away from home, you probably use Wi-Fi hotspots in hotels, cafés, restaurants, airports, or on campus. The problem is, there is no way to know exactly how secure those networks are.

  • How-Tos: Top 10 fixes for common PC problems: The best of PCWorld's Answer Line

    I've been answering questions from PCWorld readers since 1997, and I think I've read about every problem that Windows and PC hardware can provide.

  • How-Tos: Six ways to prevent a breach like the one at AT&T

    A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

  • How-Tos: You've fallen for a scam! Now what?

    Cybercriminals tricked Fred into giving away sensitive information. Now he wants to know how "to mitigate this situation?"

  • How-Tos: How to protect your PC from GOZeuS and Cryptolocker

    The UK’s National Crime Agency along with the FBI, Europol and various tech firms have worked together to temporarily pause the attacks from the Cryptolocker and GOZeus malware. Here’s what you need to know about keeping your PC and data safe.

  • How-Tos: Microsoft phone scam: don't be a victim

    If you receive a phone call from a security 'expert' offering to fix your PC - it's a scam. Here's how to avoid the Microsoft phone scam, and what to do if you fear you have fallen victim to it.

  • How-Tos: How to deactivate or delete your Facebook account

    If you're fed up with Facebook, you might decide that you want to delete your account. You can choose to temporarily delete your Facebook account or permanently delete your Facebook account, depending on your reasons for leaving. Here, we guide you through both options.

  • How-Tos: How to send secure messages and encrypted emails

    We explain how to send sensitive information via email and messenger app. How to send secure emails, how to send secure messages.

  • How-Tos: How to change your eBay password

    eBay has been in the news this week following confirmation that its database containing encrypted passwords and other data has been hacked. To protect your eBay account you need to reset your password; here's how to change your eBay password.

  • How-Tos: Get two-factor authentication on the desktop with Authy

    One of the best security precautions you can take to protect your online accounts is to enable two-factor authentication on any service that supports it. This requires you to enter a short, one-time code to access your online accounts after you've entered your password.

  • How-Tos: How to set up a VPN

    You can use a VPN to stay safe, secure and anonymous online as well as to pretend you're in a different country - useful if you want to access otherwise blocked websites and services. Here we show you how to use the free Hotspot Shield in Windows and SurfEasy for Android.

  • How-Tos: How to remove unwanted browser toolbars

    We show you how to disable and delete those unwanted and annoying web browser toolbars, including Snap.do, however they got onto your PC or laptop.Updated: 9th May 2014


IDG UK Sites

Best Black Friday 2014 tech deals: Get bargains on smartphones, tablets, laptops and more

IDG UK Sites

What the Internet of Things will look like in 2015: homes will get smarter, people might get fitter

IDG UK Sites

See how Trunk's animated ad helped Ade Edmondson plug The Car Buying Service

IDG UK Sites

Yosemite tips: Complete Guide to OS X Yosemite