We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet MWC 3D Storage IFA
 
2,674 Tutorials

More Security How-To

  • How-Tos: Protect your identity on Facebook

    The past year has seen a sharp increase in fraud and identity theft on Facebook. Here we show you how to minimise the risk of becoming the next victim of clever identity thieves with eight simple steps to using Facebook safely.

  • How-Tos: How to protect your PC against devious security traps

    Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.

  • How-Tos: Your Twitter account has been hacked! Here's what to do about it.

    Kirsty woke up to find that someone else had taken control of her Twitter account. I tell her how to get it back.

  • How-Tos: How to turn on Defender in Windows 8

    Windows Defender protects your PC from spyware and other potentially unwanted programs. Here we explain how to turn it on in Windows 8, XP, Vista and 7.

  • How-Tos: How to use a VPN service

    Whether you are at home or out with a laptop, tablet or smartphone, someone could be spying on your internet activities. Use a VPN to stay safe, secure and anonymous. It can even unlock blocked websites and services. Here we show you how to use the free Hotspot Shield in Windows and SurfEasy for Android.

  • How-Tos: Get rid of malware from PC

    We explain how to remove malware from your PC. Get rid of virus, spyware from your PC or laptop.

  • How-Tos: How to beat web filters

    Here we outline five ways you can beat web filters, including proxies, anonymous networks, and VPNs. Here's how to be anonymous on the web.

  • How-Tos: Parental control on Android

    Kids are increasingly tech-savvy these days, and even a toddler will manage to use your Android smartphone or tablet in ways you didn't know were possible. Apart from running up a heavy bill in app and game purchases, this means your children may also be at risk from online predators and adult content. Here we show you how to set up sensible parental controls, and explain the new restricted profiles feature added to Android Jelly Bean 4.3.

  • How-Tos: Automator workflow of the month: Easily encrypt folders

    You can use Apple's Disk Utility to convert a folder into an encrypted disk image--a protected archive that you unlock with a password. Such images are particularly helpful when you're working on confidential company documents away from the office or when your business card reads: International Person of Mystery. But the truth is that creating encrypted disk images with Disk Utility is cumbersome. Thankfully, with a simple Automator workflow, you can secure documents in an instant. It works like this:

  • How-Tos: How to scan an external hard drive for viruses

    Here's where we show you how to scan an external hard drive for viruses.

  • How-Tos: How David Cameron's web porn filter plan affects you

    David Cameron this week announced plans to force UK consumers to opt-in via their ISP if they want to look at pornography on the internet. But what exactly is the Goverment's web-filtering plan, and what does it mean for you? We explain what David Cameron's internet port filter plan really means for UK consumers.

  • How-Tos: How to use Find My iPhone

    Find my iPhone works with the iPad and iPod touch as well, and can be used to track down your missing iOS device. We show you step-by-step how to set up and use it.

  • How-Tos: Get a disposable email address from MailDrop

    Your email address is like your home address: Never give it out unless absolutely necessary.

  • How-Tos: Switch to Mac: Security basics

    When it comes to your security, the latest versions of Windows and OS X are comparable, but you still have a few key differences and settings to become familiar with.

  • How-Tos: How to find a lost or stolen laptop

    Laptops are easily stolen or lost, so you should consider some form of protection. Tracking services can tell you where it is and even who is using it. We compare popular tracking software including LoJack, Norton Anti-theft and Apple's Find My iPhone

  • How-Tos: How to encrypt your email

    Reader Jack Burns is a bit disconcerted by some recent news. He writes:

  • How-Tos: View your children's browser history

    We explain how to keep tabs on your children's web browsing, even when they delete the browser history.

  • How-Tos: Just how snoop-proof is your Mac?

    Reader Evan Katz wonders just how safe the data on his Mac is. He writes:

  • How-Tos: 8 essential features you need in a business router

    A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.

  • How-Tos: Passwords: You're doing it wrong. Here's how to make them uncrackable.

    For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.


IDG UK Sites

Amazon 3D smartphone release date, price and spec: The hologram phone?

IDG UK Sites

You're never alone with a clone: How the App Store got taken over by copycats

IDG UK Sites

PCs vs consoles: PCs still pwn when it comes to gaming (and everything else)

IDG UK Sites

The art of rebranding: Creative agency The Neighbourhood explains how & why it rebranded