We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: How to delete cookies and web browsing history

    We explain all you need to know about cookies and how to delete cookies and browsing history in Internet Explorer, Chrome, Firefox and Safari.

  • How-Tos: How to Test the Security Savvy of Your Staff

    How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

  • How-Tos: One tweak can make your Windows PC virtually invulnerable

    Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.

  • How-Tos: Can a hacker use a brute-force attack to steal an online password?

    Harish Kumar asked if a brute force attack--which tries random text strings until one turns out to be your password--would work on major websites. "Will Facebook allow millions of failed attempts?"

  • How-Tos: How to set up Google Chrome Supervised users

    Google offers a few tools and options to make browsing the web safer, but a new feature – supervised users – introduced recently on Chromebooks and also available on the Chrome browser makes things better. Here’s how to set it up and keep your kids from seeing inappropriate material online.

  • How-Tos: Protect your PC in the web's worst neighborhoods

    Your data. Your wallet. Your identity. In the darker corners of the internet, it's all fair game, and disaster could be one unwitting click away. Protect yourself by learning about the web's most common dangers, and how to avoid them. Also, take some basic steps to make your PC more resistant to harm.

  • How-Tos: How to remove Google redirect virus

    Why it is that your web browser redirects to what appears to be the Google home page, and how to stop it doing so. Here's how to remove the Google redirect virus.

  • How-Tos: How to hide from Google and keep your stuff private

    You may or may not know the extent to which Google and other companies collect your information and follow your around the web, and even your physical location. Here are 11 ways you can stop hemorrhaging your details.

  • How-Tos: How to find out if someone has been snooping in your Gmail

    Your Gmail account probably contains some sensitive information--emails from your friends and family members, information about accounts for other services, candid pictures, you name it. What if someone else has been poking around in there? Fortunately, Google gives you the tools necessary to find out.

  • How-Tos: What is eye symbol in Windows 8 password boxes?

    A new feature in Internet Explorer and Windows 8 allows you to see password characters as you type them in. It is a symbol that looks like an eye. Here's what it is and how to use it.

  • How-Tos: How to keep your neighbors from hijacking your Wi-Fi

    Rose's Internet service intermittently slows to a crawl. She wants to make sure that her neighbors haven't hacked her Wi-Fi for free connectivity.

  • How-Tos: How to recover files after a malware attack

    Malware infected Jones888's computer, and important files are no longer accessible. How can Jones get them back?

  • How-Tos: How to rescue your PC from ransomware

    With the nasty CryptoLocker malware making the rounds--encrypting its victims' files, and then refusing to provide the unlock key unless a payment of $300 is made via Bitcoin or a prepaid cash voucher--ransomware is back in the spotlight.

  • How-Tos: Smart (and easy) resolutions for a happy, high-tech 2014

    Even if you don't do New Year's resolutions, flipping the calendar to a fresh year is a great time to take stock of your tech habits and brush them up as needed. Unlike resolutions you have to keep all year, like working out every day, most of these technology pledges are set-it-and-forget-it. We know you're a super-smart person and you're probably doing all this stuff already, but it never hurts to double-check.

  • How-Tos: How to stop CryptoLocker infecting your PC

    We explain what is CryptoLocker. Plus: how to stop CryptoLocker stealing your data.

  • How-Tos: How to encrypt your data in the cloud

    Concerned that your online data in Dropbox or Google Drive might be open to attack? We show you how to banish those fears by encrypting your cloud-based documents.

  • How-Tos: 5 Tips to Keep Your Data Secure on the Cloud

    The number of personal cloud users increases every year and is not about to slow down. Back in 2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by 2014. And it's happening.

  • How-Tos: How to make a Facebook account private

    This is where we show you how to make your Facebook account private. Follow these quick and easy steps and you will be able to control exactly who sees what on your Facebook account.

  • How-Tos: Bugs and Fixes: updates to Windows iTunes, Java, and Internet Explorer

    Update, update, update: Form that habit now, if you haven't already, to keep up with security fixes. The latest include the usual tweaks to fend off malicious attacks, and a fix to Java that should prevent it from disabling itself constantly. That would be nice.

  • How-Tos: Save your Internet bacon with two-factor authentication

    Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.


IDG UK Sites

Windows 10 launch event as it happened: Read our Windows 10 launch live blog - find out first as...

IDG UK Sites

Windows 9 and the death of the OS as a must-have product

IDG UK Sites

Video trends: 4K is here – HDR video, VR and 3D audio is coming

IDG UK Sites

Best iPhone 6, iPhone 6 Plus deals: iPhone 6, iPhone 6 Plus tariffs, contracts and prices UK