We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: How to keep your neighbors from hijacking your Wi-Fi

    Rose's Internet service intermittently slows to a crawl. She wants to make sure that her neighbors haven't hacked her Wi-Fi for free connectivity.

  • How-Tos: How to recover files after a malware attack

    Malware infected Jones888's computer, and important files are no longer accessible. How can Jones get them back?

  • How-Tos: How to rescue your PC from ransomware

    With the nasty CryptoLocker malware making the rounds--encrypting its victims' files, and then refusing to provide the unlock key unless a payment of $300 is made via Bitcoin or a prepaid cash voucher--ransomware is back in the spotlight.

  • How-Tos: Smart (and easy) resolutions for a happy, high-tech 2014

    Even if you don't do New Year's resolutions, flipping the calendar to a fresh year is a great time to take stock of your tech habits and brush them up as needed. Unlike resolutions you have to keep all year, like working out every day, most of these technology pledges are set-it-and-forget-it. We know you're a super-smart person and you're probably doing all this stuff already, but it never hurts to double-check.

  • How-Tos: How to stop CryptoLocker infecting your PC

    We explain what is CryptoLocker. Plus: how to stop CryptoLocker stealing your data.

  • How-Tos: How to encrypt your data in the cloud

    Concerned that your online data in Dropbox or Google Drive might be open to attack? We show you how to banish those fears by encrypting your cloud-based documents.

  • How-Tos: 5 Tips to Keep Your Data Secure on the Cloud

    The number of personal cloud users increases every year and is not about to slow down. Back in 2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by 2014. And it's happening.

  • How-Tos: How to make a Facebook account private

    This is where we show you how to make your Facebook account private. Follow these quick and easy steps and you will be able to control exactly who sees what on your Facebook account.

  • How-Tos: Bugs and Fixes: updates to Windows iTunes, Java, and Internet Explorer

    Update, update, update: Form that habit now, if you haven't already, to keep up with security fixes. The latest include the usual tweaks to fend off malicious attacks, and a fix to Java that should prevent it from disabling itself constantly. That would be nice.

  • How-Tos: Save your Internet bacon with two-factor authentication

    Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.

  • How-Tos: Turn off Facebook's location settings

    Whether you're going under cover or just want a bit more privacy, here's how get your Facebook posts to stop showing your location.

  • How-Tos: Disable Windows' logon password

    Don doesn't need to keep other people off his PC. He asked me how he could skip the logon screen and boot directly into Windows without a password.

  • How-Tos: How to remove spyware from PC or laptop

    We show you how to find and remove spyware from your PC or laptop.

  • How-Tos: What does your internet profile say about you?

    The internet stores a tremendous amount of information about us - from the things we buy, to the comments we make on Facebook or Twitter - but how much of this can we control? And what damage could it do to our reputations and job prospects in the future?

  • How-Tos: How to set up two-factor authentication in Evernote

    It seems like every day you read about another password security breach. It doesn't matter how robust your actual password is; if a hacker makes off with an entire password database, he can potentially access your account.

  • How-Tos: How to delete browsing history in Chrome

    Deleting your browsing history in Chrome is very easy, here's our step-by-step guide on how to do it.

  • How-Tos: How to browse the web anonymously and send messages securely

    It’s no longer paranoia to think you’re being watched. We show you how to use the Tor web browser, use TrueCrypt and BleachBit to keep emails private and stop people spying on your every online move.

  • How-Tos: How to safely install Malwarebytes

    Malwarebytes is a great additional security tool for Windows PCs and laptops. But one reader found his install of the software to be very unsatisfactory. Here we explain how to safely install Malwarebytes with no problems.

  • How-Tos: Close antivirus when installing software

    Often when installing software you will be advised to switch off your antivirus. Here's why.

  • How-Tos: Easy ways to protect your Android phone

    Your Android phone not only enables you to do nearly everything online, but also allows you to carry your life in your pocket. Although having all that information in a single location and always on hand may be especially convenient, it makes for an appealing target to thieves and hackers. But you're not defenseless: You can take a number of steps and precautions to ensure that your stuff stays safe.


IDG UK Sites

Best Christmas 2014 UK tech deals, Boxing Day 2014 UK tech deals & January sales 2015 UK tech...

IDG UK Sites

Apple's 2014 highlights: the most significant Apple news of 2014

IDG UK Sites

Watch this heartwarming Christmas short by Trunk for composer John Rutter

IDG UK Sites

Ultimate iOS 8 Tips: 35 awesome and advanced tips for using iOS 8 on iPhone and iPad