We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,793 Tutorials

More Security How-To

  • How-Tos: How to beat web filters

    Here we outline five ways you can beat web filters, including proxies, anonymous networks, and VPNs. Here's how to be anonymous on the web.

  • How-Tos: Parental control on Android

    Kids are increasingly tech-savvy these days, and even a toddler will manage to use your Android smartphone or tablet in ways you didn't know were possible. Apart from running up a heavy bill in app and game purchases, this means your children may also be at risk from online predators and adult content. Here we show you how to set up sensible parental controls, and explain the new restricted profiles feature added to Android Jelly Bean 4.3.

  • How-Tos: Automator workflow of the month: Easily encrypt folders

    You can use Apple's Disk Utility to convert a folder into an encrypted disk image--a protected archive that you unlock with a password. Such images are particularly helpful when you're working on confidential company documents away from the office or when your business card reads: International Person of Mystery. But the truth is that creating encrypted disk images with Disk Utility is cumbersome. Thankfully, with a simple Automator workflow, you can secure documents in an instant. It works like this:

  • How-Tos: How to scan an external hard drive for viruses

    Here's where we show you how to scan an external hard drive for viruses.

  • How-Tos: How David Cameron's web porn filter plan affects you

    David Cameron this week announced plans to force UK consumers to opt-in via their ISP if they want to look at pornography on the internet. But what exactly is the Goverment's web-filtering plan, and what does it mean for you? We explain what David Cameron's internet port filter plan really means for UK consumers.

  • How-Tos: How to use Find My iPhone

    Find my iPhone works with the iPad and iPod touch as well, and can be used to track down your missing iOS device. We show you step-by-step how to set up and use it.

  • How-Tos: Get a disposable email address from MailDrop

    Your email address is like your home address: Never give it out unless absolutely necessary.

  • How-Tos: Switch to Mac: Security basics

    When it comes to your security, the latest versions of Windows and OS X are comparable, but you still have a few key differences and settings to become familiar with.

  • How-Tos: How to find a lost or stolen laptop

    Laptops are easily stolen or lost, so you should consider some form of protection. Tracking services can tell you where it is and even who is using it. We compare popular tracking software including LoJack, Norton Anti-theft and Apple's Find My iPhone

  • How-Tos: How to encrypt your email

    Reader Jack Burns is a bit disconcerted by some recent news. He writes:

  • How-Tos: View your children's browser history

    We explain how to keep tabs on your children's web browsing, even when they delete the browser history.

  • How-Tos: Just how snoop-proof is your Mac?

    Reader Evan Katz wonders just how safe the data on his Mac is. He writes:

  • How-Tos: 8 essential features you need in a business router

    A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.

  • How-Tos: Passwords: You're doing it wrong. Here's how to make them uncrackable.

    For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.

  • How-Tos: How to use SteganPEG to hide documents in images

    If you want to keep certain documents private, or share them with a friend without using encryption, what you need is SteganPEG. This free steganography tool lets you hide documents - or just about any file - in a JPEG image. Here's how to do it.

  • How-Tos: Designing your digital legacy

    We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.

  • How-Tos: How to Recover From a Twitter Hack

    Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.

  • How-Tos: How to wipe a Mac: erase your Mac's hard drive

    We explain how to wipe a Mac's hard drive, and then reinstall OS X.

  • How-Tos: How to track a lost computer with Find My Mac

    If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen.

  • How-Tos: How to enable Family Safety features in Windows 8

    The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content.


IDG UK Sites

OnePlus Two release date rumours: Something's happening on 22 July

IDG UK Sites

13in MacBook Air review, Apple's MacBook Air 2014 reviewed

IDG UK Sites

5 reasons to buy an electric car and 5 reasons not to

IDG UK Sites

Evernote Skitch: the best way for creatives to doodle feedback