We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: Switch to Mac: Security basics

    When it comes to your security, the latest versions of Windows and OS X are comparable, but you still have a few key differences and settings to become familiar with.

  • How-Tos: How to find a lost or stolen laptop

    Laptops are easily stolen or lost, so you should consider some form of protection. Tracking services can tell you where it is and even who is using it. We compare popular tracking software including LoJack, Norton Anti-theft and Apple's Find My iPhone

  • How-Tos: How to encrypt your email

    Reader Jack Burns is a bit disconcerted by some recent news. He writes:

  • How-Tos: View your children's browser history

    We explain how to keep tabs on your children's web browsing, even when they delete the browser history.

  • How-Tos: Just how snoop-proof is your Mac?

    Reader Evan Katz wonders just how safe the data on his Mac is. He writes:

  • How-Tos: 8 essential features you need in a business router

    A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.

  • How-Tos: Passwords: You're doing it wrong. Here's how to make them uncrackable.

    For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.

  • How-Tos: How to use SteganPEG to hide documents in images

    If you want to keep certain documents private, or share them with a friend without using encryption, what you need is SteganPEG. This free steganography tool lets you hide documents - or just about any file - in a JPEG image. Here's how to do it.

  • How-Tos: Designing your digital legacy

    We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.

  • How-Tos: How to Recover From a Twitter Hack

    Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.

  • How-Tos: How to wipe a Mac: erase your Mac's hard drive

    We explain how to wipe a Mac's hard drive, and then reinstall OS X.

  • How-Tos: How to track a lost computer with Find My Mac

    If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen.

  • How-Tos: How to enable Family Safety features in Windows 8

    The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content.

  • How-Tos: Back up, wipe and restore your iPad

    If you're planning to sell or give away your iPad, then it is essential that your personal information and data be erased from it. If it's running sluggish after a few years, sometimes backing up your data, erasing it from the tablet and restoring it might improve performance.

  • How-Tos: Wi-Fi & router acronyms in a nutshell

    SSID, WEP, WPA2, TKIP, CCMP, PSK and more – few other areas of PC expertise are quite as filled with cryptic acronyms as the router configuration. Here's what they all mean and which you should choose.

  • How-Tos: 12 simple steps to safer social networking

    Confession time: I'm an inveterate social media junkie. From Facebook to Instagram to Diaspora, whenever a new communication platform rolls around--or comes back around--I'm ready to leap aboard.

  • How-Tos: How to share folders without homegroups in Windows 7

    The homegroup function of Windows 7, while convenient, is by far not everybody's cup of tea. It is neither compatible with older Windows versions or Linux, nor does it give access to certain system-wide folders. Here's how you can share folders with the old, but trusty Network Sharing Settings.

  • How-Tos: How to gain access to your Windows account if you lose your password

    If you're using a single account, it's surprisingly easy to lock yourself out of your own computer by losing your password. Luckily, its just as easy to get back in again without leaving a trace – so long as you haven't misplaced your Windows Installation DVD. Here's how.

  • How-Tos: Protect your Gmail account with Google's two-step authentication

    If you want your Gmail account to be as safe as possible, using the optional two-step authentication is the way to go. We'll show you how it works and what it involves.

  • How-Tos: How to hide user accounts from the log-on screen in Windows 7

    Not every user account is meant to be seen by other people. When password-protection just doesn't cut it and you want that extra bit of discretion, you should hide your accounts from the log-in screen altogether. Here's how.


IDG UK Sites

Samsung Galaxy S5 mini vs HTC One mini 2 comparison review: Design and price beats additional...

IDG UK Sites

Why local multiplayer gaming is rapidly vanishing: we look at the demise of split-screen and LAN...

IDG UK Sites

Colour-depth not resolution is what will make 4K a success or failure

IDG UK Sites

iPhone 6 vs iPhone 6 Plus: Which new iPhone 6 model should I buy?