We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,847 Tutorials

More Security How-To

  • How-Tos: View your children's browser history

    We explain how to keep tabs on your children's web browsing, even when they delete the browser history.

  • How-Tos: Just how snoop-proof is your Mac?

    Reader Evan Katz wonders just how safe the data on his Mac is. He writes:

  • How-Tos: 8 essential features you need in a business router

    A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.

  • How-Tos: Passwords: You're doing it wrong. Here's how to make them uncrackable.

    For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.

  • How-Tos: How to use SteganPEG to hide documents in images

    If you want to keep certain documents private, or share them with a friend without using encryption, what you need is SteganPEG. This free steganography tool lets you hide documents - or just about any file - in a JPEG image. Here's how to do it.

  • How-Tos: Designing your digital legacy

    We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.

  • How-Tos: How to Recover From a Twitter Hack

    Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.

  • How-Tos: How to wipe a Mac: erase your Mac's hard drive

    We explain how to wipe a Mac's hard drive, and then reinstall OS X.

  • How-Tos: How to track a lost computer with Find My Mac

    If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen.

  • How-Tos: How to enable Family Safety features in Windows 8

    The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content.

  • How-Tos: Back up, wipe and restore your iPad

    If you're planning to sell or give away your iPad, then it is essential that your personal information and data be erased from it. If it's running sluggish after a few years, sometimes backing up your data, erasing it from the tablet and restoring it might improve performance.

  • How-Tos: Wi-Fi & router acronyms in a nutshell

    SSID, WEP, WPA2, TKIP, CCMP, PSK and more – few other areas of PC expertise are quite as filled with cryptic acronyms as the router configuration. Here's what they all mean and which you should choose.

  • How-Tos: 12 simple steps to safer social networking

    Confession time: I'm an inveterate social media junkie. From Facebook to Instagram to Diaspora, whenever a new communication platform rolls around--or comes back around--I'm ready to leap aboard.

  • How-Tos: How to share folders without homegroups in Windows 7

    The homegroup function of Windows 7, while convenient, is by far not everybody's cup of tea. It is neither compatible with older Windows versions or Linux, nor does it give access to certain system-wide folders. Here's how you can share folders with the old, but trusty Network Sharing Settings.

  • How-Tos: How to gain access to your Windows account if you lose your password

    If you're using a single account, it's surprisingly easy to lock yourself out of your own computer by losing your password. Luckily, its just as easy to get back in again without leaving a trace – so long as you haven't misplaced your Windows Installation DVD. Here's how.

  • How-Tos: Protect your Gmail account with Google's two-step authentication

    If you want your Gmail account to be as safe as possible, using the optional two-step authentication is the way to go. We'll show you how it works and what it involves.

  • How-Tos: How to hide user accounts from the log-on screen in Windows 7

    Not every user account is meant to be seen by other people. When password-protection just doesn't cut it and you want that extra bit of discretion, you should hide your accounts from the log-in screen altogether. Here's how.

  • How-Tos: Windows 8 picture passwords: Their great untapped potential

    Love it or hate it, Windows 8 is the bellwether for PCs. Where Microsoft goes, PCs follow. And now Microsoft is making a grab for the mobile market, too. The latest version of Windows is designed with touchscreens in mind, and one bright side of that evolution is the addition of features that make Windows more intuitive and easier to use on all devices.

  • How-Tos: Windows 8: Put its hidden security features to work!

    Don't let the Windows 8 haters brainswash you: Microsoft actually introduced a few great features in its new operating system, some of which will help keep you safer from malware and other security threats. Though most of these security enhancements are active by default, you still must be proactive to get the most from them. Also, one new Windows 8 feature presents specific security concerns that must be addressed to keep your PC--and your data--as safe as possible. Let's jump in and investigate.

  • How-Tos: How to unlock an Android phone/tablet

    It's wise to use a security measure to protect from unauthorised access your Android smartphone or tablet, whether you use a pattern, PIN, password or face lock. But what do you do when you forget your own access code?


IDG UK Sites

45 Best Android games: top Android games for your smartphone or tablet in 2014 (24 are free!)

IDG UK Sites

How Apple, Adobe, Microsoft and others have let us down over UltraHD and hiDPI screens

IDG UK Sites

Do you have the X-Factor too? Mix Off app puts fans in the frame

IDG UK Sites

iPad Pro release date, rumours and leaked images - 12.9 screen 'coming in 2015'