We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: Bugs and Fixes: updates to Windows iTunes, Java, and Internet Explorer

    Update, update, update: Form that habit now, if you haven't already, to keep up with security fixes. The latest include the usual tweaks to fend off malicious attacks, and a fix to Java that should prevent it from disabling itself constantly. That would be nice.

  • How-Tos: Save your Internet bacon with two-factor authentication

    Anyone who's paid attention to computer security over the past few years will probably tell you that your password isn't enough. Passwords are often awkward and hard to remember--leading people to use the same password for multiple sites--and if someone gets a hold of your login credentials, they can wreak havoc with your personal information. Not good.

  • How-Tos: Turn off Facebook's location settings

    Whether you're going under cover or just want a bit more privacy, here's how get your Facebook posts to stop showing your location.

  • How-Tos: Disable Windows' logon password

    Don doesn't need to keep other people off his PC. He asked me how he could skip the logon screen and boot directly into Windows without a password.

  • How-Tos: How to remove spyware from PC or laptop

    We show you how to find and remove spyware from your PC or laptop.

  • How-Tos: What does your internet profile say about you?

    The internet stores a tremendous amount of information about us - from the things we buy, to the comments we make on Facebook or Twitter - but how much of this can we control? And what damage could it do to our reputations and job prospects in the future?

  • How-Tos: How to set up two-factor authentication in Evernote

    It seems like every day you read about another password security breach. It doesn't matter how robust your actual password is; if a hacker makes off with an entire password database, he can potentially access your account.

  • How-Tos: How to delete browsing history in Chrome

    Deleting your browsing history in Chrome is very easy, here's our step-by-step guide on how to do it.

  • How-Tos: How to browse the web anonymously and send messages securely

    It’s no longer paranoia to think you’re being watched. We show you how to use the Tor web browser, use TrueCrypt and BleachBit to keep emails private and stop people spying on your every online move.

  • How-Tos: How to safely install Malwarebytes

    Malwarebytes is a great additional security tool for Windows PCs and laptops. But one reader found his install of the software to be very unsatisfactory. Here we explain how to safely install Malwarebytes with no problems.

  • How-Tos: Close antivirus when installing software

    Often when installing software you will be advised to switch off your antivirus. Here's why.

  • How-Tos: Easy ways to protect your Android phone

    Your Android phone not only enables you to do nearly everything online, but also allows you to carry your life in your pocket. Although having all that information in a single location and always on hand may be especially convenient, it makes for an appealing target to thieves and hackers. But you're not defenseless: You can take a number of steps and precautions to ensure that your stuff stays safe.

  • How-Tos: How to Overcome Small Business Data Recovery Challenges

    Data recovery has mattered ever since businesses started relying on PCs in the workplace. Today's common storage options for small businesses all present some disaster recovery challenges. Here's what your organization should do to address them.

  • How-Tos: Protect your identity on Facebook

    The past year has seen a sharp increase in fraud and identity theft on Facebook. Here we show you how to minimise the risk of becoming the next victim of clever identity thieves with eight simple steps to using Facebook safely.

  • How-Tos: How to protect your PC against devious security traps

    Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.

  • How-Tos: Your Twitter account has been hacked! Here's what to do about it.

    Kirsty woke up to find that someone else had taken control of her Twitter account. I tell her how to get it back.

  • How-Tos: How to beat web filters

    Here we outline five ways you can beat web filters, including proxies, anonymous networks, and VPNs. Here's how to be anonymous on the web.

  • How-Tos: Automator workflow of the month: Easily encrypt folders

    You can use Apple's Disk Utility to convert a folder into an encrypted disk image--a protected archive that you unlock with a password. Such images are particularly helpful when you're working on confidential company documents away from the office or when your business card reads: International Person of Mystery. But the truth is that creating encrypted disk images with Disk Utility is cumbersome. Thankfully, with a simple Automator workflow, you can secure documents in an instant. It works like this:

  • How-Tos: How to scan an external hard drive for viruses

    Here's where we show you how to scan an external hard drive for viruses.

  • How-Tos: How David Cameron's web porn filter plan affects you

    David Cameron this week announced plans to force UK consumers to opt-in via their ISP if they want to look at pornography on the internet. But what exactly is the Goverment's web-filtering plan, and what does it mean for you? We explain what David Cameron's internet port filter plan really means for UK consumers.


IDG UK Sites

LG G4 Note UK release date and specification rumours: Samsung Galaxy Note 5 killer could be the LG 3......

IDG UK Sites

In defence of BlackBerrys

IDG UK Sites

Why we should reserve judgement on Apple ditching Helvetica in OS X/iOS for the Apple Watch's San...

IDG UK Sites

Retina 3.3GHz iMac 27in preview: Apple cuts £400 off Retina iMac with new model