We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,851 Tutorials

More Security How-To

  • How-Tos: Get free web filtering

    Keep your kids safe online by using this free website filtering tool. Here's how to set it up.

  • How-Tos: How to temporarily disable Microsoft Security Essentials

    When it comes to keeping my PC secure, I rely on a small handful of tools: Windows 7's built-in firewall, Gmail's spam filtering, Web of Trust's helpful browser plug-in, and Microsoft's free Security Essentials anti-virus utility.

  • How-Tos: Encrypt (almost) anything

    It's all too easy to neglect data security, especially for a small business. While bigger organizations have IT departments, service contracts, and enterprise hardware, smaller companies frequently rely on consumer software, which lacks the same sort of always-on security functionality.

  • How-Tos: 'Red October' malware: what you need to know

    Kaspersky Lab this week announced that it had found what it described as a shadowy group of hackers who had been harvesting date from various diplomatic, government, and scientific research computer networks. According to the Kaspersky Lab report, the Red October hackers have been specifically targeting high-ranking individuals in public sector roles in so-called 'spear phishing' attacks (targeted phishing). Here's everything you need to know about Red October.

  • How-Tos: Answer Line: Malware or false positive?

    Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?

  • How-Tos: How to encrypt a file in XP

    Our Helproom Editor explains how to password-protect files when using a PC or laptop running Windows XP.

  • How-Tos: Three New Year's resolutions for PC users

    A new year is upon us, and that can mean only one thing: resolutions. For most folks, these tend to be of the "get in shape" or "quit smoking" variety. But if you're a PCWorld reader, consider adding some PC-specific resolutions to the mix.

  • How-Tos: How to activate Windows Defender in Windows 8

    Like every new Windows release, Windows 8 is more secure than the operating systems that came before it. That's due in large part to three major enhancements: An increased emphasis on UEFI Secure Boot optimizations, the extension of the SmartScreen Filter across the operating system, and the default inclusion of a more robust version of Windows Defender, which now protects against all kinds of malware--not just spyware.

  • How-Tos: How to stop hackers stealing your data

    Modern hackers target the weakest part of your digital defences: you. Here we explain how your data can be stolen, and what to do to stop it happening.

  • How-Tos: Lock and encode your flash drives with BitLocker To Go encryption in Windows 8

    Losing your USB flash drive before a big presentation is a terrible way to start a Monday. Losing a drive that also contains valuable personal data or confidential company information will ruin your whole week—and maybe your career. Luckily, Windows users can easily hedge their bets against such disasters by using the free BitLocker To Go utility to quickly encrypt portable drives.

  • How-Tos: Sneaking past the Gatekeeper

    Reader Richard Patterson finds his way blocked when trying to launch a favorite application. He writes:

  • How-Tos: Here's how to secure your email and avoid becoming a 'Petraeus'

    It was a shock when David Petraeus--a respected and highly-decorated Army general--abruptly stepped down from his post as the director of the CIA earlier this week. It was even more of a jolt to learn that his resignation was due to an extramarital affair. But, the real story might be the fact that the affair came to light more or less accidentally as a result of poor email and privacy practices.

  • How-Tos: PC security: Your essential software toolbox

    Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security—after all, you probably still use it to pay bills, shop online, and store sensitive documents. You should fully protect yourself to lessen the chance of cybercriminals infiltrating your computer and your online accounts, capturing your personal information, invading your privacy, and stealing your money and identity.

  • How-Tos: Peek behind abbreviated Web links with Unshorten.it

    Shortened links are everywhere these days, especially on Twitter, where long Web addresses are at odds with the 140-character message limit.

  • How-Tos: Gain access to your PC without the logon password

    2godballdaglory asked the Answer Line forum how he can boot an old PC with a password he no longer remembers.

  • How-Tos: Test downloads and files with a sandbox

    Test downloads in a safe environment on your PC before installing them on your hard drive. We show how to install and run software in a sandbox with the free BufferZone app

  • How-Tos: How to protect USB drives with Bitlocker To Go

    Losing a USB flash drive can be the stuff of nightmares if it contains sensitive or valuable information. Windows 7 and Windows 8 include an encryption system called BitLocker To Go, which will safely encrypt the data stored on your external drives and lock them down with a password. Here's how.

  • How-Tos: Windows Explorer says DVD drive has been changed or moved

    What do you do if the DVD drive in your PC or laptop simply stops working? This was the problem faced by one of our readers. When he wrote in our Helproom Editor explained what to do when Windows Explorer says your PC's DVD drive has been changed or moved.

  • How-Tos: How to manage the threat to your smartphone

    We're told that our smartphones and tablets are under attack, but just how real is the mobile threat, and what should you look for in mobile security software? PC Advisor explains.

  • How-Tos: 5 Mobile Security Lessons From the Department of Defense

    Several years ago, the National Security Administration wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too.


IDG UK Sites

45 Best Android games: top Android games for your smartphone or tablet in 2014 (24 are free!)

IDG UK Sites

How Apple, Adobe, Microsoft and others have let us down over UltraHD and hiDPI screens

IDG UK Sites

Do you have the X-Factor too? Mix Off app puts fans in the frame

IDG UK Sites

iPad Pro release date, rumours and leaked images - 12.9 screen 'coming in 2015'