We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: Designing your digital legacy

    We lead rich virtual lives on social networking sites like Google+, Facebook, and Twitter. So what happens when real life catches up, and our flesh-and-blood bodies succumb to mortality? For our virtual selves, at least, some concrete answers are available--ways to settle our digital affairs after death, while minimizing hassle and heartache for loved ones.

  • How-Tos: How to Recover From a Twitter Hack

    Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.

  • How-Tos: How to wipe a Mac: erase your Mac's hard drive

    We explain how to wipe a Mac's hard drive, and then reinstall OS X.

  • How-Tos: How to track a lost computer with Find My Mac

    If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen.

  • How-Tos: How to enable Family Safety features in Windows 8

    The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content.

  • How-Tos: Back up, wipe and restore your iPad

    If you're planning to sell or give away your iPad, then it is essential that your personal information and data be erased from it. If it's running sluggish after a few years, sometimes backing up your data, erasing it from the tablet and restoring it might improve performance.

  • How-Tos: Wi-Fi & router acronyms in a nutshell

    SSID, WEP, WPA2, TKIP, CCMP, PSK and more – few other areas of PC expertise are quite as filled with cryptic acronyms as the router configuration. Here's what they all mean and which you should choose.

  • How-Tos: 12 simple steps to safer social networking

    Confession time: I'm an inveterate social media junkie. From Facebook to Instagram to Diaspora, whenever a new communication platform rolls around--or comes back around--I'm ready to leap aboard.

  • How-Tos: How to share folders without homegroups in Windows 7

    The homegroup function of Windows 7, while convenient, is by far not everybody's cup of tea. It is neither compatible with older Windows versions or Linux, nor does it give access to certain system-wide folders. Here's how you can share folders with the old, but trusty Network Sharing Settings.

  • How-Tos: How to gain access to your Windows account if you lose your password

    If you're using a single account, it's surprisingly easy to lock yourself out of your own computer by losing your password. Luckily, its just as easy to get back in again without leaving a trace – so long as you haven't misplaced your Windows Installation DVD. Here's how.

  • How-Tos: Protect your Gmail account with Google's two-step authentication

    If you want your Gmail account to be as safe as possible, using the optional two-step authentication is the way to go. We'll show you how it works and what it involves.

  • How-Tos: How to hide user accounts from the log-on screen in Windows 7

    Not every user account is meant to be seen by other people. When password-protection just doesn't cut it and you want that extra bit of discretion, you should hide your accounts from the log-in screen altogether. Here's how.

  • How-Tos: Windows 8 picture passwords: Their great untapped potential

    Love it or hate it, Windows 8 is the bellwether for PCs. Where Microsoft goes, PCs follow. And now Microsoft is making a grab for the mobile market, too. The latest version of Windows is designed with touchscreens in mind, and one bright side of that evolution is the addition of features that make Windows more intuitive and easier to use on all devices.

  • How-Tos: Windows 8: Put its hidden security features to work!

    Don't let the Windows 8 haters brainswash you: Microsoft actually introduced a few great features in its new operating system, some of which will help keep you safer from malware and other security threats. Though most of these security enhancements are active by default, you still must be proactive to get the most from them. Also, one new Windows 8 feature presents specific security concerns that must be addressed to keep your PC--and your data--as safe as possible. Let's jump in and investigate.

  • How-Tos: How to unlock an Android phone/tablet

    It's wise to use a security measure to protect from unauthorised access your Android smartphone or tablet, whether you use a pattern, PIN, password or face lock. But what do you do when you forget your own access code?

  • How-Tos: Get free web filtering

    Keep your kids safe online by using this free website filtering tool. Here's how to set it up.

  • How-Tos: How to temporarily disable Microsoft Security Essentials

    When it comes to keeping my PC secure, I rely on a small handful of tools: Windows 7's built-in firewall, Gmail's spam filtering, Web of Trust's helpful browser plug-in, and Microsoft's free Security Essentials anti-virus utility.

  • How-Tos: Encrypt (almost) anything

    It's all too easy to neglect data security, especially for a small business. While bigger organizations have IT departments, service contracts, and enterprise hardware, smaller companies frequently rely on consumer software, which lacks the same sort of always-on security functionality.

  • How-Tos: 'Red October' malware: what you need to know

    Kaspersky Lab this week announced that it had found what it described as a shadowy group of hackers who had been harvesting date from various diplomatic, government, and scientific research computer networks. According to the Kaspersky Lab report, the Red October hackers have been specifically targeting high-ranking individuals in public sector roles in so-called 'spear phishing' attacks (targeted phishing). Here's everything you need to know about Red October.

  • How-Tos: Answer Line: Malware or false positive?

    Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?


IDG UK Sites

Best Christmas 2014 UK tech deals, Boxing Day 2014 UK tech deals & January sales 2015 UK tech...

IDG UK Sites

LED vs Halogen: Why now could be the right time to invest in LED bulbs

IDG UK Sites

Christmas' best ads: See great festive spots studios have created to promote themselves and clients

IDG UK Sites

Ultimate iOS 8 Tips: 35 awesome and advanced tips for using iOS 8 on iPhone and iPad