We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,812 Tutorials

More Security How-To

  • How-Tos: How to stop hackers stealing your data

    Modern hackers target the weakest part of your digital defences: you. Here we explain how your data can be stolen, and what to do to stop it happening.

  • How-Tos: Lock and encode your flash drives with BitLocker To Go encryption in Windows 8

    Losing your USB flash drive before a big presentation is a terrible way to start a Monday. Losing a drive that also contains valuable personal data or confidential company information will ruin your whole week—and maybe your career. Luckily, Windows users can easily hedge their bets against such disasters by using the free BitLocker To Go utility to quickly encrypt portable drives.

  • How-Tos: Sneaking past the Gatekeeper

    Reader Richard Patterson finds his way blocked when trying to launch a favorite application. He writes:

  • How-Tos: Here's how to secure your email and avoid becoming a 'Petraeus'

    It was a shock when David Petraeus--a respected and highly-decorated Army general--abruptly stepped down from his post as the director of the CIA earlier this week. It was even more of a jolt to learn that his resignation was due to an extramarital affair. But, the real story might be the fact that the affair came to light more or less accidentally as a result of poor email and privacy practices.

  • How-Tos: PC security: Your essential software toolbox

    Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security—after all, you probably still use it to pay bills, shop online, and store sensitive documents. You should fully protect yourself to lessen the chance of cybercriminals infiltrating your computer and your online accounts, capturing your personal information, invading your privacy, and stealing your money and identity.

  • How-Tos: Peek behind abbreviated Web links with Unshorten.it

    Shortened links are everywhere these days, especially on Twitter, where long Web addresses are at odds with the 140-character message limit.

  • How-Tos: Gain access to your PC without the logon password

    2godballdaglory asked the Answer Line forum how he can boot an old PC with a password he no longer remembers.

  • How-Tos: Test downloads and files with a sandbox

    Test downloads in a safe environment on your PC before installing them on your hard drive. We show how to install and run software in a sandbox with the free BufferZone app

  • How-Tos: How to protect USB drives with Bitlocker To Go

    Losing a USB flash drive can be the stuff of nightmares if it contains sensitive or valuable information. Windows 7 and Windows 8 include an encryption system called BitLocker To Go, which will safely encrypt the data stored on your external drives and lock them down with a password. Here's how.

  • How-Tos: Windows Explorer says DVD drive has been changed or moved

    What do you do if the DVD drive in your PC or laptop simply stops working? This was the problem faced by one of our readers. When he wrote in our Helproom Editor explained what to do when Windows Explorer says your PC's DVD drive has been changed or moved.

  • How-Tos: How to manage the threat to your smartphone

    We're told that our smartphones and tablets are under attack, but just how real is the mobile threat, and what should you look for in mobile security software? PC Advisor explains.

  • How-Tos: 5 Mobile Security Lessons From the Department of Defense

    Several years ago, the National Security Administration wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too.

  • How-Tos: Is Your ISP Spying On You?

    Arcticsid asked the Answer Line forum if his ISP can "sit back...watch a screen, and see everything you are doing at any given time?"

  • How-Tos: Dropbox Two-Step Verification: Hands On

    Two-step account verification is a hot topic after hackers nearly wiped out the digital life of tech journalist Mat Honan recently, and Dropbox is the latest online service to enable the added security measure.

  • How-Tos: My Email Account Has Been Hijacked!

    Coastie65 is nowhere near Malaysia, but friends are getting email claiming that he's stranded in Kuala Lumpur. He asked the Web Browsing and Email forum for help.

  • How-Tos: Password Protect a Flash Drive

    Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash drive.

  • How-Tos: 10 ways to secure a new PC or laptop

    The joy of owning a new PC can easily turn to heartache should it be compromised by malware or a scam. Here's how to keep a new PC or laptop safe.

  • How-Tos: How to Keep Your Employees Happy With Their Company PCs (Without Losing Control of Your IT)

    If you're a typical small-business owner, you don't have a centralized provisioning system that can easily and automatically deploy each desktop or laptop system. You might not even have a dedicated employee, let alone a whole department, to manage your IT resources. And you probably give each user their own local login, instead of using a centralized authentication server. In other words, your employees have the keys to their local computer kingdoms. And that means they can do just about anything on their machines: Install new applications, install undesirable applications, change settings, and perhaps even unintentionally corrupt the Registry or download malware.

  • How-Tos: Encrypt files the easy way using Cryptainer LE

    Encrypting files is easy, secure and free with Cryptainer LE. With our step-by-step guide, your sensitive data will stay private, even if your computer is stolen.

  • How-Tos: How to change a LinkedIn password

    Luckily changing your LinkedIn password is quick and easy. Here's how, with tips for a safe, secure password.


IDG UK Sites

Android One vs Android Silver vs Google Nexus: What is the difference?

IDG UK Sites

iOS 8 review: Hands on with the iOS 8 beta

IDG UK Sites

Thinking robots: The philosophy of artificial intelligence and evolving technology

IDG UK Sites

How to shoot a robot rom-com in three days