We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: How to protect USB drives with Bitlocker To Go

    Losing a USB flash drive can be the stuff of nightmares if it contains sensitive or valuable information. Windows 7 and Windows 8 include an encryption system called BitLocker To Go, which will safely encrypt the data stored on your external drives and lock them down with a password. Here's how.

  • How-Tos: Windows Explorer says DVD drive has been changed or moved

    What do you do if the DVD drive in your PC or laptop simply stops working? This was the problem faced by one of our readers. When he wrote in our Helproom Editor explained what to do when Windows Explorer says your PC's DVD drive has been changed or moved.

  • How-Tos: How to manage the threat to your smartphone

    We're told that our smartphones and tablets are under attack, but just how real is the mobile threat, and what should you look for in mobile security software? PC Advisor explains.

  • How-Tos: 5 Mobile Security Lessons From the Department of Defense

    Several years ago, the National Security Administration wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too.

  • How-Tos: Is Your ISP Spying On You?

    Arcticsid asked the Answer Line forum if his ISP can "sit back...watch a screen, and see everything you are doing at any given time?"

  • How-Tos: Dropbox Two-Step Verification: Hands On

    Two-step account verification is a hot topic after hackers nearly wiped out the digital life of tech journalist Mat Honan recently, and Dropbox is the latest online service to enable the added security measure.

  • How-Tos: My Email Account Has Been Hijacked!

    Coastie65 is nowhere near Malaysia, but friends are getting email claiming that he's stranded in Kuala Lumpur. He asked the Web Browsing and Email forum for help.

  • How-Tos: Password Protect a Flash Drive

    Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash drive.

  • How-Tos: 10 ways to secure a new PC or laptop

    The joy of owning a new PC can easily turn to heartache should it be compromised by malware or a scam. Here's how to keep a new PC or laptop safe.

  • How-Tos: How to Keep Your Employees Happy With Their Company PCs (Without Losing Control of Your IT)

    If you're a typical small-business owner, you don't have a centralized provisioning system that can easily and automatically deploy each desktop or laptop system. You might not even have a dedicated employee, let alone a whole department, to manage your IT resources. And you probably give each user their own local login, instead of using a centralized authentication server. In other words, your employees have the keys to their local computer kingdoms. And that means they can do just about anything on their machines: Install new applications, install undesirable applications, change settings, and perhaps even unintentionally corrupt the Registry or download malware.

  • How-Tos: Encrypt files the easy way using Cryptainer LE

    Encrypting files is easy, secure and free with Cryptainer LE. With our step-by-step guide, your sensitive data will stay private, even if your computer is stolen.

  • How-Tos: How to change a LinkedIn password

    Luckily changing your LinkedIn password is quick and easy. Here's how, with tips for a safe, secure password.

  • How-Tos: Manage your browser's Auto-Complete to secure private data

    Auto-Complete records information you put into web forms, then fills in forms on the fly. As with so many online conveniences it creates security risks: if someone else gets on to your PC or laptop they can quickly see your personal details. Our Helproom Editor explains how to manage Auto-Complete.

  • How-Tos: How to secure Windows 8

    We often use our computers to store sensitive personal information, so it’s vital you keep it secure from prying eyes. Here's how to secure Windows 8.

  • How-Tos: Manage your passwords with KeePass

    Everyone has to remember scores of usernames and passwords these days. We show you how a simple free utility - KeePass - can store and manage them safely for you.

  • How-Tos: How to Control Your Facebook Privacy Settings

    Facebook's privacy settings are confusing by design, often hiding similar settings in totally different menus and defaulting to unnerving levels of public sharing. Ensuring that you share the right information with the right people can be difficult, and Facebook even has a few specialized settings that will override your other privacy settings if you aren't careful. Luckily you can take control of your privacy on Facebook fairly quickly once you know what you're looking for.

  • How-Tos: Speed Up Searches--And Reduce Typing--With Drag and Drop Search

    Drag and Drop Search is a free Chrome extension that offers an elegant solution to a common problem: Searching on the website that will give you the answers you need. Google is a great engine, but there is no reason to go through it for everything. If you're after quick facts and figures, you might be better off searching Wikipedia directly; if it's videos you're after, then a direct YouTube search might let you find them faster. If you'd like to get a sense for a place, searching for it on Flickr will show you what it's like. With Drag and Drop Search installed, you only need to select a term, then drag and drop it on the name of the search engine you'd like to use.

  • How-Tos: Protect Yourself From DNSChanger

    In July the Internet Systems Consortium will permanently shut down DNS servers deployed to serve as temporary surrogates for rogue DNS servers shut down as part of Operation Ghost Click, an FBI operation that brought down an Estonian hacker ring last year. If your PC is one of the more than 1 million computers infected that carry DNSChanger you might unknowingly be relying on one of the FBI's temporary servers to access the Internet, and if you don't eliminate DNSChanger from your PC before the FBI pulls the plug on its servers, you'll be left without Internet access. Read on to learn how to discover whether you're infected with DNSChanger, and what you can do to eliminate it from your system.

  • How-Tos: How to protect your iPhone from theft

    Anti-theft iPhone advice, and top tips to stop thieves disabling Find My iPhone

  • How-Tos: Working at Starbucks? Lock Down Your Data with HotSpot Shield

    Think that coffee-shop Wi-Fi hotspot is secure? Think again. Most public hotspots, including those at airports, hotels, and even Starbucks, aren't secure at all. In fact, when your laptop connects to one of these networks, it’s easy pickings for hackers -- even if you have a firewall installed.


IDG UK Sites

Nexus 6 vs Sony Xperia Z3 comparison: Lollipop phablet takes on KitKat flagship smartphone

IDG UK Sites

Why people aren't upgrading to iOS 8: new features are for power users, not the average Joe

IDG UK Sites

Free rocket & space sounds: NASA launches archive of interstellar audio on SoundCloud

IDG UK Sites

iPad Air 2 review: Insanely fast and alarmingly thin. Speed tests, camera tests, beautiful...