We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,862 Tutorials

More Security How-To

  • How-Tos: How to manage the threat to your smartphone

    We're told that our smartphones and tablets are under attack, but just how real is the mobile threat, and what should you look for in mobile security software? PC Advisor explains.

  • How-Tos: 5 Mobile Security Lessons From the Department of Defense

    Several years ago, the National Security Administration wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too.

  • How-Tos: Is Your ISP Spying On You?

    Arcticsid asked the Answer Line forum if his ISP can "sit back...watch a screen, and see everything you are doing at any given time?"

  • How-Tos: Dropbox Two-Step Verification: Hands On

    Two-step account verification is a hot topic after hackers nearly wiped out the digital life of tech journalist Mat Honan recently, and Dropbox is the latest online service to enable the added security measure.

  • How-Tos: My Email Account Has Been Hijacked!

    Coastie65 is nowhere near Malaysia, but friends are getting email claiming that he's stranded in Kuala Lumpur. He asked the Web Browsing and Email forum for help.

  • How-Tos: Password Protect a Flash Drive

    Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash drive.

  • How-Tos: 10 ways to secure a new PC or laptop

    The joy of owning a new PC can easily turn to heartache should it be compromised by malware or a scam. Here's how to keep a new PC or laptop safe.

  • How-Tos: How to Keep Your Employees Happy With Their Company PCs (Without Losing Control of Your IT)

    If you're a typical small-business owner, you don't have a centralized provisioning system that can easily and automatically deploy each desktop or laptop system. You might not even have a dedicated employee, let alone a whole department, to manage your IT resources. And you probably give each user their own local login, instead of using a centralized authentication server. In other words, your employees have the keys to their local computer kingdoms. And that means they can do just about anything on their machines: Install new applications, install undesirable applications, change settings, and perhaps even unintentionally corrupt the Registry or download malware.

  • How-Tos: Encrypt files the easy way using Cryptainer LE

    Encrypting files is easy, secure and free with Cryptainer LE. With our step-by-step guide, your sensitive data will stay private, even if your computer is stolen.

  • How-Tos: How to change a LinkedIn password

    Luckily changing your LinkedIn password is quick and easy. Here's how, with tips for a safe, secure password.

  • How-Tos: Manage your browser's Auto-Complete to secure private data

    Auto-Complete records information you put into web forms, then fills in forms on the fly. As with so many online conveniences it creates security risks: if someone else gets on to your PC or laptop they can quickly see your personal details. Our Helproom Editor explains how to manage Auto-Complete.

  • How-Tos: How to secure Windows 8

    We often use our computers to store sensitive personal information, so it’s vital you keep it secure from prying eyes. Here's how to secure Windows 8.

  • How-Tos: Manage your passwords with KeePass

    Everyone has to remember scores of usernames and passwords these days. We show you how a simple free utility - KeePass - can store and manage them safely for you.

  • How-Tos: How to Control Your Facebook Privacy Settings

    Facebook's privacy settings are confusing by design, often hiding similar settings in totally different menus and defaulting to unnerving levels of public sharing. Ensuring that you share the right information with the right people can be difficult, and Facebook even has a few specialized settings that will override your other privacy settings if you aren't careful. Luckily you can take control of your privacy on Facebook fairly quickly once you know what you're looking for.

  • How-Tos: Speed Up Searches--And Reduce Typing--With Drag and Drop Search

    Drag and Drop Search is a free Chrome extension that offers an elegant solution to a common problem: Searching on the website that will give you the answers you need. Google is a great engine, but there is no reason to go through it for everything. If you're after quick facts and figures, you might be better off searching Wikipedia directly; if it's videos you're after, then a direct YouTube search might let you find them faster. If you'd like to get a sense for a place, searching for it on Flickr will show you what it's like. With Drag and Drop Search installed, you only need to select a term, then drag and drop it on the name of the search engine you'd like to use.

  • How-Tos: Protect Yourself From DNSChanger

    In July the Internet Systems Consortium will permanently shut down DNS servers deployed to serve as temporary surrogates for rogue DNS servers shut down as part of Operation Ghost Click, an FBI operation that brought down an Estonian hacker ring last year. If your PC is one of the more than 1 million computers infected that carry DNSChanger you might unknowingly be relying on one of the FBI's temporary servers to access the Internet, and if you don't eliminate DNSChanger from your PC before the FBI pulls the plug on its servers, you'll be left without Internet access. Read on to learn how to discover whether you're infected with DNSChanger, and what you can do to eliminate it from your system.

  • How-Tos: How to protect your iPhone from theft

    Anti-theft iPhone advice, and top tips to stop thieves disabling Find My iPhone

  • How-Tos: Working at Starbucks? Lock Down Your Data with HotSpot Shield

    Think that coffee-shop Wi-Fi hotspot is secure? Think again. Most public hotspots, including those at airports, hotels, and even Starbucks, aren't secure at all. In fact, when your laptop connects to one of these networks, it’s easy pickings for hackers -- even if you have a firewall installed.

  • How-Tos: How to back up and restore with Crashplan

    No matter how often we bang on about it, there will always be some people who neglect to back up their valuable data. But it’s an important task, so we’ll repeat our advice: fail to back up, and you’ll risk losing everything stored on your PC. Here, we show you how with Crashplan.

  • How-Tos: Install antivirus on Android phones and tablets

    With every new smartphone release, handsets are getting more powerful and more popular. They're also rammed with personal information that hackers want to steal. Make sure you keep your details safe by installing antivirus software.


IDG UK Sites

The best iPhone 6 alternatives: Price and specs compared with the best smartphones

IDG UK Sites

The top 10 Apple products ranked by pixel density: Which Apple devices have the sharpest screens?

IDG UK Sites

SBTRKT's Look Away webcam-based interactive music video won't keep your gaze

IDG UK Sites

Retina MacBook Air release date rumours and specs: Gold 12in Retina MacBook Air almost 1cm thinner...