We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,860 Tutorials

More Security How-To

  • How-Tos: How to secure a smartphone

    Antivirus is one thing, but much more important is to make sure you can remotely locate, lock and wipe your smartphone.

  • How-Tos: How To Lock Down Your Wireless Network

    If you operate a wireless network for your home or business, it's important to ward it against opportunistic hackers seeking to steal your data or hijack your Wi-Fi for their own nefarious purposes. We spoke to Steven Andrés, CTO of security consulting firm Special Ops Security, to learn about the best ways to lock down your Wi-Fi. To get started, you'll need to log in to your router's administrative console by typing the router's IP address into your Web browser's address bar. Most routers use a common address like 192.168.1.1, though alternatives like 192.168.0.1 and 192.168.2.1 are also common. Check the manual that came with your router to determine the correct IP address; if you've lost your manual, you can usually find the appropriate IP address on the manufacturer's website.

  • How-Tos: How to protect a smartphone against malware

    Smartphone malware has surged by 800% in last four months. PC Advisor explains how you can secure you mobile phone against future attacks.

  • How-Tos: Protect a wireless network without using a password

    One contributor protects his Wi-Fi network without using a password.

  • How-Tos: Can I use an older software licence key with a newer product?

    A reader wanted to know if she could use her older BullGuard Internet Security licence with an updated version of the software. Our Helproom Expert explains.

  • How-Tos: Speed Up Windows on What Should be a Fast PC

    LiveBrianD asked the Windows forum for advise on improving performance on a slow PC. Given the PC's hardware, Brian feels that it should be faster.

  • How-Tos: How to remove an autorun worm

    If your Word documents suddenly have the file extention .exe, rather than .doc, and other files have been converted to link files, your PC has probably been infected by an autorun worm. Our Helproom expert explains what you should do.

  • How-Tos: How to remove your general location from Facebook posts

    Following changes rolled-out on social network Facebook in September this year, you may have noticed that some of your posts, or those of friends, feature a location next to the timestamp.

  • How-Tos: How to set-up two-step authentication on Facebook

    Google launched a new campaign with the Citizens Advice Bureau this week in a bid to promote online safety to Brits.

  • How-Tos: How to view active sessions on Facebook

    Facebook's Active Sessions feature allows social networkers to see a list of locations and times their account was recently accessed from, as well as the type of device was used.

  • Video: Video: Idaho National Laboratory show how to avoid industrial attacks

    A group of experts from the Idaho National Laboratory are playing hackers bent on industrial destruction.

  • How-Tos: What to do if you think you have been hacked

    Whether you were conned into sharing your details on Facebook, had your bank card cloned or use an online gaming service that was hacked, you need to be proactive about clawing back your privacy and protecting your identity.

  • How-Tos: How to Recover a Lost Phone, Tablet, or Laptop

    The bad news: At some point, your cell phone is likely to go missing. Whether it falls out of your pocket in a cab, or you leave it unattended in a public place for a few seconds only to have it swiped by someone with sticky fingers and low moral fiber, your phone is vulnerable. In fact, according to a report from security software company Symantec, 36 percent of U.S. consumers have had a cell phone disappear on them.

  • How-Tos: How to set-up a SIM lock on a BlackBerry

    If you're unlucky enough to lose your smartphone or have it stolen, as accidents happen to all of us, it's not only the hardware that could fall into the wrong hands.

  • How-Tos: How to set-up a SIM lock on an Apple iPhone

    If you're unlucky enough to lose your smartphone or have it stolen, as accidents happen to all of us, it's not only the hardware that could fall into the wrong handsets.

  • How-Tos: How to set-up a SIM lock on a Google Android device

    If you're unlucky enough to lose your smartphone or have it stolen, as accidents happen to all of us, it's not only the hardware that could fall into the wrong handsets.

  • How-Tos: How to locate a lost Apple iPhone 4

    Losing your smartphone these days is similar to losing your handbag or walle

  • How-Tos: How to locate a lost Google Android smartphone

    Losing your smartphone these days is similar to losing your handbag or wallet.

  • How-Tos: How to check your Facebook profile for security threats

    When it comes to spam, malware and malicious content, social network Facebook is fast becoming one of the hotspots on the web

  • How-Tos: How to stop your BlackBerry being stolen

    Use your phone's GPS to locate your lost phone via a map on the internet, display a message on your phone's screen e.g. 'reward if returned to…', it also lets you back-up, wipe and lock your phone remotely.


IDG UK Sites

Windows 9 release date, price, features: Microsoft teases new OS ahead of 30 September unveiling

IDG UK Sites

From the iPhone 6 to the iWatch and a new Apple TV we look at the products Apple is set to launch...

IDG UK Sites

September 2014 creative trends: 5 things you must see

IDG UK Sites

What to expect from Apple in autumn/winter 2014: iPhone 6, iPhone Air, iWatch, iPad 6, new Apple...