Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
How-To
Keep Malware Off Your Android Phone: 5 Quick Tips
As the list of infected Android apps grows, here is our advice on how to protect your Android smartphone from malware.BizFeed
How to Browse Privately on Public Wi-Fi for Free
With a handful of free software tools, you can fight off snoopers when using public Wi-Fi. Here's how, step by step.How-To
Free Internet Security Tools, Lightweight PDF Reader
Protect yourself for free with Flagfox for Firefox and BufferZone Pro; try the streamlined Sumatra PDF for basic needs.How-To
Repair Your Windows PC With System Restore
The System Restore feature in Windows 7 lets you troubleshoot and repair your system by traveling back to a time before the problem began.How-To
Must-Have Tools and Tricks
Learn how to get a disposable e-mail address, stop Windows 7 from automatically resizing windows, and recover data from a dead laptop.Hassle-Free PC
Safe Browsing: Flagfox Shows the Location of the Site You’re Visiting
This clever Firefox plug-in shows shows you what country is hosting the page you're viewing–useful for ferreting out phishing sites. It's loaded with other handy tools as well.How-To
How to Run an Online Background Check for Free
Find out what you need to know about someone–or find out the information that's out there about you–without spending any money.How-To
15 Common Small-Business Tech Mistakes (and How to Avoid Them)
15 Common Tech Mistakes Small-Businesses Make (and How to Avoid Them)BizFeed
Get a Dial-Up Connection When Disaster Strikes
Whether a natural disaster or something more nefarious causes you to lose an Internet connection, dial-up can offer online access when all else fails.How-To
Get Internet Access When Your Government Shuts It Down
Does your government have an Internet kill-switch? Read our guide to Guerrilla Networking and be prepared for when the lines get cut.How-To
The 21 Greatest PC Mysteries–Solved!
Find out why your documents won’t print, where your downloads disappear to, what a .dat file is, how those infernal toolbars invaded your browser, and much more.How-To
How to Tell Whether a Website Is Safe
A free browser plug-in will help you avoid sites that might threaten your PC.How-To
Is It Really Necessary to Update Windows?
Patches for Windows seem to arrive in a constant, annoying stream, but avoiding them is a bad idea.How-To
Why Do Adobe Reader and Java Update So Often?
The frequent patches for Reader and Java may seem like a hassle, but installing them is important.How-To
How to Avoid Unwanted Browser Toolbars
If you're not careful, your browser might become cluttered with toolbars–both benign and malicious.How-To
How to Completely Erase a Hard Drive
These tips and tricks will help you destroy old data and make sure that your old drives are wiped clean.How-To
Smartphone Security: How to Keep Your Handset Safe
As smartphones grow more powerful than the PCs we used just a decade ago, they increasingly become the target of scam artists. Here's how to beef up security for your iOS, Android, BlackBerry, or Windows handset.How-To
How to Clean Up Your Online Reputation
Taking control of how you appear in search results and on social networking sites may seem daunting, but it doesn't have to be difficult.Security Alert
Search Ruling Makes Smartphone Security More Crucial
The California Supreme Court says cell phone data can be searched without a warrant, providing a powerful reminder to businesses to take data security seriously. Here are first steps.How-To
New Year’s Tech Resolutions for Small Businesses
Technology isn’t going to stop moving forward. It’s time to take stock of where your company’s tech is taking you–and of how to prepare for tomorrow.Answer Line
Could Malware Render Your PC Unbootable?
A lot of people see a PC that won’t boot, and assume that it’s infected. That’s the least likely cause.How-To
Tech Support Showdown: Battle of the Big-Box Chains
When seeking tech support for your small business, could your best option be the nearest outlet of a chain retailer? Here's how tech help from big brands compares with that of independent IT shops.Answer Line
Protect Your Laptop
Laptops can be stolen. Neoflyer asked the Answer Line forum for tips on protecting them.Tech Audit
Thin Clients Fit the Bill When PCs Are Overkill
Ultraslim terminals can reduce the costs and work involved in managing desktop systems.BizFeed
What Google’s Search Change Means For Your Website
Now that Google tweaked its search algorithm to downgrade sites like DecorMyEyes that have bad reputations, small businesses should re-examine their search engine optimization strategies.How-To
Process Credit Cards Anywhere: 5 Smartphone Alternatives
These 5 services let you accept credit card payments with a smartphone.How-To
Top Secret! Keep Your E-Mail Private and Secure
E-mail is one of the most common methods of communication today–but if you aren’t careful, those digital messages may be intercepted or exposed.How-To
How to Tell If the Windows Firewall Is On
Take a few minutes to confirm that this Windows security feature is active.How-To
The Paranoid’s Guide to Facebook
Facebook can be a scary place: It knows who your friends are, what you like, where you live, what you buy, and possibly even where you are right now. Here are 6 tips to help secure your personal information.How-To
How to Avoid Malware
Malware is easier to avoid than it is to remove. Avoiding malware involves a two-part strategy. Follow these guidelines for staying safe.How-To
How to Tell If a File Is Infected Before You Open It
It takes less time to check a suspicious file than it does to clean up the contamination it can cause. This guide shows you the steps to take to protect yourself.How-To
Secure Your PC and Website From Firesheep Session Hijacking
With the Firesheep plug-in, anyone on an open Wi-Fi network can hijack your session and access your accounts on Facebook, Gmail, and elsewhere. Here's how to keep your accounts safe and your business Website hijack-free.How-To
How to Choose Network-Attached Storage for Your Business
Network-attached storage can simplify your business's data management requirements. Here's what to look for when buying a NAS system.How-To
15 Awesome Things You Probably Shouldn’t Do
Want to unlock your iPhone, download YouTube videos, or hack a stranger's Facebook account? It's all possible, but it's also all against the rules.How-To
Lock Down Your Android Devices
Learn how to protect the Android phones on your business network–and how to protect your business network from your Android phones.Tech Audit
IT Certifications That Matter
Here’s a quick guide to the meaning of various popular IT certifications and to the hoops they require IT pros to jump through.How-To
Optimize Your PC, Security Apps 101, Find Folders Fast
CCleaner got a must-have update; a reader wants to know if two security apps are better than one; Windows 7's Recent Places feature can save you time.How-To
How Do I Configure Windows Firewall in Windows Vista or Windows 7?
Learn the basics of Windows Firewall and find out how to adjust it to meet your security needs.How-To
The 25 Worst High-Tech Habits (and How to Fix Them)
You’re doing a lot of stuff that's messing up your tech hardware–and your personal and professional life along with it. Here’s how to do better.How-To
How Do I Calibrate My Samsung HDTV?
Your home lighting environment may require different settings than the automatic picture settings that are often designed for in-store display.Linux Line
How to Fix a Windows Infection Using Linux
Even if you haven’t opted to run Linux on your computers, you can still use it to save malware-infected Windows machines.Hassle-Free PC
Flash Drive 101: Protecting Your Drive from Viruses
Flash drives are carriers! Before you bring home something that could seriously infect your PC(s), clean your drive with a free and effective utility.Answer Line
Gain Administrator Access Without a Password
Alexleonardme acquired a used PC but doesn't have the administrator password.Tech Audit
Choose the Right Tech Support for Your Business
Who do you call when hardware and software take a turn for the worse? Here's how to seek IT help when your cousin's cousin can no longer handle the job.Answer Line
Am I Mailing Spam?
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from herHow-To
The 17 Most Dangerous Places on the Web
The scariest sites on the Net? They're not the ones you might suspect. Here's what to watch for and how to stay safe.Answer Line
Should I Turn Off My Router?
Keith Stanley asked if turning off his router will protect his computer from malwareHow-To
What Your Digital Photos Reveal About You
The geotagging data contained in many mobile phone images lets strangers know exactly where you are.Answer Line