Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
How-To
Lock and encode your flash drives with BitLocker to Go encryption in Windows 8
How Windows 8 Professional and Enterprise users should encrypt their external drives—for free.Answer Line
Why isn’t a program malware if it installs additional, unwanted software?
The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?Hassle-Free PC
How to bypass the Windows 8 password screen
Tired of entering your password every time you boot your PC? Here's how to turn that option off.How-To
Beyond antivirus software: Eclectic PC security tools for system-wide audits
Are you doing everything necessary to keep your PC safe? These utilities can fill in the gaps left by traditional antivirus software.Answer Line
The Malicious Safety OneCare Essential Defender: Straightening out Microsoft’s confusing security tools
Microsoft has released a confusing selection of security programs over the years. Deborah Armstrong asked me to make sense of them.How-To
How (and why) to surf the web in secret
We give you essential tips and tools for hiding your IP address and surfing the Web in blissful anonymity.How-To
PC security: Your essential software toolbox
Don't fall victim! With these tools, services and tips, you can protect yourself against malware, phishing and theft.Answer Line
Gain access to your PC without the logon password
2godballdaglory asked the Answer Line how he can boot an old PC with a password he no longer remembers.Hassle-Free PC
Peek behind abbreviated Web links with Unshorten.it
Not sure where that tiny URL will lead? This handy service/browser extension will tell you if it's safe.How-To
Prepare your business for digital disaster
Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think.Hassle-Free PC
How to avoid fake Download buttons
It's all too easy to click the wrong button or link on an otherwise legitimate download page. Here are three ways to protect yourself.Answer Line
Learn to use strong passwords
Passwords protect every part of your online life. If you don't treat them properly, you're exposing yourself to a whole mess of trouble.Answer Line
Can I recover a stolen laptop?
Justin Yuen asked if it's possible to recover a stolen laptop.How-To
How to encrypt your cloud storage for free
BoxCryptor is a freemium, easy-to-use encryption program that can help you keep your data private in the cloud.Answer Line
Safely send private information over the Internet
KenWid10 asked the Antivirus & Security Software forum how best to send encrypted information to someone over the InternetHow-To
How to find happiness in a world of password madness
In the grand scheme of digital security, passwords have become self-defeating, often impotent tools. We need too many of them, and the strong ones are too hard to remember. Luckily, however, you can improve today's passwords with proper management, and tomorrow's security tech may eliminate passwords completely.Answer Line
Does the Windows logon password protect your data?
After discovering how easy it is to recover data from a hard drive removed from one PC and attached to another, Melker asked the Hard Drives, NAS Drives, Storage forum if password protecting Windows actually protects your data.Answer Line
Is Your ISP Spying On You?
Arcticsid asked the Answer Line forum if his ISP can "sit back…watch a screen, and see everything you are doing at any given time?"Answer Line
When Your PC is Likely Infected
Joyce V's computer is having trouble with security programs–a strong indication that her computer may be infected with malwareHow-To
Easy Home Automation Projects for the Weekend Warrior: Part One
This first installment in an ongoing series will cover everything you need to know about lighting control.Answer Line
My Twitter Account Has Been Hacked!
GoGators complained to the Answer Line forum about his hacked Twitter account.Answer Line
My Email Account Has Been Hijacked!
Coastie65 is nowhere near Malaysia, but friends are getting email claiming that he's stranded in Kuala Lumpur. He asked the Web Browsing and Email forum for help.How-To
Tablet Encryption 101
Thinking about encrypting your Apple or Android tablet? The process can be daunting, but here's how to do it.Answer Line
Password Protect a Flash Drive
Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash driveHow-To
How to Keep Your Employees Happy With Their Company PCs (Without Losing Control of Your IT)
Your staff will be more content if they can install their choice of software. Here’s how to give them that freedom while keeping control over your IT environment.How-To
How to Protect Your Artistic Works With a Creative Commons License
These alternative licenses improve on existing copyright law by enabling content owners to promote the sharing and dissemination of their works.How-To
Protect Yourself From DNSChanger
If the DNSChanger rootkit has infected your PC, you'll lose access to the Internet when the FBI shuts down DNSChanger's surrogate DNS servers. Here's how to determine whether you're infected, and what to do if you are.Answer Line
Recover Encrypted Files From An Old Hard Drive
Jeff Hudgins removed the hard drive from a dying computer, and via USB plugged it into a new PC. But he can't access his files. They're encrypted.How-To
The Greatest PC Mysteries–Solved!
PCWorld's editors band together to solve the greatest PC mysteries! Find out why your PC beeps on startup, what a .dat file is, how USB 2.0 and USB 3.0 differ, and much more!How-To
How to Encrypt Your Email
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.How-To
Free Tools to Wipe Your Drives Securely
Properly clear off old data from a flash drive, hard-disk drive, solid-state drive, or hybrid hard drive–at no cost.How-To
Minimize Your Exposure to Email Spoofing
Did someone really hijack your email address to mass-mail spam messages? Not necessarily. Here's what might have happened.Hassle-Free PC
Avoid Fake Online Stores with Zscaler Safe Shopping Plug-in
Now available for all browsers, this handy tool alerts you when you visit a bogus or compromised e-commerce site.Answer Line
Can I Safely Open Suspected Spam?
C. Corder asked if it's safe to open an email that landed in the spam folderAnswer Line
International Travel and Your Laptop
Your laptop could be stolen at the airport, in your hotel, or when you're walking down a street. A few precautions should provide protection.How-To
Malicious Web Apps: How to Spot Them, How to Beat Them
These days, a Web app can be malware. Here’s what you need to know about this emerging threat, and what to watch for.Hassle-Free PC
Create a Different, Secure, Easy-to-Remember Password for Every Site
Need an easy way to generate and manage your passwords? Here's a simple trick that requires no special software.How-To
Secure Your Home or Office Wi-Fi
Security holes leave even a password-protected Wi-Fi network vulnerable to hacking. Here’s how to defend yours.How-To
How to Protect Your Laptop
Follow our guide to safeguard your laptop, as well as the data that resides on it.How-To
How to Become an Ethical Hacker
Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good.How-To
How to block websites
Blocking all users of a Windows PC from opening certain websites—no matter what browser they use or what time of day they are online—is easy if you follow this guide to tweaking your browser and router.Answer Line
How Do I See Who’s Been Using My PC?
AzharIqbal asked the Other Hardware forum how to see who else is using his computer.BizFeed
When ‘Viagra’ Comments on Your Blog, and Other Spam Red Flags
Is a spammer just trying to use your site to boost their own web presence? Here's how to recognize a comment on your blog or website as spam, and how to stem the flow.How-To
How to tell if a link is safe without clicking on it
Here's what to do with a link that looks suspicious.How-To
Was Your Email Account Hacked? PwnedList Can Tell You
Concerned about your private data in the wake of a big hack? The PwnedList website helps you find out if your online accounts were leaked during a data breach.Hassle-Free PC
Root Out Rootkits with Free TDSSKiller
Can't quite clean the malware from your PC? You might be the victim of a rootkit. Kaspersky's free utility should help.How-To
What Is Deep Packet Inspection?
Though shelved for now, if legislation like SOPA and the PROTECT IP Act ever passes, it may require your ISP to start monitoring your online activity with deep packet inspection software. Make sure you understand how it works, and how you can fight back.BizFeed
Five Ways to Mix Business and Personal Data on Your Smartphone
Many people use their personal smartphones to do work. Here are five ways to access your work and personal data without carrying two handsets.Security Alert
Five Ways to Protect Your Email at Work
Hackers can exploit email to hack into your work accounts. But these simple techniques can help protect your email account and company data.Hassle-Free PC