Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
BizFeed
Digital Signatures Let You Ditch That Old Fax Machine
E-signatures are easier than ever to make, thanks to Adobe Reader and other services. Best of all, you can say farewell to that dusty fax machine forever.How-To
How to Keep Your PC Safe With Sandboxing
Setting up your PC to run important apps in a sandbox can help you avoid malware infections. Here's how to do it.How-To
Anatomy of an ATM Skimmer Scam
Skimmers could steal your financial information at the ATM—or even at your local supermarket. Here's how to protect yourself.Answer Line
Can My Neighbor and I Share an Internet Connection?
John asked if he and his neighbor could share one Internet access accountHow-To
Play Hard, Stay Safe
You still need to keep data security in mind when playing games online, as recent incidents have shown. To that end, here are some safeguards you can take.BizFeed
10 Nightmares When Traveling With Tech–and How to Prevent Them
When traveling with smartphones, tablets, and laptops, a small hiccup can derail work for your entire trip. How can you avoid these nightmares on your next business trip?How-To
Do You Speak Securitese? Five Security Terms You Should Know
Knowing these terms won’t make you a security expert—but they’ll provide a good head start on the jargon.Answer Line
Why is Taskhost Consuming So Much of My CPU?
Mashoreen asked the Answer Line forum why taskhost.exe–usually a small background application–was consuming 50-percent of his CPU.Security Alert
7 Ways to Protect Your Printers
Although it may be unlikely for a hacker to set a printer on fire remotely, printing security is too easily forgotten. Here's how you can make your print environment more secure.How-To
How to Lock Down Your Wireless Network
Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.How-To
Wireless Networking 101
Setting up and maintaining a home Wi-Fi network can be a daunting task for a PC newbie. These four how-to guides will run you through some of the basics.Answer Line
How Safe is WPA2-Secured WiFi?
Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online bankingHow-To
Lock Down Your Wi-Fi Network: 8 Tips for Small Businesses
By default, Wi-Fi is not secure. But these best practices will help you lock down and encrypt your company's wireless connections, both in and out of the office.How-To
How To Lock Down Your Wireless Network
Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.Answer Line
Remove Hard-to-Kill Malware
Jane13434's PC is infected with something that three good security programs couldn't defeat.How-To
Get Started Managing Multiple PCs with Windows Intune
Discover Microsoft’s new cloud-based service to remotely secure, monitor, manage, and assist PCs via the Internet. Check out the features and see how to get started.Answer Line
Why You Need a Router
ZyrrahXD asked the Networking forum about the best way to split a home Internet connection between multiple computersTech Audit
Five Steps to Mobile Device Management and Security
As more employees bring smartphones and tablets to work, managing the devices, securing data, and fighting malware is critical.Answer Line
Speed Up Windows on What Should be a Fast PC
LiveBrianD asked the Windows forum for advise on improving performance on a slow PCHow-To
How To Encrypt Your Smartphone
Protect your photos, text messages, and other private data from prying eyes with these simple tips.How-To
How to Use BitLocker to Encrypt Your Hard Drive
Here's how to use Windows's built-in BitLocker feature to encrypt your entire hard drive.How-To
How to Use DiskCryptor to Encrypt Your Hard Drive
Want to keep your important files hidden? Here's how to encrypt your entire hard drive with DiskCryptor.How-To
How to Use TrueCrypt to Encrypt Your Sensitive Documents
Here's how to set up a virtual encrypted disk in TrueCrypt to protect specific important files.How-To
How to Encrypt Files With Your Windows PC
Here's how to use DiskCryptor, BitLocker, or TrueCrypt to encrypt sensitive documents or even entire hard drives in Windows.Tech Audit
Want Better Wi-Fi? Five Things You Need
Before you buy new networking gear, determine if coverage and speed will be good enough for all the devices on your company's network.How-To
How to Email Like a Pro
With the right tools, services, and knowledge, you can master your inbox and message handling. Evolve from email user to email power user with these six tips.How-To
How to Set Up a Wireless Network Webcam
Here's how to set up a wireless network webcam to monitor your home remotely.How-To
How to Use Your iOS or Android Smartphone or Tablet as a Wireless Network Camera
Here's how to use the camera in your iPod Touch, iPhone, iPad, or Android smartphone or tablet as a network webcam.How-To
How to Set Up Your Own Remote Home Monitoring System
Here's how to use webcams and Android or iOS devices to watch your home, children, and pets from anywhere.Answer Line
Will One Antivirus Program Take Care of Your Security Needs?
Bvs1216 uses Microsoft Security Essentials. He asked the Answer Line forum if he needs to supplement it with additional protection.How-To
Improve Your Productivity With the Web
Many of us rely on the Internet to get things done. Here are some tips and services to help you work smarter and more productively on the Web.How-To
How to Set Up and Maintain a Wireless Workplace
A well-planned Wi-Fi network can greatly improve your small business's productivity, without sacrificing security or performance.How-To
Mobile Device Management for Small Business
When it comes to managing phones and tablets in your organization, working closely with a partner and establishing clear policies are the keys to success.Answer Line
Must I Give Up XP?
Spiderowych asked the Windows forum if he must upgrade from XP to Windows 7How-To
How to Recover a Lost Phone, Tablet, or Laptop
These terrific tools and tips can rescue your wayward mobile devices and keep your personal data from falling into the wrong hands.Answer Line
Turn a PC Off or Leave It On?
Atrrocket asked if it's best to shut off a PC every night or leave it onAnswer Line
Watch Out for Rogues
MikeWik's PC got infected with rogue malware. He asked the Antivirus & Security Software forum for help.Security Alert
Why GlobalSign Made the Right Move to Suspend New Certificates
Here's what GlobalSign's move means, and how to evaluate a certificate authority for your business website.How-To
Reader Q&A: Gmail Without Web Access, Too Much Security
Readers ask if they can access Webmail without an Internet connection, and whether using multiple security apps is a problem–the answers are yes and yes.Hassle-Free PC
Don’t Overload Your PC with Security Software
Too many security programs can slow down your PC and actually cause security problems. A better bet: stick with a minimal set of utilities.Answer Line
Is It Really Necessary To Logout of Web Sites?
Keith Stanley wants to know if he should logout of Web sites that require a loginSecurity Alert
How to Make Your Google Accounts More Secure
Gmail has been the target of recent hacking attacks. Here are four solid tips to bolster security for you Google account information.How-To
Reader Feedback: Taskbar Tip, Gmail Management, Antivirus Help
Readers ask for help on managing Gmail messages and speeding up antivirus scans–plus offer a quick way to pin folders to the Windows taskbar.Answer Line
Is Cloud-Based Backup Safe?
Melissa has her doubts about backing up online. Could her data be stolen?Hassle-Free PC
Prevent Your Anti-Virus Software From Choking on Zip Files
Zip files can be huge, wreaking havoc with your virus scanner–and potentially your PC as well. Here are two ways to work around the problem.Hassle-Free PC
Download the Latest Security Tools to Your Flash Drive with SSDownload
Talk about convenient! With this open-source gem on your flash drive, you can quickly and easily download all the latest versions of your favorite rescue utilities.Hassle-Free PC
One Easy Way to Keep Neighbors From Stealing Your Wi-Fi
What's in a name? When it comes to keeping cheapskate neighbors from pilfering your Wi-Fi, everything.How-To
Password Management: Idiot-Proof Tips
Only an alphanumeric string stands between a hacker and your bank account. Here's how to make sure your passwords are safe.How-To
Mobile Malware Reality Check
Smartphone malware isn’t yet as big a threat as you might think, but it’s coming. Here are some tips to help you avoid it.Answer Line