• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Business How-To Stories

SEE BUSINESS STORIES BY CATEGORY

  • Business
  • Business News
  • Business Best Picks
  • Business Reviews
  • Business How-To
More
    10 things I'd never, ever do as an IT professional
    How-To

    10 things I'd never, ever do as an IT professional

    It's about PC security. And it's about things that an IT professional would never do, but that less IT-savvy people do again and again. These 10 mistakes always cause headaches.
    By Arne Arnold 3 months ago
    Watch out! Your latest data breach notification might not be real
    Tip

    Watch out! Your latest data breach notification might not be real

    As always, scammers try to capitalize on any and all opportunities, as proven by this type of phishing attack.
    By Alaina Yee 4 months ago
    5 time tracking apps that help teams manage projects efficiently
    How-To

    5 time tracking apps that help teams manage projects efficiently

    We present the best time recording tools for freelancers and small businesses. All are cloud-based and flexible to use.
    By Alexander Roth 4 months ago
    How to permanently erase data on SSDs, hard drives, & USB flash drives
    How-To

    How to permanently erase data on SSDs, hard drives, & USB flash drives

    Time and again, cases are reported in which disposed hard drives still contained readable, confidential data. With a few Windows commands and the right tools, this won't happen to you.
    By Roland Freist 4 months ago
    Protect your home network with these essential router tweaks
    How-To

    Protect your home network with these essential router tweaks

    These must-do router tweaks will protect your gadgets from unwanted attacks.
    By Anders Lundberg 5 months ago
    How to find your saved passwords in Chrome
    How-To

    How to find your saved passwords in Chrome

    If you’re looking for your saved passwords, here’s where to locate them—and all their related settings.
    By Alaina Yee 5 months ago
    Raspberry Pi how-to: Turn any printer into a Wi-Fi printer
    How-To

    Raspberry Pi how-to: Turn any printer into a Wi-Fi printer

    Is your old printer working perfectly, but can't be operated on the network or wirelessly via smartphone? Then it's worth investing in a Raspberry Pi. This will give your printer a second lease of life.
    By Stephan Lamprecht 5 months ago
    How to crack your forgotten passwords
    How-To

    How to crack your forgotten passwords

    What do you do if you want to view your own data, but you don't have the right password? Fortunately for you, programmer Nir Softer offers a wide range of tools to help with this.
    By Peter Stelzel-Morawietz & Roland Freist 5 months ago
    How to auto-lock your PC when you step away (and why you should)
    How-To

    How to auto-lock your PC when you step away (and why you should)

    Here's everything you need to know about automatically locking and unlocking your PC just by stepping away and sitting back down.
    By Chris Hoffman 6 months ago
    What is the Tor network? The anonymous internet, explained
    How-To

    What is the Tor network? The anonymous internet, explained

    With the Tor network and browser, you can surf largely anonymously. Security-conscious users should be aware of the background.
    By Roland Freist 6 months ago
    How to save money and stay safe while shopping online with a VPN
    How-To

    How to save money and stay safe while shopping online with a VPN

    A VPN is an essential tool for online shopping, helping you find better deals while also keeping your data safe and private.
    By Sam Singleton 6 months ago
    Hackers know your social security number. Here’s how to stay safe
    How-To

    Hackers know your social security number. Here’s how to stay safe

    Between the Medicare, National Public Data, and other massive breaches, you should take protective measures. We break down what to do.
    By Alaina Yee 6 months ago
    LinkedIn is training AI with your data. Here's how to opt out ASAP
    Tip

    LinkedIn is training AI with your data. Here's how to opt out ASAP

    LinkedIn really wants to use your data to train its AI — so much so that you've been automatically opted in (if you're in the US).
    By Michael Crider 7 months ago
    Hardening Windows: How to protect your computer against attacks
    How-To

    Hardening Windows: How to protect your computer against attacks

    With these tools, you can significantly reduce the attack surface of Windows and effectively protect it against viruses and hackers.
    By Roland Freist 7 months ago
    How to stop Microsoft Teams from automatically launching at startup
    Tip

    How to stop Microsoft Teams from automatically launching at startup

    Tired of Microsoft Teams launching on its own when you start up your PC? Here's how to disable autostart for Teams.
    By Laura Pippig 7 months ago
    Want to safely use Windows 10 after Microsoft ends support? Meet 0Patch
    How-To

    Want to safely use Windows 10 after Microsoft ends support? Meet 0Patch

    With 0Patch, you can provide Windows 10 with updates beyond October 2025. We show you how it works.
    By Thomas Joos 7 months ago
    6 ways hackers sidestep your two-factor authentication
    How-To

    6 ways hackers sidestep your two-factor authentication

    It is considered very secure: logging in with two factors. However, this technology is also vulnerable to security gaps and social engineering. To really protect your accounts, you should be aware of these vulnerabilities.
    By Arne Arnold 7 months ago
    15 tips to give you more power in Google Contacts
    How-To

    15 tips to give you more power in Google Contacts

    A digital contact list is part of most email services — and it can do more than many people realize.
    By Martin Appel 7 months ago
    You're the best password: How to start using passkeys on Windows PCs
    How-To

    You're the best password: How to start using passkeys on Windows PCs

    You are the best password, because hackers cannot imitate or steal your physical characteristics. How to protect your PC and important online services with face or finger recognition.
    By Thomas Rau 7 months ago
    Phone scammers are using faked AI voices. Here's how to protect yourself
    Tip

    Phone scammers are using faked AI voices. Here's how to protect yourself

    Modern AI tools can clone almost anyone's voice — and they're being used to scam people.
    By Arne Arnold 7 months ago
    Windows unleashed: 7 easy programs that unlock command line powers
    How-To

    Windows unleashed: 7 easy programs that unlock command line powers

    Command line tools offer useful functions, but are difficult to use. Graphical interfaces for these tools make it easier to get started.
    By Thorsten Eggeling 7 months ago
    Has my PC been hacked? 5 ways to detect virus attacks, step-by-step
    How-To

    Has my PC been hacked? 5 ways to detect virus attacks, step-by-step

    Your computer was running fine a moment ago, but now applications are stalling and you're inundated with ads. This step-by-step guide will help you identify the type of attack as well as provide the solution.
    By Arne Arnold 8 months ago
    There's a sneaky way to make your passwords more secure: emojis 👍
    Tip

    There's a sneaky way to make your passwords more secure: emojis 👍

    Here's a creative tip that can instantly boost the complexity of your passwords without making them harder to memorize.
    By Arne Arnold 8 months ago
    8 big gotchas to watch out for in tech privacy policies
    How-To

    8 big gotchas to watch out for in tech privacy policies

    The privacy policies of internet services play an important role for end users. In this article, we'll show you the potential pitfalls and what you should look out for.
    By Thomas Joos 8 months ago
    How to test if your VPN is working
    How-To

    How to test if your VPN is working

    Not sure your VPN is working? Read this quick and easy guide to make sure you're data is staying private and secure online with a VPN.
    By Sam Singleton 8 months ago
    How to find lost gadgets (and avoid losing them)
    How-To

    How to find lost gadgets (and avoid losing them)

    Steps to find (and safeguard) a lost laptop, tablet, or phone.
    By Jared Newman 9 months ago
    7 ways Windows collects your data (and how to opt out)
    How-To

    7 ways Windows collects your data (and how to opt out)

    Microsoft tracks certain types of data on Windows 11 users. You can opt out of most of it.
    By Jon Martindale 9 months ago
    Proof: Why you can't even trust verified Amazon reviews anymore
    Tip

    Proof: Why you can't even trust verified Amazon reviews anymore

    Reviews and ratings should inspire confidence while shopping, but Amazon's system is still easy to game with fake reviews.
    By Christoph Hoffmann 9 months ago
    How to download VMware Workstation Pro's hidden installer file
    Tip

    How to download VMware Workstation Pro's hidden installer file

    VMware Workstation Pro recently became free, but the installer download is hidden away. Here's how to get it and install it.
    By Laura Pippig 9 months ago
    The Amazon triangle scam: What it is, how it works, and what to do
    Tip

    The Amazon triangle scam: What it is, how it works, and what to do

    Triangulation fraud is a type of scam that occurs on ecommerce marketplaces—including Amazon.
    By Florian Kastner 9 months ago
    How to uninstall Kaspersky antivirus before it gets banned
    How-To

    How to uninstall Kaspersky antivirus before it gets banned

    The US government is banning Kaspersky security software—so it’ll soon stop working. Here’s how to remove it from your system.
    By Alaina Yee 9 months ago
    Age verification laws threaten Pornhub, but a VPN can help
    How-To

    Age verification laws threaten Pornhub, but a VPN can help

    Recent age verification restrictions have made it difficult to access adult content in some U.S. states, except with the right VPN.
    By Sam Singleton 10 months ago
    How to master Excel: From beginner to pro
    How-To

    How to master Excel: From beginner to pro

    With these tips, you can become a true Excel magician.
    By Anders Lundberg 10 months ago
    How to transcribe audio files in Microsoft Word
    Tip

    How to transcribe audio files in Microsoft Word

    Word can automatically transcribe spoken texts. This saves time and effort when typing interviews or spoken files.
    By Roland Freist 11 months ago
    The ultimate free digital security guide: Stay safe without spending a dime
    How-To

    The ultimate free digital security guide: Stay safe without spending a dime

    Excellent security tools are available to everyone. You don’t have to pay a single cent to protect yourself.
    By Chris Hoffman 11 months ago
    Quishing and vishing: How to protect yourself from new security threats
    How-To

    Quishing and vishing: How to protect yourself from new security threats

    Quishing and vishing use modern technologies to obtain your data. Find out how you can protect yourself against these fraud methods.
    By Florian Kastner 11 months ago
    Microsoft says you should always ask this one security question to avoid scams
    Tip

    Microsoft says you should always ask this one security question to avoid scams

    Online and offline threats (including seasonal scams) are on the rise. But you can ward off the danger with four words—and a little outside help.
    By Alaina Yee 11 months ago
    Passkeys explained: How to embrace a passwordless future today
    How-To

    Passkeys explained: How to embrace a passwordless future today

    Passkeys are increasingly replacing traditional passwords. This makes logging on to the internet much more convenient and secure. You can create your first passkey in just one minute.
    By Peter Stelzel-Morawietz 11 months ago
    How Linux's insanely customizable desktop works
    How-To

    How Linux's insanely customizable desktop works

    Anyone who familiarizes themselves more intensively with Linux will, over time, gain an appreciation of the advantages and disadvantages. However, this is the last link in the graphical system.
    By Hermann Apfelböck 11 months ago
    Multiboot vs. virtual PC vs. live DVD: Which is best for multiple OSes?
    How-To

    Multiboot vs. virtual PC vs. live DVD: Which is best for multiple OSes?

    Do you want to use two or more operating systems on your desktop computer? Then there are three options: a parallel installation, a virtual PC, and booting from a live DVD or USB stick.
    By Christoph Hoffmann 12 months ago
    Google's dark web monitoring is actually pretty helpful
    Tip

    Google's dark web monitoring is actually pretty helpful

    I didn’t know the depth of this feature until my family got an early alert about the recent AT&T data leak.
    By Alaina Yee 12 months ago
    Should I disconnect my PC from the internet when I have a virus?
    Tip

    Should I disconnect my PC from the internet when I have a virus?

    It is often recommended to disconnect the internet connection in the event of a virus attack. But is it really sensible or even necessary to disconnect the computer from the internet?
    By Arne Arnold 12 months ago
    How to turn your laptop into a desktop workstation
    How-To

    How to turn your laptop into a desktop workstation

    If you're not going anywhere for a while with your laptop, why not kick back and get the full desktop experience? Here's how.
    By Michael Crider 1 year ago
    Why are your Windows Defender antivirus scans slow? Here's how to find out
    How-To

    Why are your Windows Defender antivirus scans slow? Here's how to find out

    If the scan of your hard drive with Microsoft Defender seems to take forever, it's worth finding out why.
    By Arne Arnold 1 year ago
    Windows Hello can protect your Chrome passwords. Here's how
    How-To

    Windows Hello can protect your Chrome passwords. Here's how

    This quick change to your settings blocks unauthorized use of passwords saved to your Google account.
    By Alaina Yee 1 year ago
    How to prevent (or survive) a ransomware attack
    How-To

    How to prevent (or survive) a ransomware attack

    Whether you're looking to stop a ransomware attack before it happens, or have already been victimized by this particularly nasty malware, we have tips to both thrive and survive.
    By Robert Strohmeyer 1 year ago
    Change these 5 Windows settings to improve your data privacy
    How-To

    Change these 5 Windows settings to improve your data privacy

    Would you like to improve data protection in Windows without much effort? Then simply flip five switches in the Windows 10 or 11 settings.
    By Arne Arnold 1 year ago
    How to test your VPN speed
    How-To

    How to test your VPN speed

    Many VPNs claim to have the fastest connection speeds. Here's how to check if your VPN's speeds are truly as fast as claimed.
    By Sam Singleton 1 year ago
    Meet Only Office: This free Microsoft Office rival is delightfully robust
    How-To

    Meet Only Office: This free Microsoft Office rival is delightfully robust

    Only Office is not only free, the competitor to Microsoft, Libre, and Open Office also works extremely quickly. Versions for all platforms enable teamwork and are easy to use.
    By Jörn-Erik Burkert 1 year ago
    How do I remove malware from my PC?
    How-To

    How do I remove malware from my PC?

    Removing malware from your PC could be simple – or not. Here's everything you need to know.
    By Chris Hoffman 1 year ago
    Previous 1 2 3 4 5 6 7 8 9 10 … 65 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page