• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    BizFeed

    Digital Signatures Let You Ditch That Old Fax Machine

    E-signatures are easier than ever to make, thanks to Adobe Reader and other services. Best of all, you can say farewell to that dusty fax machine forever.
    By Angela West 13 years ago
    How-To

    How to Keep Your PC Safe With Sandboxing

    Setting up your PC to run important apps in a sandbox can help you avoid malware infections. Here's how to do it.
    By Eric Geier 13 years ago
    How-To

    Anatomy of an ATM Skimmer Scam

    Skimmers could steal your financial information at the ATM—or even at your local supermarket. Here's how to protect yourself.
    By David Daw 13 years ago
    Answer Line

    Can My Neighbor and I Share an Internet Connection?

    John asked if he and his neighbor could share one Internet access account
    By Lincoln Spector 13 years ago
    How-To

    Play Hard, Stay Safe

    You still need to keep data security in mind when playing games online, as recent in­­cidents have shown. To that end, here are some safeguards you can take.
    By Nick Mediati 13 years ago
    BizFeed

    10 Nightmares When Traveling With Tech–and How to Prevent Them

    When traveling with smartphones, tablets, and laptops, a small hiccup can derail work for your entire trip. How can you avoid these nightmares on your next business trip?
    By Angela West 13 years ago
    How-To

    Do You Speak Securitese? Five Security Terms You Should Know

    Knowing these terms won’t make you a security expert—but they’ll provide a good head start on the jargon.
    By Nick Mediati 13 years ago
    Answer Line

    Why is Taskhost Consuming So Much of My CPU?

    Mashoreen asked the Answer Line forum why taskhost.exe–usually a small background application–was consuming 50-percent of his CPU.
    By Lincoln Spector 13 years ago
    Security Alert

    7 Ways to Protect Your Printers

    Although it may be unlikely for a hacker to set a printer on fire remotely, printing security is too easily forgotten. Here's how you can make your print environment more secure.
    By Joseph Fieber 13 years ago
    How-To

    How to Lock Down Your Wireless Network

    Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.
    By Alex Wawro 13 years ago
    How-To

    Wireless Networking 101

    Setting up and maintaining a home Wi-Fi network can be a daunting task for a PC newbie. These four how-to guides will run you through some of the basics.
    By Patrick Miller 13 years ago
    Answer Line

    How Safe is WPA2-Secured WiFi?

    Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online banking
    By Lincoln Spector 13 years ago
    How-To

    Lock Down Your Wi-Fi Network: 8 Tips for Small Businesses

    By default, Wi-Fi is not secure. But these best practices will help you lock down and encrypt your company's wireless connections, both in and out of the office.
    By Eric Geier 13 years ago
    How-To

    How To Lock Down Your Wireless Network

    Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.
    By Alex Wawro 13 years ago
    Answer Line

    Remove Hard-to-Kill Malware

    Jane13434's PC is infected with something that three good security programs couldn't defeat.
    By Lincoln Spector 13 years ago
    How-To

    Get Started Managing Multiple PCs with Windows Intune

    Discover Microsoft’s new cloud-based service to remotely secure, monitor, manage, and assist PCs via the Internet. Check out the features and see how to get started.
    By Eric Geier 13 years ago
    Answer Line

    Why You Need a Router

    ZyrrahXD asked the Networking forum about the best way to split a home Internet connection between multiple computers
    By Lincoln Spector 13 years ago
    Tech Audit

    Five Steps to Mobile Device Management and Security

    As more employees bring smartphones and tablets to work, managing the devices, securing data, and fighting malware is critical.
    By Logan G. Harbaugh 13 years ago
    Answer Line

    Speed Up Windows on What Should be a Fast PC

    LiveBrianD asked the Windows forum for advise on improving performance on a slow PC
    By Lincoln Spector 13 years ago
    How-To

    How To Encrypt Your Smartphone

    Protect your photos, text messages, and other private data from prying eyes with these simple tips.
    By Alex Wawro 13 years ago
    How-To

    How to Use BitLocker to Encrypt Your Hard Drive

    Here's how to use Windows's built-in BitLocker feature to encrypt your entire hard drive.
    By Eric Geier 13 years ago
    How-To

    How to Use DiskCryptor to Encrypt Your Hard Drive

    Want to keep your important files hidden? Here's how to encrypt your entire hard drive with DiskCryptor.
    By Eric Geier 13 years ago
    How-To

    How to Use TrueCrypt to Encrypt Your Sensitive Documents

    Here's how to set up a virtual encrypted disk in TrueCrypt to protect specific important files.
    By Eric Geier 13 years ago
    How-To

    How to Encrypt Files With Your Windows PC

    Here's how to use DiskCryptor, BitLocker, or TrueCrypt to encrypt sensitive documents or even entire hard drives in Windows.
    By Eric Geier 13 years ago
    Tech Audit

    Want Better Wi-Fi? Five Things You Need

    Before you buy new networking gear, determine if coverage and speed will be good enough for all the devices on your company's network.
    By Logan G. Harbaugh 13 years ago
    How-To

    How to Email Like a Pro

    With the right tools, services, and knowledge, you can master your inbox and message handling. Evolve from email user to email power user with these six tips.
    By Rick Broida 13 years ago
    How-To

    How to Set Up a Wireless Network Webcam

    Here's how to set up a wireless network webcam to monitor your home remotely.
    By Patrick Miller 13 years ago
    How-To

    How to Use Your iOS or Android Smartphone or Tablet as a Wireless Network Camera

    Here's how to use the camera in your iPod Touch, iPhone, iPad, or Android smartphone or tablet as a network webcam.
    By Patrick Miller 13 years ago
    How-To

    How to Set Up Your Own Remote Home Monitoring System

    Here's how to use webcams and Android or iOS devices to watch your home, children, and pets from anywhere.
    By Patrick Miller 13 years ago
    Answer Line

    Will One Antivirus Program Take Care of Your Security Needs?

    Bvs1216 uses Microsoft Security Essentials. He asked the Answer Line forum if he needs to supplement it with additional protection.
    By Lincoln Spector 13 years ago
    How-To

    Improve Your Productivity With the Web

    Many of us rely on the Internet to get things done. Here are some tips and services to help you work smarter and more productively on the Web.
    By Nate Ralph 14 years ago
    How-To

    How to Set Up and Maintain a Wireless Workplace

    A well-planned Wi-Fi network can greatly improve your small business's productivity, without sacrificing security or performance.
    By Keith Schultz 14 years ago
    How-To

    Mobile Device Management for Small Business

    When it comes to managing phones and tablets in your organization, working closely with a partner and establishing clear policies are the keys to success.
    By Victor R. Garza 14 years ago
    Answer Line

    Must I Give Up XP?

    Spiderowych asked the Windows forum if he must upgrade from XP to Windows 7
    By Lincoln Spector 14 years ago
    How-To

    How to Recover a Lost Phone, Tablet, or Laptop

    These terrific tools and tips can rescue your wayward mobile devices and keep your personal data from falling into the wrong hands.
    By Armando Rodriguez and Nick Mediati 14 years ago
    Answer Line

    Turn a PC Off or Leave It On?

    Atrrocket asked if it's best to shut off a PC every night or leave it on
    By Lincoln Spector 14 years ago
    Answer Line

    Watch Out for Rogues

    MikeWik's PC got infected with rogue malware. He asked the Antivirus & Security Software forum for help.
    By Lincoln Spector 14 years ago
    Security Alert

    Why GlobalSign Made the Right Move to Suspend New Certificates

    Here's what GlobalSign's move means, and how to evaluate a certificate authority for your business website.
    By Angela West 14 years ago
    How-To

    Reader Q&A: Gmail Without Web Access, Too Much Security

    Readers ask if they can access Webmail without an Internet connection, and whether using multiple security apps is a problem–the answers are yes and yes.
    By Rick Broida 14 years ago
    Hassle-Free PC

    Don’t Overload Your PC with Security Software

    Too many security programs can slow down your PC and actually cause security problems. A better bet: stick with a minimal set of utilities.
    By Rick Broida 14 years ago
    Answer Line

    Is It Really Necessary To Logout of Web Sites?

    Keith Stanley wants to know if he should logout of Web sites that require a login
    By Lincoln Spector 14 years ago
    Security Alert

    How to Make Your Google Accounts More Secure

    Gmail has been the target of recent hacking attacks. Here are four solid tips to bolster security for you Google account information.
    By Angela West 14 years ago
    How-To

    Reader Feedback: Taskbar Tip, Gmail Management, Antivirus Help

    Readers ask for help on managing Gmail messages and speeding up antivirus scans–plus offer a quick way to pin folders to the Windows taskbar.
    By Rick Broida 14 years ago
    Answer Line

    Is Cloud-Based Backup Safe?

    Melissa has her doubts about backing up online. Could her data be stolen?
    By Lincoln Spector 14 years ago
    Hassle-Free PC

    Prevent Your Anti-Virus Software From Choking on Zip Files

    Zip files can be huge, wreaking havoc with your virus scanner–and potentially your PC as well. Here are two ways to work around the problem.
    By Rick Broida 14 years ago
    Hassle-Free PC

    Download the Latest Security Tools to Your Flash Drive with SSDownload

    Talk about convenient! With this open-source gem on your flash drive, you can quickly and easily download all the latest versions of your favorite rescue utilities.
    By Rick Broida 14 years ago
    Hassle-Free PC

    One Easy Way to Keep Neighbors From Stealing Your Wi-Fi

    What's in a name? When it comes to keeping cheapskate neighbors from pilfering your Wi-Fi, everything.
    By Rick Broida 14 years ago
    How-To

    Password Management: Idiot-Proof Tips

    Only an alphanumeric string stands between a hacker and your bank account. Here's how to make sure your passwords are safe.
    By Rick Broida 14 years ago
    How-To

    Mobile Malware Reality Check

    Smartphone malware isn’t yet as big a threat as you might think, but it’s coming. Here are some tips to help you avoid it.
    By Armando Rodriguez 14 years ago
    Answer Line

    How Dangerous is Web Surfing?

    Samantha asked about the likelihood of a web site infecting her PC, and whether certain types of web sites are more dangerous than others
    By Lincoln Spector 14 years ago
    Previous 1 … 3 4 5 6 7 8 9 10 11 12 13 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page