• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Future Tech
  • PCWorld Awards
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    How-To

    How to Clean Up Your Online Reputation

    Taking control of how you appear in search results and on social networking sites may seem daunting, but it doesn't have to be difficult.
    By Sarah Jacobsson Purewal 14 years ago
    Security Alert

    Search Ruling Makes Smartphone Security More Crucial

    The California Supreme Court says cell phone data can be searched without a warrant, providing a powerful reminder to businesses to take data security seriously. Here are first steps.
    By Keir Thomas 14 years ago
    How-To

    New Year’s Tech Resolutions for Small Businesses

    Technology isn’t going to stop moving forward. It’s time to take stock of where your company’s tech is taking you–and of how to prepare for tomorrow.
    By Christopher Null 14 years ago
    Answer Line

    Could Malware Render Your PC Unbootable?

    A lot of people see a PC that won’t boot, and assume that it’s infected. That’s the least likely cause.
    By Lincoln Spector 14 years ago
    How-To

    Tech Support Showdown: Battle of the Big-Box Chains

    When seeking tech support for your small business, could your best option be the nearest outlet of a chain retailer? Here's how tech help from big brands compares with that of independent IT shops.
    By Tony Bradley 14 years ago
    Answer Line

    Protect Your Laptop

    Laptops can be stolen. Neoflyer asked the Answer Line forum for tips on protecting them.
    By Lincoln Spector 14 years ago
    Tech Audit

    Thin Clients Fit the Bill When PCs Are Overkill

    Ultraslim terminals can reduce the costs and work involved in managing desktop systems.
    By Elsa Wenzel 14 years ago
    BizFeed

    What Google’s Search Change Means For Your Website

    Now that Google tweaked its search algorithm to downgrade sites like DecorMyEyes that have bad reputations, small businesses should re-examine their search engine optimization strategies.
    By Katherine Noyes 14 years ago
    How-To

    Process Credit Cards Anywhere: 5 Smartphone Alternatives

    These 5 services let you accept credit card payments with a smartphone.
    By Zack Stern 14 years ago
    How-To

    Top Secret! Keep Your E-Mail Private and Secure

    E-mail is one of the most common methods of communication today–but if you aren’t careful, those digital messages may be intercepted or exposed.
    By Tony Bradley 14 years ago
    Answer Line

    Bank Online Safely

    NB asked me about precautions for banking online
    By Lincoln Spector 14 years ago
    How-To

    How to Tell If the Windows Firewall Is On

    Take a few minutes to confirm that this Windows security feature is active.
    By Sarah Peel 14 years ago
    How-To

    The Paranoid’s Guide to Facebook

    Facebook can be a scary place: It knows who your friends are, what you like, where you live, what you buy, and possibly even where you are right now. Here are 6 tips to help secure your personal information.
    By Logan Kugler 14 years ago
    How-To

    How to Avoid Malware

    Malware is easier to avoid than it is to remove. Avoiding malware involves a two-part strategy. Follow these guidelines for staying safe.
    By Justin Phelps 14 years ago
    How-To

    How to Tell If a File Is Infected Before You Open It

    It takes less time to check a suspicious file than it does to clean up the contamination it can cause. This guide shows you the steps to take to protect yourself.
    By Justin Phelps 14 years ago
    How-To

    Secure Your PC and Website From Firesheep Session Hijacking

    With the Firesheep plug-in, anyone on an open Wi-Fi network can hijack your session and access your accounts on Facebook, Gmail, and elsewhere. Here's how to keep your accounts safe and your business Website hijack-free.
    By Steven Andrés 14 years ago
    How-To

    How to Choose Network-Attached Storage for Your Business

    Network-attached storage can simplify your business's data management requirements. Here's what to look for when buying a NAS system.
    By Jon L. Jacobi 14 years ago
    How-To

    15 Awesome Things You Probably Shouldn’t Do

    Want to unlock your iPhone, download YouTube videos, or hack a stranger's Facebook account? It's all possible, but it's also all against the rules.
    By Dan Tynan 14 years ago
    How-To

    Lock Down Your Android Devices

    Learn how to protect the Android phones on your business network–and how to protect your business network from your Android phones.
    By Tony Bradley 14 years ago
    Tech Audit

    IT Certifications That Matter

    Here’s a quick guide to the meaning of various popular IT certifications and to the hoops they require IT pros to jump through.
    By Elsa Wenzel 14 years ago
    How-To

    Optimize Your PC, Security Apps 101, Find Folders Fast

    CCleaner got a must-have update; a reader wants to know if two security apps are better than one; Windows 7's Recent Places feature can save you time.
    By Rick Broida 14 years ago
    How-To

    How Do I Configure Windows Firewall in Windows Vista or Windows 7?

    Learn the basics of Windows Firewall and find out how to adjust it to meet your security needs.
    By Justin Phelps 14 years ago
    How-To

    The 25 Worst High-Tech Habits (and How to Fix Them)

    You’re doing a lot of stuff that's messing up your tech hardware–and your personal and professional life along with it. Here’s how to do better.
    By Christopher Null 14 years ago
    How-To

    How Do I Calibrate My Samsung HDTV?

    Your home lighting environment may require different settings than the automatic picture settings that are often designed for in-store display.
    By Patrick Nelson 14 years ago
    Linux Line

    How to Fix a Windows Infection Using Linux

    Even if you haven’t opted to run Linux on your computers, you can still use it to save malware-infected Windows machines.
    By Katherine Noyes 14 years ago
    Hassle-Free PC

    Flash Drive 101: Protecting Your Drive from Viruses

    Flash drives are carriers! Before you bring home something that could seriously infect your PC(s), clean your drive with a free and effective utility.
    By Rick Broida 14 years ago
    Answer Line

    Gain Administrator Access Without a Password

    Alexleonardme acquired a used PC but doesn't have the administrator password.
    By Lincoln Spector 14 years ago
    Tech Audit

    Choose the Right Tech Support for Your Business

    Who do you call when hardware and software take a turn for the worse? Here's how to seek IT help when your cousin's cousin can no longer handle the job.
    By Elsa Wenzel 14 years ago
    Am I Mailing Spam?
    Answer Line

    Am I Mailing Spam?

    Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her
    By Lincoln Spector 14 years ago
    The 17 Most Dangerous Places on the Web
    How-To

    The 17 Most Dangerous Places on the Web

    The scariest sites on the Net? They're not the ones you might suspect. Here's what to watch for and how to stay safe.
    By Nick Mediati 14 years ago
    Answer Line

    Should I Turn Off My Router?

    Keith Stanley asked if turning off his router will protect his computer from malware
    By Lincoln Spector 14 years ago
    How-To

    What Your Digital Photos Reveal About You

    The geotagging data contained in many mobile phone images lets strangers know exactly where you are.
    By Robert Vamosi 14 years ago
    Answer Line

    Very Slow PC

    Every now and then, Odoc’s PC slows down to a crawl. He asked the Answer Line forum for advice.
    By Lincoln Spector 14 years ago
    Tech Audit

    Make Money Selling Your Old Tech

    Get paid to unload old gear instead of letting it languish in drawers and closets. Companies are willing to buy used electronics for reselling and recycling.
    By Elsa Wenzel 14 years ago
    Answer Line

    How Did My Protected PC Get Infected?

    Bill Artman asked the Windows forum how his protected PC got infected
    By Lincoln Spector 14 years ago
    Hassle-Free PC

    Install All Your Favorite Freeware in One Fell Swoop

    Free tool Ninite lets you pick and choose the software you want, then installs it all automatically.
    By Rick Broida 14 years ago
    Hassle-Free PC

    Keep Kids Safe Online with OpenDNS FamilyShield

    This set-it-and-forget-it Web filter can protect every Internet-connected device in your house, not just the PCs. Best of all, it's free!
    By Rick Broida 14 years ago
    How-To

    How to Set Up a Virtualization Server

    Virtualizing even a small infrastructure can ease administration and reduce costs. Here's what to look for in a host server, network interfaces, power supplies, and virtualization software.
    By Paul Venezia 14 years ago
    How-To

    Give Your Phone the Power of a Desktop PC

    Cross-platform apps such as Firefox Portable Edition, OpenOffice.org Portable, and Audacity Portable will give your phone full PC capabilities.
    By Brent W. Hopkins 14 years ago
    How-To

    How to Secure or Find Your Android Smartphone

    If you ever lose your phone, you'll want to find it or make sure that if it's truly lost, you can protect your private information.
    By PCWorld Video 14 years ago
    How-To

    Small Business Networking Basics

    As a company grows, a more robust network infrastructure becomes essential. Here's a simple guide to creating a safe and reliable network that keeps data protected and workers productive.
    By PCWorld Video 14 years ago
    Tech Audit

    Manufacturer Boosts Productivity, Morale With IT Overhaul

    How a maker of industrial equipment improved productivity and reduced costs throughout the factory floor and offices.
    By David Papp for Microtek 14 years ago
    How-To

    What You Need to Know about IPv6

    A fundamental change in how the Internet works is likely to come in the next few years. Failing to plan now could cause your business to miss network security and performance benefits, and to suffer higher costs and painful outages.
    By Curtis Franklin 15 years ago
    Linux Line

    How to Install the Latest Firefox 3.6.6 in Ubuntu Linux

    Firefox 3.6.6 features browser crash prevention. Here's how to easily install it in Ubuntu Linux.
    By Brent W. Hopkins 15 years ago
    BizFeed

    Recycle Your Old iPhone for Cash

    Ready to ditch that pre-4G iPhone? Here are options for earning cash back by offloading the old handset.
    By Julie Sartain 15 years ago
    How-To

    Super Software Secrets

    From obscure options to esoteric shortcuts to arcane add-ons, here are 55 hidden gems that will help you master the programs you use every day.
    By Patrick Miller 15 years ago
    Answer Line

    Is Open Source Safe?

    The IT Department won’t let Daniel Toth use open source software, believing it’s a security risk. Is it?
    By Lincoln Spector 15 years ago
    Tech Audit

    Going Digital Saves Medical Practice Money, Improves Patient Care

    How a digital overhaul freed up funds and streamlined communication for doctors' offices.
    By Michael Cocanower for itSynergy 15 years ago
    How-To

    How to Set Up a Secure Web Tunnel

    Worried about Wi-Fi security while you're working on the road? Here's how to set up your own secure Web tunnel and keep your confidential data safe.
    By Steven Andrés 15 years ago
    Answer Line

    Share Wireless Safely with Friends

    USANomad asked the Answer Line forum how to let visiting friends wirelessly access the Internet but not his PC
    By Lincoln Spector 15 years ago
    Previous 1 … 3 4 5 6 7 8 9 10 11 12 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page