• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Future Tech
  • PCWorld Awards
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Business How-To Stories

SEE BUSINESS STORIES BY CATEGORY

  • Business
  • Business News
  • Business Best Picks
  • Business Reviews
  • Business How-To
More
    Phone scammers are using faked AI voices. Here's how to protect yourself
    Tip

    Phone scammers are using faked AI voices. Here's how to protect yourself

    Modern AI tools can clone almost anyone's voice — and they're being used to scam people.
    By Arne Arnold 4 months ago
    Windows unleashed: 7 easy programs that unlock command line powers
    How-To

    Windows unleashed: 7 easy programs that unlock command line powers

    Command line tools offer useful functions, but are difficult to use. Graphical interfaces for these tools make it easier to get started.
    By Thorsten Eggeling 4 months ago
    Has my PC been hacked? 5 ways to detect virus attacks, step-by-step
    How-To

    Has my PC been hacked? 5 ways to detect virus attacks, step-by-step

    Your computer was running fine a moment ago, but now applications are stalling and you're inundated with ads. This step-by-step guide will help you identify the type of attack as well as provide the solution.
    By Arne Arnold 5 months ago
    There's a sneaky way to make your passwords more secure: emojis 👍
    Tip

    There's a sneaky way to make your passwords more secure: emojis 👍

    Here's a creative tip that can instantly boost the complexity of your passwords without making them harder to memorize.
    By Arne Arnold 5 months ago
    8 big gotchas to watch out for in tech privacy policies
    How-To

    8 big gotchas to watch out for in tech privacy policies

    The privacy policies of internet services play an important role for end users. In this article, we'll show you the potential pitfalls and what you should look out for.
    By Thomas Joos 5 months ago
    How to test if your VPN is working
    How-To

    How to test if your VPN is working

    Not sure your VPN is working? Read this quick and easy guide to make sure you're data is staying private and secure online with a VPN.
    By Sam Singleton 5 months ago
    How to find lost gadgets (and avoid losing them)
    How-To

    How to find lost gadgets (and avoid losing them)

    Steps to find (and safeguard) a lost laptop, tablet, or phone.
    By Jared Newman 6 months ago
    7 ways Windows collects your data (and how to opt out)
    How-To

    7 ways Windows collects your data (and how to opt out)

    Microsoft tracks certain types of data on Windows 11 users. You can opt out of most of it.
    By Jon Martindale 6 months ago
    Proof: Why you can't even trust verified Amazon reviews anymore
    Tip

    Proof: Why you can't even trust verified Amazon reviews anymore

    Reviews and ratings should inspire confidence while shopping, but Amazon's system is still easy to game with fake reviews.
    By Christoph Hoffmann 6 months ago
    How to download VMware Workstation Pro's hidden installer file
    Tip

    How to download VMware Workstation Pro's hidden installer file

    VMware Workstation Pro recently became free, but the installer download is hidden away. Here's how to get it and install it.
    By Laura Pippig 6 months ago
    The Amazon triangle scam: What it is, how it works, and what to do
    Tip

    The Amazon triangle scam: What it is, how it works, and what to do

    Triangulation fraud is a type of scam that occurs on ecommerce marketplaces—including Amazon.
    By Florian Kastner 6 months ago
    How to uninstall Kaspersky antivirus before it gets banned
    How-To

    How to uninstall Kaspersky antivirus before it gets banned

    The US government is banning Kaspersky security software—so it’ll soon stop working. Here’s how to remove it from your system.
    By Alaina Yee 6 months ago
    Age verification laws threaten Pornhub, but a VPN can help
    How-To

    Age verification laws threaten Pornhub, but a VPN can help

    Recent age verification restrictions have made it difficult to access adult content in some U.S. states, except with the right VPN.
    By Sam Singleton 7 months ago
    How to master Excel: From beginner to pro
    How-To

    How to master Excel: From beginner to pro

    With these tips, you can become a true Excel magician.
    By Anders Lundberg 7 months ago
    How to transcribe audio files in Microsoft Word
    Tip

    How to transcribe audio files in Microsoft Word

    Word can automatically transcribe spoken texts. This saves time and effort when typing interviews or spoken files.
    By Roland Freist 7 months ago
    The ultimate free digital security guide: Stay safe without spending a dime
    How-To

    The ultimate free digital security guide: Stay safe without spending a dime

    Excellent security tools are available to everyone. You don’t have to pay a single cent to protect yourself.
    By Chris Hoffman 8 months ago
    Quishing and vishing: How to protect yourself from new security threats
    How-To

    Quishing and vishing: How to protect yourself from new security threats

    Quishing and vishing use modern technologies to obtain your data. Find out how you can protect yourself against these fraud methods.
    By Florian Kastner 8 months ago
    Microsoft says you should always ask this one security question to avoid scams
    Tip

    Microsoft says you should always ask this one security question to avoid scams

    Online and offline threats (including seasonal scams) are on the rise. But you can ward off the danger with four words—and a little outside help.
    By Alaina Yee 8 months ago
    Passkeys explained: How to embrace a passwordless future today
    How-To

    Passkeys explained: How to embrace a passwordless future today

    Passkeys are increasingly replacing traditional passwords. This makes logging on to the internet much more convenient and secure. You can create your first passkey in just one minute.
    By Peter Stelzel-Morawietz 8 months ago
    How Linux's insanely customizable desktop works
    How-To

    How Linux's insanely customizable desktop works

    Anyone who familiarizes themselves more intensively with Linux will, over time, gain an appreciation of the advantages and disadvantages. However, this is the last link in the graphical system.
    By Hermann Apfelböck 8 months ago
    Multiboot vs. virtual PC vs. live DVD: Which is best for multiple OSes?
    How-To

    Multiboot vs. virtual PC vs. live DVD: Which is best for multiple OSes?

    Do you want to use two or more operating systems on your desktop computer? Then there are three options: a parallel installation, a virtual PC, and booting from a live DVD or USB stick.
    By Christoph Hoffmann 9 months ago
    Google's dark web monitoring is actually pretty helpful
    Tip

    Google's dark web monitoring is actually pretty helpful

    I didn’t know the depth of this feature until my family got an early alert about the recent AT&T data leak.
    By Alaina Yee 9 months ago
    Should I disconnect my PC from the internet when I have a virus?
    Tip

    Should I disconnect my PC from the internet when I have a virus?

    It is often recommended to disconnect the internet connection in the event of a virus attack. But is it really sensible or even necessary to disconnect the computer from the internet?
    By Arne Arnold 9 months ago
    How to turn your laptop into a desktop workstation
    How-To

    How to turn your laptop into a desktop workstation

    If you're not going anywhere for a while with your laptop, why not kick back and get the full desktop experience? Here's how.
    By Michael Crider 9 months ago
    Why are your Windows Defender antivirus scans slow? Here's how to find out
    How-To

    Why are your Windows Defender antivirus scans slow? Here's how to find out

    If the scan of your hard drive with Microsoft Defender seems to take forever, it's worth finding out why.
    By Arne Arnold 10 months ago
    Windows Hello can protect your Chrome passwords. Here's how
    How-To

    Windows Hello can protect your Chrome passwords. Here's how

    This quick change to your settings blocks unauthorized use of passwords saved to your Google account.
    By Alaina Yee 10 months ago
    How to prevent (or survive) a ransomware attack
    How-To

    How to prevent (or survive) a ransomware attack

    Whether you're looking to stop a ransomware attack before it happens, or have already been victimized by this particularly nasty malware, we have tips to both thrive and survive.
    By Robert Strohmeyer 10 months ago
    Change these 5 Windows settings to improve your data privacy
    How-To

    Change these 5 Windows settings to improve your data privacy

    Would you like to improve data protection in Windows without much effort? Then simply flip five switches in the Windows 10 or 11 settings.
    By Arne Arnold 10 months ago
    How to test your VPN speed
    How-To

    How to test your VPN speed

    Many VPNs claim to have the fastest connection speeds. Here's how to check if your VPN's speeds are truly as fast as claimed.
    By Sam Singleton 10 months ago
    Meet Only Office: This free Microsoft Office rival is delightfully robust
    How-To

    Meet Only Office: This free Microsoft Office rival is delightfully robust

    Only Office is not only free, the competitor to Microsoft, Libre, and Open Office also works extremely quickly. Versions for all platforms enable teamwork and are easy to use.
    By Jörn-Erik Burkert 10 months ago
    How do I remove malware from my PC?
    How-To

    How do I remove malware from my PC?

    Removing malware from your PC could be simple – or not. Here's everything you need to know.
    By Chris Hoffman 11 months ago
    Unsure if a link is safe? Use these anti-phishing tools to check
    Tip

    Unsure if a link is safe? Use these anti-phishing tools to check

    Free services from security software vendors can provide a second opinion on web addresses you’re not sure about. Here's how to use these anti-phishing services.
    By Alaina Yee 11 months ago
    How to protect your digital accounts from hackers
    How-To

    How to protect your digital accounts from hackers

    Most people today have several user accounts on different websites. Here's how to keep them safe.
    By Anders Lundberg 11 months ago
    Securing the home network - smart tricks and settings
    How-To

    Securing the home network – smart tricks and settings

    Keep the hackers away and protect your other gadgets if any device suffers a breach or malware.
    By Anders Lundberg 11 months ago
    How to get antivirus software for cheap
    Updated

    How to get antivirus software for cheap

    Upgrading from Windows Defender doesn’t have to cost a lot. Here’s how you can save serious cash on third-party antivirus apps.
    By Alaina Yee 11 months ago
    You should always memorize these two passwords
    Tip

    You should always memorize these two passwords

    If you use a password manager, you might believe you need to remember just one password only. But you really should keep at least two in your head.
    By Alaina Yee 11 months ago
    Protect and secure your Windows computer: A practical guide
    How-To

    Protect and secure your Windows computer: A practical guide

    Keep your computers safe with the right settings — and the right attitude.
    By PCWelt staff 11 months ago
    Make your VPN faster: 10 tips and tricks
    How-To

    Make your VPN faster: 10 tips and tricks

    If you use a VPN, it can slow down the speed of your internet connection. Here are tips on how to avoid this.
    By Florian Kastner and Birgit Götz 11 months ago
    How to delete your personal information from the internet
    How-To

    How to delete your personal information from the internet

    Would you like to cover your online tracks? We'll show you various methods that will still work in 2024.
    By Florian Kastner 11 months ago
    How to check whether your e-mail address is being misused
    How-To

    How to check whether your e-mail address is being misused

    How to check immediately whether your email address has been leaked on the internet. How to react correctly if you are affected. Update: Over 70 million new, compromised email addresses at haveibeenpwned.
    By Hans-Christian Dirscherl 12 months ago
    Canva: The best 5 tips & tricks for beginners
    Tip

    Canva: The best 5 tips & tricks for beginners

    New to Canva? No problem! These five tips and tricks will help you get started quickly.
    By Simon Lohmann 12 months ago
    The best Linux software for Windows switchers
    How-To

    The best Linux software for Windows switchers

    Missing programs are one of the biggest hurdles when switching to Linux. However, this does not affect every user. Apart from specialised applications, there is also a wide range of software available under Linux.
    By Thorsten Eggeling 12 months ago
    10 must-know PC security tips that keep you safe online
    How-To

    10 must-know PC security tips that keep you safe online

    Criminals are always finding new ways to steal confidential info and smuggle in malware. These tips can help keep you safe.
    By Roland Freist 1 year ago
    Your email account was hacked. What now?
    How-To

    Your email account was hacked. What now?

    Hackers hijack mail accounts to send spam unnoticed under someone else's name. But the intruders leave traces, and there are also ways to get rid of them again.
    By Roland Freist 1 year ago
    What is a zero day exploit? The most dangerous security attacks, explained
    How-To

    What is a zero day exploit? The most dangerous security attacks, explained

    Zero-day gaps are software vulnerabilities for which no patch is yet available, although there is no time to lose. Nevertheless, you are not completely without protection.
    By Roland Freist 1 year ago
    The 5 most dangerous Wi-Fi attacks, and how to fight them
    How-To

    The 5 most dangerous Wi-Fi attacks, and how to fight them

    Your router is a popular target for hackers. But if you know how such an attack works, you can take protective measures beforehand to make it impossible for hackers to take over your Wi-Fi network, router, and home network.
    By Thomas Rau 1 year ago
    How to fix audio problems on your Windows PC
    How-To

    How to fix audio problems on your Windows PC

    If your computer audio abruptly stops working, you can try these simple steps in five minutes or less.
    By Alaina Yee and Christopher Null 1 year ago
    Sick of Chrome and Edge? Switch to one of these 9 secure browsers instead
    How-To

    Sick of Chrome and Edge? Switch to one of these 9 secure browsers instead

    Chrome and Edge are not the only browsers for your computer.
    By Martin Appel 1 year ago
    How to register your own domain name
    Updated

    How to register your own domain name

    Reserve a website name before someone else beats you to it. Here's how to do that using a domain name registrar service.
    By Michael King and Alaina Yee 1 year ago
    The best Linux backup tools: Don't put it off any longer
    How-To

    The best Linux backup tools: Don't put it off any longer

    Although data backup is a rather annoying task, it's nevertheless necessary. We present tools that make backups particularly convenient and secure.
    By Thorsten Eggeling 1 year ago
    Previous 1 2 3 4 5 6 7 8 9 10 … 64 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page