Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
BizFeed
Recycle Your Old iPhone for Cash
Ready to ditch that pre-4G iPhone? Here are options for earning cash back by offloading the old handset.How-To
Super Software Secrets
From obscure options to esoteric shortcuts to arcane add-ons, here are 55 hidden gems that will help you master the programs you use every day.Answer Line
Is Open Source Safe?
The IT Department won’t let Daniel Toth use open source software, believing it’s a security risk. Is it?Tech Audit
Going Digital Saves Medical Practice Money, Improves Patient Care
How a digital overhaul freed up funds and streamlined communication for doctors' offices.How-To
How to Set Up a Secure Web Tunnel
Worried about Wi-Fi security while you're working on the road? Here's how to set up your own secure Web tunnel and keep your confidential data safe.Answer Line
Share Wireless Safely with Friends
USANomad asked the Answer Line forum how to let visiting friends wirelessly access the Internet but not his PCHow-To
Keep Your Personal Data Off the Market
Looking to sell your old PC or other data-filled gadget? Here’s what you need to know to keep your personal information safe.Answer Line
You Don’t Have to Remember Your Passwords
Coolfoster asked the Answer Line forum for a secure way to remember passwordsHow-To
How to Stay Safe on Public Wi-Fi
Wi-Fi makes it easier for you to work on the go–and easier for other people to sneak a peek at your data. We'll show you how to remain secure on public wireless networks.Answer Line
Send Secure Info Over the Internet
Michael asked how to safely email passwords, account numbers, and other sensitive informationAnswer Line
The Cleanest Malware Scan
Michael Gersten wants to be absolutely sure malware can’t interfere with his security scanHow-To
Banish Seven Bad Tech Habits
Seven ways to improve your computing life by changing the way you use your computer.How-To
Bugs and Fixes: Google Attack Based on Unpatched IE Flaw
Close the hole used by Chinese hackers. Plus: An essential Adobe update.Privacy Watch
Digital Thieves Dominate Data Breaches
Theft by hacking is now the top cause of companies’ reported data losses, but a few steps can mitigate the damage.Answer Line
One or Two Anti-Malware Programs?
Jeremy Sutherland asked if it’s really a good idea to supplement your regular antivirus program with another oneHow-To
Enterprise Security Tips on a Small-Business Budget
Big or small, you can't be too careful with your business's network security. Here are some industrial-strength security tips you can implement on a shoestring budget.Tech Audit
Saving Money, Space, and Energy With Blade Virtualization
How a Rhode Island law firm is doing more with less thanks to a virtualization makeover.Answer Line
When XP is Discontinued
Robert Pepe wants to know if XP will still be safe after Microsoft ends support in 2014Answer Line
PC Maintenance: What Tasks When?
Ruption18 asked the Answer Line forum what regular chores will keep his PC healthyAnswer Line
Sudden Temporary Slowdowns
Shermlindcastle asked the Answer Line forum why his PC occasionally slows down to a crawlAnswer Line
Control the User Account Control
Alex Diluzio wants a say in when those annoying User Account Control messages pop upHow-To
How to Stop 11 Hidden Security Threats
Antivirus software and a firewall alone can't guarantee your safety. Here's how to foil the latest crop of sneaky attacks and nefarious attempts to steal your data.Hassle-Free PC
Make Your New PC Hassle-Free, Part 3: Keep It Secure
Before venturing into the wilds of the Internet, makes sure to lock down your new system. Fortunately, all you need is a router and Microsoft's own tools.How-To
Protect Your Privacy With the New Facebook Settings
Facebook's updated privacy settings give you more control over your information with less work.Answer Line
The Computer Maintenance Flash Drive
Andy Ludlum asked me to recommend portable diagnostic programs to keep on a flash drive.Answer Line
Securely Wipe a Dead Hard Drive
Dwma needs to return a dead hard drive to the manufacturer. Is there a way to first remove sensitive data?How-To
Picking the Right Security Software
Here are some considerations to keep in mind when choosing security apps.How-To
How To De-Worm Your iPhone
iPhone behaving badly? Here's how to find out if you've caught a worm–and how to get rid of it.BizFeed
Pros and Cons of Windows 7 Security
Windows 7 is the most secure version to date of Microsoft's flagship desktop operating system, but its not perfect. Here are some of the ups and downs of Windows 7 security.BizFeed
Microsoft Provides Guidance on Windows 7 Zero-Day Vulnerability
Microsoft has issued a Security Advisory related to a reported zero-day vulnerability in Windows 7. Here's how to protect your systems pending another patch.BizFeed
Protect Your PCs from Windows 7’s Zero-Day Exploit
A new zero-day bug has hit Windows 7. Here's how to keep it from harming your PCs.Tech Audit
Nonprofit Network Overhaul Assists Families of Ill Children
Memphis-based IT pros give Ronald McDonald House Charities an extreme-tech makeover.How-To
A Guide to Windows 7 Security
Lock down your PC, protect your data, and safeguard your network with Windows 7's security tools.How-To
Protect Your Privacy on Facebook and Twitter
Here's how to safeguard your identity and your personal data in the age of the social Web.Answer Line
Which Updates Should I Install?
When Dick McGraw checks Windows Update, he wonders which patches he should download and installAnswer Line
What is Antivirus 2010?
Lonerlady asked the Answer Line forum about this very insistent programHassle-Free PC
Turn an Old Floppy Into a Password Safe
If you're handy with a glue stick, you can put an unused 3.5-inch disk to good use as a "fake rock."Answer Line
Avoid Windows Encryption
Belialxyn asked the Answer Line forum how to retrieve encrypted files after reinstalling WindowsHow-To
Is Your PC Bot-Infested? Here’s How to Tell
Botnets are big, bad, and widespread — but if your system is infected, you can take several simple steps to clean it and stay safe.Net Work
The Art of Creating Strong Passwords
When it comes to password strength, educating users is just as important as enforcing policies.How-To
How to Resurrect a Crashed Hard Drive
Recover data using the freezer and Frisbee tricks and more.How-To
Bugs and Fixes: Grab an Essential Fix for Internet Explorer
Plus: Close serious holes in Office, Reader, Shockwave, and Firefox.Net Work
Better Business Endpoint Security Solutions
Integrated security suites make endpoint security simpler and more effective.How-To
E-Mail Crooks Target Webmail Accounts
A wicked e-mail scheme uses your Webmail address–and your contact list–for scams.Skeptical Shopper
Apple Cracks Down on Gift Card Fraud
Thinking about buying a discounted iTunes gift card online? Think again.Answer Line
Remove Sensitive Data Before You Sell an Old PC
Brian Ellis wants to know the best way to secure an old PC for a new ownerAnswer Line
Dump the File Cabinet and Scan Your Important Papers
Sue Bulot wants advice about digitizing all of her important papersHow-To
Streamline Your Online Experience
Use these Facebook, Twitter, and blogging tools and tips to take control of your Web presence.Hassle-Free PC