Search results for: security

Articles

How to Hide Your Phone Number on Telegram After the Update.

A short tutorial showing you how to make the phone number that is linked to your Telegram account private once again. After Telegrams latest update al...

How to Lock Your Windows 10 Computer Remotely.

A short tutorial showing you how to lock your Windows 10 PC remotely. An important skill to know if your Windows 10 laptop or surface device is ever l...

How to Remove the “Warning: Google prevented a suspicious attempt to sign in to your account using your password" (Review Activity Now) Prompt From Google Services.

A short tutorial showing you how to get rid of the: "Warning: Google prevented a suspicious attempt to sign in to your account using your password" (R...

How to Get the Official TOR Browser App on Android.

A short tutorial showing you how to get the official TOR browser app on Android devices, both phones, and tablet. A safer way to browse the Internet f...

How to Force Websites to Use HTTPS Instead of Insecure HTTP.

A short tutorial showing you how to force all websites to use the new more secure HTTPS format over the old insecure HTTP format. HTTPS is designed to...

How to View the Advertisers Who Have Used Your Information From Facebook.

Since the massive Cambridge Analytica scandal, Facebook has made some very quick and interesting changes to what information users can access regardin...

How to Check if Your Facebook Data Was Leaked by Cambridge Analytica.

After weeks of waiting nervously, it’s now possible to check if you and your friends were among the 87 million Facebook users who had their data leake...

How to Block All Website Requests to Use Your Camera, Location or Microphone on Firefox Quantum.

Push notifications are an important component of many apps and programs, alerting us to incoming messages and emails. Unfortunately, though, some app...

How to Protect Your Computer and Data From Ransomware With a New Tool From Trend Micro.

In the last 12 months, the world has seen a drastic increase in Ransomware attacks, with dozens of major companies and government services falling vic...

How to Protect Windows Computers and Windows Surface Tablets From Meltdown and Spectre.

It has recently been discovered that almost all Computers and Smart devices made in the last 20 years have 2 major security flaws which go by the name...

How to Mitigate Meltdown and Spectre Flaws on Google Devices and Services.

By now you have probably heard about the massive security flaw discovered in both AMD and Intel processors as well as a few other smaller manufacturer...

How to Enable Google Chrome’s Site Isolation Security Feature.

If you are a very security minded person and like to take advantage of all the latest updates as soon as they are released. This guide will show you h...

How to Fix Electroneum (ETN) Wallet Showing 0 Balance.

Electroneum has been out for a while now and after a rocky start the price has settled in quite well. If you have been mining into your online wallet...

How to Enable BitLocker Encryption on Windows 10 Surface Devices.

If you have a Windows Surface device and have updated to Windows 10 Fall Creators, it’s now far easier to add Windows BitLocker Encryption. If you are...

How to Enable and Use BitLocker Drive Encryption in Windows 10 (Drive password protection)

With privacy and security breaches becoming more and more common, now is the perfect time to learn how to use Windows 10’s built in drive encryption a...

How to Manually Enable Flash Player in Chrome, Firefox, IE, Edge & Safari.

Ever since the recent security vulnerabilities were uncovered Adobe Flash has been in a steady decline. Many browsers now even block Flash content by...

How to Record Your Desktop Using VLC (Screen Capture)

Learn how to use VLC media player to record your desktop. (Screen Capture) Another overlooked feature of this great lightweight program.

How to Find and Remove Stalkerware From Your Computer or Mobile Devices.

Another day. Another security & privacy threat. The newest addition to the ever-growing list of threats is Stalkerware. This article will show you...

How to Configure Networks in Windows 10 (Public or Private)

Windows 10 has two main options when you are setting up a network, Private and Public. You might not think much about which type you are using but you...

How to Decrypt Files Encrypted By Ransomware, Including WannaCry (WNCRY)

Malware is not as simple as it used to be, people are getting smarter and the technology they are using is way more sophisticated than it used to be....