Simon Batt
Section Editor for Windows
807 articles published since February 25, 2009
Page 36
About Simon Batt
Simon is a Computer Science BSc graduate who has been writing about technology since 2014, and using Windows machines since 3.1. After working for an indie game studio, he found his passion for writing and decided to use his skill set to write about all things tech.
How Malicious Chrome Extensions Spy on Businesses
Think your business network is safe? Think again---malicious Chrome browser extensions have been discovered that attack networked PCs.
How You Might Attack Your Company Network With Shadow IoT
Shadow IoT is a risk to all networks, at work and at home. But can uninvited network devices really hack industrial secrets?
What Is a Side-Channel Attack? How Hackers Crack Security Without Touching It
Side-channel attacks bypass established security with ingenious ease. How do side-channel attacks work and how can you stop them?
How Google Uses Your Phone to Predict Traffic and Plan Trips
Google Maps uses your phone's position to help plan journeys for you and other drivers. Here's how that works and how to opt out.
The Best Escape Room Games on Android and iPhone
If you're feeling trapped and want to break out, why not play the best escape room games on your smartphone.
How RFID Can Be Hacked and What You Can Do to Stay Safe
Hackers using RFID scanners can theoretically steal money via your phone's tap-to-pay app. Here's how to prevent RFID hacking.
4 Touch Screen Test Apps to Check Your Android Touchscreen
Here are the best touch screen test apps for Android to make sure your device's touchscreen is working properly.
How to Enable Two-Finger Scroll on Windows Laptops
Is two-finger scrolling not working in Windows 10? Learn how to enable it (or fix it) with these troubleshooting steps.
How to Clean Your Keyboard and Sterilize Viruses and Bacteria
Keyboard dirty and unresponsive? Keys getting sticky? Here's how to clean the keyboard on your laptop or desktop PC.
How to Spot and Avoid Fake Virus and Malware Warnings
How can you tell if a virus warning is real or fake? Here's how to spot the warning signs and identify a fake virus alert.
5 Common Internet of Things (IoT) Security Issues and Fixes
The Internet of Things (IoT) is vulnerable to all kinds of security issues and privacy risks. Here's what you need to know.
No Birthday Cake? Send a Virtual Cake With These 6 Celebratory Sites
If you can't send a real cake to someone, send a digital birthday cake instead! Make a birthday special with these websites.
What Is a Ping? Is Zero Ping Possible? The Basics of Ping, Explained
Trying to improve internet speed for online gaming? The best gaming performance requires zero ping. Here's how to get that.
What Is a Wireless "Dead Zone"? Here's How to Spot and Fix Them
Wi-Fi can suffer interference and obstructions. Learn how to spot and fix wireless "dead zones" or "dead spots" in your home.
What's the Difference Between FTTC and FTTP? Fiber Internet Explained
What is FTTP? What does FTTH mean? Will you get faster internet than with FTTC? Here's what you need to know about fiber internet.
What Is a Website Cookie? How Cookies Affect Your Online Privacy
You've heard of internet cookies, but what exactly are they? What do they have to do with your privacy? Here's what you need to know.
How to Collect Contact Info Using Google Forms on Mobile Devices
Want to quickly survey a large number of people? Need to take a poll for free? Here's how easy it is with Google Forms.
What Are Facebook Shadow Profiles?
Even if you never sign up to Facebook, the social network has information on you in the form of Facebook shadow profiles.
How Your Data on Facebook Is Collected and Used to Win Elections
Can Facebook influence elections? How can you stop your Facebook data being harvested and manipulated by political campaigns?
Working from Home? 7 Ways to Secure Your Home Office
If you're moving to a home office, digital security becomes even more vital. Here are 7 ways to secure your home office security.