How to Password Protect Files and Folders on Mac
You can encrypt your entire Mac drive with FileVault, but there are simpler options when it comes to password protecting individual files and folders.
5 Online Threats That Could Ruin Your Raspberry Pi Experience
You're happily using your Raspberry Pi. Perhaps it's a game center, or a media center. Hopefully you've tried a few other uses for this incredibly versatile little computer. But is it secure?
Why You Should Use Picture Passwords on Windows
Want a fun, alternate way of logging into your Windows 10 PC? Try a picture password. Here's why they're useful and how to set one up.
10 Great Tips for Protecting your Privacy on Linux
Regardless of whether you believe Linux to be the most secure OS, all operating systems have risks and vulnerabilities that can be exploited. Here's how to deal with them on Linux.
Check Now and See If Your Passwords Have Ever Been Leaked
This nifty tool lets you check any password to see if it's ever been part of a data leak.
Why It's Important to Password-Protect ZIP Files
Anyone who uses ZIP files should encrypt them with a password. Here's why this is so important and how you can do so.
How to Keep Your OneNote Notes Secret and Safe
If you use OneNote for highly sensitive documents, you need to take this precaution. You don't want your details falling into the wrong hands!
Change Your Router Password Before It Gets Hacked
If you've never changed the password for your wireless router, your network is at risk. Here's how to log into your router's settings and set a new password.
How to Make a Login Protected Area for Your Website
Creating a password protected area for your website is essential for keeping your stuff secure. Fortunately, it's easier than you may think!
560 Million Old Passwords Have Leaked Online
It's probably time to change your passwords again. Because a huge database of 560 million login credentials has been found online, waiting to be discovered by ne'er-do-wells.
How to Password Protect Windows 10
Your computer is a goldmine of personal and private information. Luckily, Windows 10 has a raft of locking methods to help protect your data. Let's take a look at how you can password protect Windows 10.
How to Find Saved Wi-Fi Passwords for Past Networks in Windows 10
If you need to remember the password of a Wi-Fi network you once connected to, here's a no-hassle way to find it in less than a minute.
Lost Samsung PIN or Passcode? How to Get Back Into Your Device
If you ever forget the PIN or password to your Samsung device, don't fret. You can recover in just a few steps -- all you need is a web browser and access to your Google account.
Cloudflare Was Leaking Data, So Change Your Passwords
Some of the most popular websites have been leaking user data onto the web. The scale of the problem isn't yet clear, but the advice, as always, is to change your passwords.
How to Import & Export Your Passwords in Chrome
Do you use Chrome to store and manage your website passwords? Then you'll want to learn this tip for importing and exporting all of those passwords at once.
Keeper Reveals the 25 Worst Passwords of 2016
2016 was notable for the amount of data breaches made public. Which gives us an insight into the worst passwords you can use right now.
PIN or Password? What's Safer to Use in Windows 10
What is a Windows 10 PIN? Here's what you need to know about Windows 10 PIN security for protecting your account.
How to Force Your PC Users to Change Passwords
Did you know that you can set the passwords of local PC accounts to expire? Here's how to set that up, and choose the number of days before passwords must be changed.
How to Password Protect Your OneNote Notebooks
OneNote is awesome for keeping track of all sorts of information. If you're keeping sensitive info in your notebooks, here's how to add a password to protect them.
Using Social Login? Take These Steps to Secure Your Accounts
If you're using a social login service (such as Google or Facebook) then you might think everything is secure. Not so -- it's time to take a look at the weaknesses of social logins.