Categories



Still have a problem? Ask for help at our discussion forum.

Search


Advanced Search

 »  Home  »  Security
Security
Tips for security on Personal Computer, Spam filters, Cyber Cafes, Laptops, Portable Devices and Mobile Phones.

» How to protect mobile phone from theft
Published 06/19/2011 | Security | Unrated

How to protect mobile phone from theft

» How to Filter spam messages on mobile phone
Published 06/19/2011 | Security | Rating:
How to Filter spam messages on mobile phone
» How to Encrypt messages on mobile phone
Published 06/19/2011 | Security | Rating:
How to Encrypt messages on mobile phone
» How to Disable password saving on WAP and GPRS
Published 06/19/2011 | Security | Unrated
How to Disable password saving on WAP and GPRS
» How to use Anti-virus on mobile devices
Published 06/19/2011 | Security | Rating:
How to use Anti-virus on mobile devices
» How to Hide contact list on mobile phone
Published 06/19/2011 | Security | Rating:
How to Hide contact list on mobile phone
» How to Hide and password protect access to messages on mobile phone
Published 06/19/2011 | Security | Rating:
How to Hide and password protect access to messages on mobile phone
» How to Hide photos and videos on mobile phone
Published 06/19/2011 | Security | Rating:
How to Hide photos and videos on mobile phone
» How to Password protect mobile phone access
Published 06/19/2011 | Security | Rating:
How to Password protect mobile phone access
» How to Securely format drives on computer
Published 06/19/2011 | Security | Rating:
How to Securely format drives on computer
» How to Password protect a drive on computer
Published 06/19/2011 | Security | Rating:
How to Password protect a drive on computer
» How to Hide and password protect data on computer
Published 06/19/2011 | Security | Rating:
How to Hide and password protect data on computer
» How to Securely carry personal passwords
Published 06/19/2011 | Security | Rating:
How to Securely carry personal passwords
» How to Protect External data from Viruses and Worms
Published 06/19/2011 | Security | Rating:
How to Protect External data from Viruses and Worms
» How to protect your computer from snoopware
Published 06/19/2011 | Security | Rating:
How to protect your computer from snoopware
» How to protect laptop from Theft
Published 06/19/2011 | Security | Rating:
How to protect laptop from Theft
» How to Encypt hard drive or USB pen drive
Published 06/19/2011 | Security | Unrated
How to Encypt hard drive or USB pen drive
» How to Prevent shoulder surfing on computer
Published 06/19/2011 | Security | Rating:
How to Prevent shoulder surfing on computer
» How to Securely share Wi-Fi connectivity with other devices
Published 06/19/2011 | Security | Unrated
How to Securely share Wi-Fi connectivity with other devices
» How to Protect Bluetooth intrusions
Published 06/19/2011 | Security | Unrated
How to Protect Bluetooth intrusions
» How to protect home or office WiFi network intrusions
Published 06/19/2011 | Security | Rating:
How to protect home or office WiFi network intrusions
» How to use on-screen or virtual keyboards
Published 06/19/2011 | Security | Rating:
How to use on-screen or virtual keyboards
» How to Surf Safely online
Published 06/19/2011 | Security | Unrated
How to Surf Safely online
» How to Bypass Keybloggers on computer
Published 06/19/2011 | Security | Rating:
How to Bypass Keybloggers on computer
» Precautions to take while using internet in Cyber Cafes
Published 06/19/2011 | Security | Rating:
Precautions to take while using internet in Cyber Cafes
» How to Encrypt email and data on computer
Published 06/19/2011 | Security | Unrated
How to Encrypt email and data on computer
» How to Restrict access to content hosted on a personal space
Published 06/19/2011 | Security | Unrated
How to Restrict access to content hosted on a personal space
» How to Avoid leaving a search trail on computer
Published 06/19/2011 | Security | Rating:
How to Avoid leaving a search trail on computer
» How to Use internet proxies on computer
Published 06/19/2011 | Security | Unrated
How to Use internet proxies on computer
» How to Restrict children to safe areas on computer
Published 06/19/2011 | Security | Unrated
How to Restrict children to safe areas on computer
» How to use secure passwords
Published 06/19/2011 | Security | Unrated
Passwords are the keys to access personal information stored in your computer.
» How to Protect your profile on social networking sites
Published 06/19/2011 | Security | Rating:
Social networking sites are the hottest places to meet people online nowadays.
» How to Identify scams
Published 06/19/2011 | Security | Unrated
How to Identify scams
» How to Identify hoaxes
Published 06/19/2011 | Security | Unrated
How to Identify hoaxes
» How to use Spam filters
Published 06/19/2011 | Security | Rating:
Spam is a growing problem for email users, and many solutions have been proposed, from a postage fee for email to Turing tests to simply not accepting email from people you don’t know.
» How to Securely delete data
Published 06/13/2011 | Security | Rating:
Securely deleting data involves more than simply emptying the Recycle Bin.
» How to Recover lost data
Published 06/13/2011 | Security | Unrated
When you delete files, they’re never permanently deleted.
» How to Hide files and folders
Published 06/13/2011 | Security | Unrated
A hidden file or folder is one that can’t normally be seen.
» How to Back up important data
Published 06/13/2011 | Security | Unrated
What do you do in the event you lose all your data despite taking all precautionary measures.
» How to use Firewalls
Published 06/13/2011 | Security | Rating:
The internet is a gateway to sending and receiving limitless information. Like most gates, it has its share of intruders. And hence we have the gatekeepers — firewalls.
» How to use Anti-spyware
Published 06/13/2011 | Security | Rating:
Spyware collects personal information regarding what sites you visit and for how long.
» How to use Anti-Virus
Published 06/12/2011 | Security | Rating:
Viruses are the bane of many a PC user’s existence.


Popular Articles
  1. List of IrfanView Shortcuts
  2. When replying to a message in Outlook, a copy goes into the Inbox
  3. Precautions to take while using internet in Cyber Cafes
  4. List of uTorrent Shortcuts
  5. BIOS Beep Codes for AMIBIOS (American Megatrends Inc.) and Award BIOS
No popular articles found.