Categories



Still have a problem? Ask for help at our discussion forum.

Search


Advanced Search

 »  Home  »  Security
Security
Tips for security on Personal Computer, Spam filters, Cyber Cafes, Laptops, Portable Devices and Mobile Phones.

» How to protect mobile phone from theft
Published 06/19/2011 | Security | Unrated

How to protect mobile phone from theft

» How to Filter spam messages on mobile phone
Published 06/19/2011 | Security | Rating:
How to Filter spam messages on mobile phone
» How to Encrypt messages on mobile phone
Published 06/19/2011 | Security | Rating:
How to Encrypt messages on mobile phone
» How to Disable password saving on WAP and GPRS
Published 06/19/2011 | Security | Unrated
How to Disable password saving on WAP and GPRS
» How to use Anti-virus on mobile devices
Published 06/19/2011 | Security | Rating:
How to use Anti-virus on mobile devices
» How to Hide contact list on mobile phone
Published 06/19/2011 | Security | Rating:
How to Hide contact list on mobile phone
» How to Hide and password protect access to messages on mobile phone
Published 06/19/2011 | Security | Rating:
How to Hide and password protect access to messages on mobile phone
» How to Hide photos and videos on mobile phone
Published 06/19/2011 | Security | Rating:
How to Hide photos and videos on mobile phone
» How to Password protect mobile phone access
Published 06/19/2011 | Security | Unrated
How to Password protect mobile phone access
» How to Securely format drives on computer
Published 06/19/2011 | Security | Rating:
How to Securely format drives on computer
» How to Password protect a drive on computer
Published 06/19/2011 | Security | Rating:
How to Password protect a drive on computer
» How to Hide and password protect data on computer
Published 06/19/2011 | Security | Rating:
How to Hide and password protect data on computer
» How to Securely carry personal passwords
Published 06/19/2011 | Security | Rating:
How to Securely carry personal passwords
» How to Protect External data from Viruses and Worms
Published 06/19/2011 | Security | Rating:
How to Protect External data from Viruses and Worms
» How to protect your computer from snoopware
Published 06/19/2011 | Security | Rating:
How to protect your computer from snoopware
» How to protect laptop from Theft
Published 06/19/2011 | Security | Rating:
How to protect laptop from Theft
» How to Encypt hard drive or USB pen drive
Published 06/19/2011 | Security | Unrated
How to Encypt hard drive or USB pen drive
» How to Prevent shoulder surfing on computer
Published 06/19/2011 | Security | Rating:
How to Prevent shoulder surfing on computer
» How to Securely share Wi-Fi connectivity with other devices
Published 06/19/2011 | Security | Unrated
How to Securely share Wi-Fi connectivity with other devices
» How to Protect Bluetooth intrusions
Published 06/19/2011 | Security | Unrated
How to Protect Bluetooth intrusions
» How to protect home or office WiFi network intrusions
Published 06/19/2011 | Security | Rating:
How to protect home or office WiFi network intrusions
» How to use on-screen or virtual keyboards
Published 06/19/2011 | Security | Rating:
How to use on-screen or virtual keyboards
» How to Surf Safely online
Published 06/19/2011 | Security | Unrated
How to Surf Safely online
» How to Bypass Keybloggers on computer
Published 06/19/2011 | Security | Rating:
How to Bypass Keybloggers on computer
» Precautions to take while using internet in Cyber Cafes
Published 06/19/2011 | Security | Rating:
Precautions to take while using internet in Cyber Cafes
» How to Encrypt email and data on computer
Published 06/19/2011 | Security | Unrated
How to Encrypt email and data on computer
» How to Restrict access to content hosted on a personal space
Published 06/19/2011 | Security | Unrated
How to Restrict access to content hosted on a personal space
» How to Avoid leaving a search trail on computer
Published 06/19/2011 | Security | Rating:
How to Avoid leaving a search trail on computer
» How to Use internet proxies on computer
Published 06/19/2011 | Security | Unrated
How to Use internet proxies on computer
» How to Restrict children to safe areas on computer
Published 06/19/2011 | Security | Unrated
How to Restrict children to safe areas on computer
» How to use secure passwords
Published 06/19/2011 | Security | Unrated
Passwords are the keys to access personal information stored in your computer.
» How to Protect your profile on social networking sites
Published 06/19/2011 | Security | Rating:
Social networking sites are the hottest places to meet people online nowadays.
» How to Identify scams
Published 06/19/2011 | Security | Unrated
How to Identify scams
» How to Identify hoaxes
Published 06/19/2011 | Security | Unrated
How to Identify hoaxes
» How to use Spam filters
Published 06/19/2011 | Security | Rating:
Spam is a growing problem for email users, and many solutions have been proposed, from a postage fee for email to Turing tests to simply not accepting email from people you don’t know.
» How to Securely delete data
Published 06/13/2011 | Security | Rating:
Securely deleting data involves more than simply emptying the Recycle Bin.
» How to Recover lost data
Published 06/13/2011 | Security | Unrated
When you delete files, they’re never permanently deleted.
» How to Hide files and folders
Published 06/13/2011 | Security | Unrated
A hidden file or folder is one that can’t normally be seen.
» How to Back up important data
Published 06/13/2011 | Security | Unrated
What do you do in the event you lose all your data despite taking all precautionary measures.
» How to use Firewalls
Published 06/13/2011 | Security | Rating:
The internet is a gateway to sending and receiving limitless information. Like most gates, it has its share of intruders. And hence we have the gatekeepers — firewalls.
» How to use Anti-spyware
Published 06/13/2011 | Security | Rating:
Spyware collects personal information regarding what sites you visit and for how long.
» How to use Anti-Virus
Published 06/12/2011 | Security | Rating:
Viruses are the bane of many a PC user’s existence.


Popular Articles
  1. List of IrfanView Shortcuts
  2. When replying to a message in Outlook, a copy goes into the Inbox
  3. Precautions to take while using internet in Cyber Cafes
  4. List of uTorrent Shortcuts
  5. Windows 7 Startup and shutdown time
No popular articles found.