Posts under Security tag.

keylogger settings

Windows Spy Keylogger helps monitor activities on your PC

Using Keyloggers to record and monitor the keys pressed on keyboard is not something new. There are many good free keylogger software available out there and Windows Spy Keylogger is a recent entrant. Windows Spy Keylogger which helps you monitor […]

verify you identity on this pc

Verify your identity on this PC – Windows 10

It is important from a security point of view that you verify your identity on your Windows 10 PC. Verifying your identity helps you protect your data. If when accessing sensitive information from this device, if Microsoft suspects fraudulent activity, […]

Fig - How to secure dropbox

How to secure Dropbox Account in a few steps

Dropbox is one of the many cloud services that let you store your data online. Almost all free online storage provides – including Amazon, Google, OneDrive and Dropbox – seem to focus more on your photos and encourage you to […]

Fig 3 - Set up login Alerts - Facebook Security

Facebook Security Checkup lets you secure your account

Facebook contains too much data about you and yours. Users share information related to their biography, occupation, date of birth, phone numbers, etc in their profiles. This info, if hacked and passed into wrong hands, can lead to identity theft. […]


Security features in Microsoft Edge browser for Windows 10

Microsoft Edge is the new browser which Microsoft will ship with Windows 10, and is meant to replace Internet Explorer. This web browser boasts of several new security features. Let us look at some of the key security features in […]

7 Add Trusted Root Certificates

Manage Trusted Root Certificates in Windows 10 / 8

In one of our earlier posts, we have seen what Root Certificates are. There may be times, when some companies or users may feel the need to manage and configure Trusted Root Certificates, so as to prevent other users in […]

Delfix disinfection tool removal

DelFix: Remove disinfection tools from Windows PC

If you are a regular user of some online computer help forums, you might have faced this problem. When we run the anti-malware tools and troubleshooters suggested in these computer help forums, many associated files and log files land on […]

twc-password 5

Password Protect Folders in Windows without using 3rd-party software

Occasionally, Windows users might feel the need to place password protection on their folders. Chances are, these folders contain sensitive information that no one else should view, no matter the reason. There are several third-party free file encryption software available […]


What are Root Certificates for Windows?

Certificates are like a confirmation that the message sent to you is original and not tampered with. Of course, there are methods to fake the confirmations like the Lenovo’s SuperFish certificate – and we’ll talk about it in a while. […]

Expired PC Software

Your Antivirus protection has expired. What next?

The discussion around anti-malware programs generate much heat than light. This makes it necessary for us to have at least some brief idea about the virus fighting software and shun any wrong notions we have about them, if any. First, […]


Dangers of free public WiFi hotspots

Nowadays free Wi-Fi is available almost everywhere – in Cafe’s, Hotels, Offices – and even on the streets and general public places. Who does not get tempted to use free WiFi to check their mail and social media updates? Well, […]

Am I being watched

How To Avoid Being Watched Through Your Own Computer

Am I being watched through my Computer webcam? Is this a question that is troubling you? Well, most offices, IT people keep on sniffing the data packets on the network to see what is going on in the network. Some […]

What is BYON

Bring Your Own Network (BYON) … Seriously?

We are living in an era where the IT departments of businesses are still trying to fit in the Bring your Own Device or BYOD model in a secure arena. In our article on BYOD implementations, we talked of two […]

Bash Vulnerability

What is ShellShock or Bash Vulnerability?

Bash is the basic shell of UNIX, a language that is used on many platforms: from different web hosting servers to modems, toys etc. If you are a Windows user, you need not fear ShellShock vulnerability as the chances of […]

  • Recent Comments