1. Tech

Your suggestion is on its way!

An email with a link to:

http://netsecurity.about.com/popular.htm

was emailed to:

Thanks for sharing About.com with others!

Security: Most Popular Articles

These articles are the most popular over the last month.
How to Change the Password for Your Wi-Fi Network
It's probably been a long time since you changed your Wi-Fi password? Changing your network password is easy and takes just a minute. Let's learn how:
How to Change the Password for Your Wireless...
Have you lost the admin password to your wireless router or need to change your wireless router password because you never changed it from the factory default. Here are some tips on how to reset / change your wireless router's admin password.
The 5 Things You Should Never Post on Facebook
For the sake of the safety of you and your family, there is some information that you should never post on Facebook. Here are 5 things you should consider removing or not posting to Facebook and/or other social networks.
4 Secrets Hackers Don't Want You to Know
Are you afraid of becoming the next victim of a wireless hack attack? Here are 4 secrets that wireless hackers don't want you to know about wireless security. Learn the facts so you won't become their next victim.
Want to Hide Your Likes on Facebook? Here's How
Do you want to keep people from seeing which pages you like on Facebook? Here's how to hide your liked pages on Facebook:
Remove These 5 Things From Facebook Right Now!
There are certain bits of personal information that you may want to leave out of your Facebook profile for privacy and safety reasons. Here are 5 of them:
Is Someone You Don't Know Using Your Wi-Fi?
How can you tell if someone is using your wireless connection without your permission? Let's take a look at what you can do to detect and remove wireless freeloaders from your network.
DIY High-Tech Home Monitoring With a Dash of...
How to setup a iPhone controlled home security camera system for under $100.
Minecraft Safety Tips for Parents of Minecrafters
Has your child drank the Minecraft cool-aid? Are they all about the blocks 24/7? If you're a parent of a Minecrafter, you'll want to check out these tips on how to keep your child safe in the Minecraft universe.
How to Backup Your IP Security Cameras to the...
You've got IP security cameras setup and monitoring things 24/7 but have you thought about what happens if the bad guys steal the computer your saving your security camera footage on? Let's learn how to backup your IP security camera to off-site cloud-based storage so you can still catch the bad guys
5 Tips for Securing Your Wireless Network
Is your wireless network secure? Here are 5 steps you can take to help better secure your wireless network.
5 Signs Your Tinder Match is a Scam Bot
Is your new Tinder match too good to be true? Here are 5 warning signs that they might be a scam bot in disguise:
How to Use YouTube's Parental Controls
Are you a parent trying to figure out if there are any parental controls for YouTube? We'll show you a couple of steps you can take to try and limit your child's access to inappropriate video content
10 Things You Should Never Post on Social...
For your safety and the safety of your family and friends, avoid posting these 10 things on any social networks.
How to Change the Default Username or Password...
To secure your wireless access point or router you need to change the default username and password used to access the administration screen and change the configuration settings
How to Remove Geo-Tags From iPhone Pictures
If you don't like the idea of advertising the location where you took a picture with your iPhone, follow theses steps to remove geotags from your images:
How to Spot a Fake Friend Request
Let's learn why some people send out fake friend requests and how you can spot a false or malicious one:
How to Make a Strong Password
Tips to make your password really hard for bad guys to crack
5 Hacks Seen In Movies That Are Totally Legit
Are movie hacks for real or are they pure fiction? Check out these 5 hacks seen in the movies that are totally legit in the real world.
How to Make Your Wireless Router Invincible to...
Is your wireless router a target for hackers? The answer is yes. We'll show you the steps you need to take to hack-proof your wireless router.
How To Hide Your Wireless Network From the...
So you've got a wireless network setup but you noticed that something is slowing your internet browsing to a crawl. It could be your Internet leeching neighbor who is freeloading of your connection. Learn what you can do hide your wireless network so you can stop their bandwidth sucking gravy train.
How to Prevent Strangers From Following You on...
Are there sketchy people following you on Twitter? Learn how to get rid of unwanted followers and prevent them from following you in the first place.
How to Enable Your Wireless Router's Built-in...
Did you know that your wireless router may have a built-in firewall hidden within its configuration settings? Let's learn how to enable your wireless router's built-in firewall:
Change the Name of Your Wireless Network
The SSID is one of the pieces of information needed for a wireless device to attach to your wireless network. You should change the default SSID to something unique, but not something identifiable like your last name. This step-by-step guide will walk you through how to do that on a Linksys wireless router.
How to Secure Your Wi-Fi Hotspot Against Threats
Are you afraid of Wi-Fi freeloaders connecting to your hotspot and racking up data overages that you'll have to pay for? Learn how to keep Wi-Fi leeches and hackers from stealing your gigabytes by reading this article.
How to Delete Your iPhone's Data so That You...
Are you selling your iPhone or trading it in? There are a couple of steps you need to take to erase the data on your iPhone before you sell it.
Safeguard Your Privacy: How to Disable Facebook...
If you're a little freaked out by the fact that you can click the Facebook Places map and see everywhere you've taken a picture or checked in, you're not alone. Let's learn how to turn off this creepy feature.
10 Things You Need to Do After Being Hacked
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >You opened an
Get Free Music on Your Car's Satellite Radio...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >If you’re like
Craigslist Dangers That Everyone Should Avoid
Craigslist can be a great resource for buying and selling things. Follow these tips to make your Craigslist experience a safe and profitable one.
How to Start a High-Tech Neighborhood Watch
Is the crime rate up in your area? Are burglars treating your neighborhood like it's an all-you can-steal buffet? It's time to upgrade your neighborhood watch to version 2.0.
How to Avoid Credit Card Skimmers
Check out these tips on how to avoid credit card skimming before you swipe your card at the ATM or the gas pump.
Caller ID Spoofing
Is that really the president calling you at home or have you just been Caller ID spoofed?
How to Strengthen Your iPhone's Passcode
Are you relying on a 4-digit passcode to protect your iPhone, iPad, or iPod? There is a simple settings change that can make your screen lock passcode a lot harder to crack. Let's learn how to set a complex password on your iPhone, iPad, or iPod Touch.
See an Internet Scam/Fraud? Here's How to...
Are you a victim of an Internet-based fraud or scam? Let's look at some thing you can do to take action and report it to people who might be able to help..
Protect Your Family with These Parental Control...
This article explains all the steps necessary to enable parental controls (restrictions) on your child's iPad, iPhone, or iPod Touch.
How to Hack Your Way into Your Own Computer
Did you lock yourself out of your own computer and are trying to hack your way back in? Follow these tips to get your virtual house keys back so you don't have to start over from scratch.
How to Safeguard Yourself after Your Facebook...
Was your Facebook account just hacked? Here is what you need to do to get things back to normal if you believe your Facebook account has been compromised.
What is a Packet Sniffer?
Do you know what a packet sniffer is or what it's used for? Let's learn how packet sniffers can be both a great diagnostic tool for network technicians and a dangerous weapon in the hands of hackers.
8 Ways to Kid-Proof Your Parental Controls
How to keep your Internet Parental Controls from being circumvented by your curious kids.
Google Parental Controls
Check out these tips on how to make Google a little safer for your kids to search
Ewwww! Does My Computer Look Infected?
Do you think your computer might be ill? Could it possibly have a malware infection? Here are 10 symptoms to look for:
Review: 2GIG Technologies Go!Control Wireless...
Learn why the 2GIG Go!Control Wireless Home Security system might just be considered the iPhone of Home Security Systems.
Webcam Safety: Make Sure No One's Watching You
Are you worried that someone is spying on you via your webcam? Here are some tips for securing your webcam:
Filter MAC Addresses To Secure Your Wireless...
One way to protect your wireless network is to establish MAC address filtering. By only allowing the devices with the MAC addresses you identify to connect to your network you greatly reduce the ability for an attacker to gain unauthorized access.
Is Your Wireless Network's Name a Security Risk?
Can something as simple as your choice of wireless network name make you a more appealing target for hackers trying to crack your wireless network's password? The answer is yes and here's why:
Help! I've Been Scammed Online!
Have you just been scammed online? Here are some tips to help you stop the scammers before they make off with more of your money or open any more accounts using your identity.
Security Fixes That Might Improve Your...
Is your computer running slow? Could a security fix speed things up a bit? Learn more:
How to Secure Your IP Security Cameras
Are your IP security cameras safe from Internet voyeurs and hackers? Check out these tips to help you secure your IP Security cameras:
Prevent Thieves from Disabling "Find My iPhone"...
The Find My iPhone app is a great tool for tracking your iPhone provided thieves don't turn it off after they have stolen your phone. Let's find out how you can make it harder for thieves to turn off your iPhone's homing beacon.
Is Your Computer Vulnerable to Attacks? Learn...
Learn how to test your network firewall to see if it is doing its job?
How to Encrypt Your Wireless Network
Is your wireless network traffic safe from hackers and eavesdroppers? Learn why your current wireless encryption might not be adequate and what you can do to protect your network.
What is Packet Sniffing?
A brief article introducing the concepts of packet sniffing- how it works, what information can be gathered, what you can do to protect yourself and how you might use packet sniffing information to help protect or secure your network
How to Spot a Tech Support Scam
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Did you just get
I Just Fell For a PC Support Scam, Now What?
'Tech Support' just called you and said your computer has a problem. You let them into your computer and may have given them your credit card information before you realized it was a scam. What do you do now?
Everything You Need to Know about Intrusion...
A brief article introducing the concepts of Intrusion Detection Systems (IDS)- how they work, what sorts of things they monitor for, what the results mean to you and how you might use an IDS to monitor for and detect suspicious or malicious activity on your network and alert you so that you can respond
Tamper Data: The Firefox Addon That Hackers...
Tamper Data might just be one of the best kept hacker secrets. Learn what this innocent-looking browser plug-in can do and why web application developers should worry.
Foscam FI8905W Outdoor Wireless Security Camera...
A review of the Foscam FI8905W Outdoor IP Security Camera
5 Security Tweaks Every MacBook User Should...
5 quick and easy MacBook security tips you can use to make your MacBook an impenetrable and unstealable mobile data fortress:
Remember: Remove All Your Data Before You Sell...
It's time to get rid of your old computer and get a new one. Let's review a couple of security-related things you need to do to that old paperweight before you chuck it.
Know if Your Cordless Phone is Being Hacked
Are hackers listening in to your cordless phone conversations or is it just your nosy neighbor? Learn how to protect yourself from cordless phone eavesdroppers.
Tips For Blocking Those Stupid Robocalls
You've just won a trip to....AH CRAP! ANOTHER ROBOCALL!! Are you tired of constantly being bothered by robocalls? It's time to FIGHT BACK!! Check out these tips for blocking those stupid robocalls:
How to Hide Specific Facebook Posts From Nosy...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Let's face it,
What Makes a Password Weak or Strong?
Is your password strong enough? What makes a password weak or strong. Learn more here:
Know the Dangers of Oversharing on Facebook
When does oversharing on Facebook become dangerous? Learn about the perils of oversharing and what you should keep in mind before you share too much.
Regaining Control of Your PC After a Hack Attack
Has your PC been taken over by malicious software? Let's learn how to pull the plug on the bad guys and get things back to normal:
5 Online Dating Red Flags You Shouldn't Ignore
Are you looking for love online? Make sure you don't ignore these red flags when searching for your perfect match.
5 Home Wireless Network Security Questions...
You've got questions about wireless network security, we've got answers. Here a 5 frequently asked questions and answers about wireless security:
8 Free Tools to Monitor Your ISP for Suspicious...
Free intrusion detection (IDS) and prevention (IPS) software to help you identify and respond to malicious or suspicious network activity on your network and stop any hackers, viruses, trojans or other malware from spreading
How to Test a Suspicious Link Without Clicking it
Does that link look infected? Want to find out how to check the safety of a link without actually clicking on it? Here's how:
Securing Your New Wireless Router
Got a shiny new wireless router? Follow these tips to help make it more secure:
Your routers holds a key to keeping your kids...
Wouldn't it be nice if you could block a site so that your children can't get to it no matter what device your child is using to try and access it? Let's look at implementing parental controls at the router level.
Not Sure Whether to Use IPSec or SSL for VPN...
VPN's: IPSec vs. SSL is an article comparing and contrasting internet protocol security (IPSec) virtual private networks (VPN) with secure sockets layer (SSL) VPN's from your About.com Guide for Internet / Network Security, Tony Bradley
How to Beef Up Security on Your Home Wireless...
Think your wireless network is safe because you're using WPA2 encryption instead of WEP? Think again. Check out these tips for beefing up your wireless security:
Protect Yourself From SMiShing (SMS Phishing)...
Smishing is basically phishing scams that are sent over Short Message Service (SMS) text messages. Here are a few tips to help you tell spot SMiShing.
Is Your Wireless Network Secure? Try these Easy...
Most home routers, wireless or wired, provide some form of DHCP which automatically assigns IP addresses to devices as they connect. To reduce the possibility of an unauthorized party accessing your network, you can disable DHCP and manually assign static IP addresses to your devices
How to Avoid Getting Catfished
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Is the person
Rainbow Tables: Your Password's Worst Nightmare
Rainbow Tables may not sound like something sinister, but they are your password's worst nightmare. Rainbow Tables are yet another hacker tool in their ever growing arsenal. Don't let their cute name fool you, these things are scary.
Why You Need a Second Opinion Malware Scanner
Your virus scanner says everything is OK, but your computer is acting very strange and won't let you open any files. It's time for a second opinion malware scanner to see what your antivirus software might have missed.
How to Secure Your Facebook Timeline
Facebook's new Timeline is like a scrapbook for stalkers. Learn what you can do to secure it and make it safer.
Wondering How Port Scanning Works? Here's the...
Introduction to Port Scanning is a basic overview of TCP/IP port scanning - how to do it and what the results will or won't tell you- from your About.com Guide for Internet / Network Security, Tony Bradley
Is It Safe to Jailbreak Your iPhone?
Moral and legal implications aside, is jailbreaking your iPhone a safe endeavor? Do the benefits outweigh the risks or is it the other way around?
How to Find a Lost Bluetooth Device
Have you lost a Bluetooth headset, a Fitbit, or some other Bluetooth-enabled device? All is not lost, there may be hope. You may still be able to locate it. Let us show you how:
How to Browse the Web Invisibly
Tips to make yourself virtually invisible online so you can remain anonymous, avoid targeted advertising, evade hackers, deter online stalkers, and prevent other invasions of privacy.
Popular Myths about Copying and Sharing MP3s...
There are many misperceptions and much confusion about where the legal and ethical line is for buying, downloading, sharing or copying music. This article addresses some common myths.
5 Signs Your Online Love Interest Might be a...
Are you dating a scam bot? Here are 5 red flags that might indicate that your online love interest might be a scammer or bot in disguise.
Don't Sell or Trash Your Hard Drive Before...
Deleting data or even formatting a hard drive before selling or disposing of it is not good enough. The data can still be recovered. This article describes the steps you need to take before getting rid of a hard drive.
Turn Google Voice Into Your Own Private Bouncer...
Let's learn how to use Google Voice as your very own personal bouncer and receptionist.
How to Spot an Online Scam
Do you have a sixth sense when it comes to detecting online scams? If not, then you should check out our article on how to spot an online scam for tips on developing your scam-detecting skills.
Best Free Spyware/Adware Detection and Removal...
Free spyware removal tools and utilities to help you block, or at least detect and remove spyware and adware that can infest your computer and bog it down severely and may even perform malicious functions like capturing your passwords.
How Criminals Use Google Street View to Case...
Learn how criminals are using Google Maps Street View to help them 'case the joint' before they rob your house. We'll also show you how to protect yourself by making your property invisible in Street View so that all the bad guys will see is a big fat blur.
Keep Your iPhone Safe with These 5 Must-Have Apps
From encrypting your phone calls, to arming your security system after you've already left the house, these must-have security apps for iPhone have got you covered.
How to Test Your Facebook Privacy Settings
Are your Facebook privacy settings working as intended? Here's how to test them:
What Not to Post on Facebook While You're on...
Are you on vacation and about to post a picture of your delicious meal to Facebook? Read this article before you post, or you might come home to an empty house.
Here's Why and How to Encrypt Your Email
A brief article describing why you should encrypt your email communications and some tips on how to do it
Computer Security 101
A short quiz to test how much you learned from the first lesson of the Free Computer Security 101 course.
10 Tips for Passing the CISSP Exam
This is part of an article I wrote for CertCities.com describing my top 10 tips to help people study for and pass the CISSP certification exam. Excerpted from CertCities.com with permission
What Is A Bot?
If you read news headlines you may have heard about the overwhelming onslaught of 'bots' or 'zombies'. If you had no other context, you might think they were talking about an invasion of Earth
Don't Be a Victim of Identity Theft: Take These...
It seems like almost weekly a major security breach is announced involving the compromise of hundreds of thousands or even millions of customer's personal information. Some look to network security as the solution. Some look to legislation and penalties as the solution. The reality is that most identity theft is actually very low-tech and it is up to you to guard your own identity. These ten tips will help you protect yourself from identity theft.
The Dangers of Short Links
Learn why you should think twice before you click that short link
Think You've Been Hacked? Here's What You Need...
An article on incident response when you think you've been hacked. How do you collect clues and evidence of your perpetrator- when they attacked? what they did? How do you restore your system and how do you protect yourself from future occurrences??
How to Secure Your HomePlug Powerline Network
How secure is your HomePlug Powerline Network? Let's learn how you can implement the security features of your HomePlug Powerline Network.
How Hack-proof is Your Wireless Network?
How potentially hack-proof is your wireless network? While no network is truly hack-proof, take this quick quiz to see how well protected your network is against hacking attacks.
Free Wireless Security Tools to Help Monitor...
Free tools to monitor and protect your wireless connection or test your WEP encryption. There are wireless IDS (intrusion detection systems), wireless scanners that detect hidden networks and access points and more.
Ad-Aware Pro AE (Anniversary Edition)
A review of Ad-Aware Pro AE (Anniversary Edition). Lavasoft released new versions of Ad-Aware dubbed AE for Anniversary Edition in honor of 10 years of leading spyware and malware protection.
DIY Computer Forensics: How to Recover a...
Can you bring files back from the dead? In some cases, the answer is yes. I'm not talking about the recycle bin, I'm talking about when you deleted the stew out of them. Let's find out how to resurrect dead files.
Do I Need a Firewall?
What is a Firewall? Do you need one? Do you already have a Firewall and just don't have it turned on? We'll answer these questions and more.
Here's How Easy It Is to Create a Secure Password
Article on password security. Passwords need to be long enough and complicated enough to protect you, but not so complicated you forget them. Also, due to password cracking algorithms and the format of the encrypted password hash, sometimes a shorter password can be better than a longer password
Keep Track of Your Kids With Geofences
Geofence Technology: Parental control on steroids and likely your child's worse nightmare.
Reset Passwords With Administrator Account
If you can't remember your Windows XP password, you can use an account with Administrator rights to reset the password so you can once again access your account.
How to Disable Password Storage in IE
The Internet Explorer AutoComplete feature can remember Web addresses you have typed and form information such as your address. It can also remember your username and password for various sites. This may seem convenient, but it is also a huge security concern. Anyone who sits down at your computer is able to access your personal sites and information. This Quick Tip will show you how to turn off the AutoComplete feature, or at least disable the storage of usernames and passwords
5 Tips for Staying Safe On Twitter
Learn what you need to do to help make your twitter experience a safe one
How to Unlock Your Android Phone With Your Fitbit
Wouldn't it be great if instead of typing in a PIN or passcode to unlock your phone you could unlock it by simply being near a Bluetooth device such as a Fitbit? NOW YOU CAN!! Here's how:
Google+ Security, Privacy, and Safety
Are you new to Google+ and wondering how to set your Google+ security and privacy settings to keep the world out of your business? Here are some tips on how you can use Google+'s security and privacy options to make your Google+ experience a safe one.
Review: Alarm.com Interactive Home Alarm...
A review of alarm.com's interactive alarm monitoring service
4 Steps to Ensure You're Safe on Peer-to-Peer...
A tutorial article providing tips to use peer-to-peer (p2p) networking sites such as BitTorrent or eMule safely and securely.
iPhone Lock Screen Privacy And Security Tips
Your iPhone lock screen can be a billboard for personal information of all sorts. Your friends and nosy co-workers might see more than you want them to while it's lying unattended. Check out these lock screen privacy and security tips:
The Truth About Facebook Chain Status Updates
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Everyone and their
Stop Pop-Ups
Tips and tools to help you block pop-up ads while browsing the Web. Using these techniques can help you to reduce or eliminate pop-up ads and other Web-surfing annoyances.
The 10-Minute PC Security Tune-up
Enhancing your PC's security doesn't have to be a time-consuming endeavor. Try our 10-minute security tune-up to help rev up your security.
How to Protect Yourself from Premium SMS Text...
Did you just get a text that says you signed up for Trivia Facts, Ring Tones, or something similar? Did you get a bill saying you owe $9.99 for Premium SMS content? I bet you don't even remember signing up for it, because you probably didn't.
Why You Need a Disposable Email Account
Are you tired of SPAM. You should consider getting yourself a disposable email account. Let's look at some uses for disposable email accounts.
How to Protect Your Facebook Account with Login...
Worried about Facebook hackers gaining access to your Facebook account? Consider using Facebook Two-Factor Authentication to protect your account. We'll show you how:
How to Remotely Wipe Your Stolen or Lost...
Did someone steal your iPhone or iPad? Learn how to remotely wipe its data so that the bad guys can't steal your personal information.
Introduction to IDS (Intrusion Detection...
A short quiz to test the knowledge gained from reading the material in Introduction to Intrusion Detection Systems (IDS) from the Free Introduction to Security Tools Course
Disable SSID Broadcasting To Protect Your...
Wireless networks have a beacon which broadcasts information. Learn how to disable the SSID broadcast so no random wireless devices know your network.
Improve Web Browsing Security and Speed by...
Did you know that one simple change to the DNS settings on your router and/or computer might improve both your web browsing security and speed? In this article, we'll show you how to make the change to an Alternative (and free) DNS provider.
What is a Personal VPN Service and Why Do I...
VPNs aren't just for big corporations anymore. Learn how a personal VPN service can help protect your privacy and keep the hackers at bay.
What is a Bot Net?
is your computer part of a bot net? You might not think so, but if you've had a computer virus or had malicious software installed on your PC, then the chances are good that your computer might have been sold into slavery without you even knowing it.
How to Secure Your iPhone's Siri Assistant
Is Siri telling all your secrets? If you have a new iPhone and are using the Siri assistant, there is a potential Siri-related security hole that a simple settings change can fix.
Best Practices for Managing Your Network Firewall
Are you responsible for your organization's network firewall? Are you following best practices in your implementation of firewall rules and ACLs? Here are some general best practices you may want to consider:
How to Avoid Clickjacking Attacks
Oh SNAP! You just got Clickjacked!! What is Clickjacking and how would you even know that it happened to you? Learn more about clickjacking attacks and find out how you can avoid having your clicks jacked.
How to Zombie-Proof Your Home
Are you prepared if the walking dead come knocking at your door during a zombie apocalypse? Follow these perimeter security tips.
Coming Soon to a Coffee Shop Near You - Evil...
Is the free wireless hotspot you just connected to a legitimate one, or is it an Evil Twin hotspot setup to steal your passwords and other personal information? Let's learn about Evil Twin hotspots and how to guard against them.
What Is A BHO (Browser Helper Object)?
A frequently asked question (faq) explainin what a BHO (browser helper object) is and how they can be used to attack your computer system.
4 Tips for Recognizing a Social Engineering...
Are you about to be duped by a social engineer? Here are 4 tips for avoiding a social engineering attack.
WPA2? WEP? What's The Best Encryption To Secure...
WEP? WPA? WPA2? PSK? So many acronyms! What do they all mean? Let's learn about the different types of Wi-Fi security and encryption standards and find out which one is best for protecting your network:
Configuring Unix / Linux File and Directory...
A brief overview of file and directory access rights in Unix and Linux operating systems and using the chmod command to alter or modify file and directory permissions.
How to Avoid the 'Ammyy' Security Patch Phone...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >There is a widespread
How to Easily Backup All of Your Facebook Stuff
Is there an easy way to backup all the pictures, videos, links, etc, that you've ever posted to Facebook, in case your account gets hacked, deleted, or disabled? The answer is yes, and we'll show you how to archive your Facebook content quickly and easily.
What to Know about Foscam Security Pro for iPhone
Foscam Surveillance Pro is a great app for keeping an eye on your home from your iPhone. Check out our review for more information.
How to Lock Your Home From Your Smartphone
Did you remember to lock your front door when you left the house this morning? Let's learn how you can remotely lock up your home and even turn lights on and off via your smartphone.
Review: Logitech 700n Indoor Security Camera
Review of the Logitech Alert 700n Indoor Add-on Security Camera. An IP camera with some unique features and Mac compatibility
New Cybersecurity Threats For The New Year
New year, new threats. Let's take a look at what new cybersecurity threats may emerge in 2016 and beyond:
Facebook Friend or Facebook Hacker? Here's How...
Did your grandmother just post a Facebook link to Shocking Sexy Pics of Britney Spears? Maybe that's just how your grandma rolls, but chances are it's the hacker who just
How to Transfer a Windows XP Activation Number
Since the introduction of product activation in Microsoft products, many people have complained. For those who dread having to activate the product again with Microsoft just because they reinstall the software, this tip will show you how to transfer the activation data over.
6 Tips For Keeping Your Kids Safe Online
What's your Internet safety strategy for protecting your kids while their online? Here are 6 tips to help you protect your kids while they use the Internet on their computer or mobile device:
4 Convincing Online Scams You Might Actually...
Learn about these 4 convincing online scams now so that you don't end up falling for them in the future.
Free Antivirus Tools and Utilities
Free software to help you detect and block viruses, trojans, worms and other malware and also to clean-up any infections that may slip into your computer system.

©2016 About.com. All rights reserved.