How and when we find out if someone has used your computer

Hi friends, in today's tutorial we will see how we can find out when and if someone uses our personal computer. For this we will use a portable application (no installation required) called WinLogOnView that gives us information about the logins that had logged on our computer .WinLogOnView provides us with information about: - Logon ID - Username with… [Read more...]

The best settings for maximum wireless network security - video tutorial

First of all I want to let you know that this is the 1000th tutorial, hopefully we will do at least 10 times more in the coming years. The tutorials have been and are available on the site for free for everyone. You can find it using the categories, the search engine, similar tutorials, you can also find them using the google.ro search engine, write what… [Read more...]

Zemana AntiLogger or how to protect ourselves against data theft and espionage software - video tutorial

Hello friends, in today's tutorial we will talk about the measures we can take against data theft. The most dangerous infections are Keylogger, software that can record what we type on the keyboard. Keyloggers can range from the simplest, easily traceable to the most complex, very difficult to identify. They can also exist in… [Read more...]

How to hide your facebook posts from the eyes of unpleasant people - video tutorial

Hello friends, in today's tutorial we will talk about how we can isolate our Facebook posts from the eyes of unpleasant people. Surely you have people on your Facebook list who are embarrassed to post some more indecent pictures or various more unusual updates but you don't want to block them or remove them from your friends list… [Read more...]

Eliminate ransomware infections with MalwareBytes - video tutorial

Hi friends, in today's tutorial we will talk about Malwarebytes in the conditions in which we became infected with a ransomware. More recently, a new type of infection is circulating on the Internet, which blocks the user's navigation by redirecting him to a site where a message "Your computer has been blocked" is displayed, informing him that he has illegally downloaded content… [Read more...]

How to add "Scan with Windows Defender" in the context menu Windows 8 - video tutorial

Hi friends, in today's tutorial we will talk about Windows 8, more precisely we will see how we can add the option "Scan with Windows Defender" in the context menu that appears when we right-click on files, partitions, folders or external storage devices connected to the computer. As you probably already know, Windows 8 comes with Windows Defender, a software that [Read more...]

Prey, monitor and find stolen or lost laptop or phone - video tutorial

Hi friends, in today's tutorial we will talk about a software that will help us recover lost or stolen devices whether it is Android tablet, Android smartphone, iPhone with iOS, iPad, Netbook or Notebook running Windows or Linux, products Apple running the Mac OS operating system This is about Prey, an open source project that offers us software… [Read more...]

How to set or delete the password for the user account in Windows 8 - video tutorial

Hi friends, in today's tutorial we will talk about the new Windows 8 operating system. Specifically we will see how to delete the password of a user account from the Windows 8 operating system. As in other versions of Windows we have the ability to configure a password for the user account. This will help us to be safe in the future and if we… [Read more...]

Protect your computer by disabling autorun, manually or with Bitdefender USB Immunizer - video tutorial

Hi friends, today we will learn how to disable autorun, we do this to better protect our computer from viruses, as it is known, cds, dvds and memory sticks can easily infect a computer with Windows operating system, which has autorun enabled. An infected stick inserted in a PC with activated autorun, can virus immediately… [Read more...]

Keep hackers at bay with two-step verification for your Google Account - video tutorial

Hi friends, in today's tutorial we will see how we can secure your Google account so that it can be impossible to break. Specifically, we will talk about the "2-step verification" or "XNUMX step verification" option offered by Google for its users in order to protect your account very well. As the name suggests, this option adds a second step that [Read more...]