UP

Security

What is an antivirus or security suite? How do you use your computers and devices, safely? How do you protect your privacy?

tutorial 10 Features that Make Windows 8 the Most Secure Windows Yet

10 Features that Make Windows 8 the Most Secure Windows Yet

It will be quite obvious to any first-time user that Windows 8 is very different from previous versions. While the obvious interface changes will be the most talked about, the addition of a number of great security features is really worth getting excited over. Combine new features like early launch anti-malware with oldies like the Windows Firewall and you have an operating system that
tutorial How to Remove a Trusted Windows 8 PC From Your Microsoft Account

How to Remove a Trusted Windows 8 PC From Your Microsoft Account

Having a trusted PC is a great asset to a Microsoft account holder. It allows you to synchronize passwords between trusted Windows 8 PCs and also makes managing your account easier. Rather than having to prove your identity by accessing an email or phone, Microsoft simply accepts that you are who you say your are because you're using your trusted system. While this is
tutorial Evaluate How the Apps & Drivers Installed Weaken the Security of a PC

Evaluate How the Apps & Drivers Installed Weaken the Security of a PC

Everybody knows that installing lots of drivers and software on a computer increases its vulnerability from a security standpoint. As you install stuff, the complexity increases as well as the likelihood of encountering security issues. I always wanted a tool to evaluate how the security of a system evolves while installing software that you plan to use and so far I haven't found one.
tutorial How to Decrypt a TrueCrypt Encrypted Drive or Partition

How to Decrypt a TrueCrypt Encrypted Drive or Partition

If encrypting a partition with TrueCrypt can be a lengthy and painful process, the decryption is a lot smoother and faster. In this guide, I would like to share the steps involved, to make you feel comfortable and confident enough to go ahead with the process. NOTE: In order to decrypt a drive, it must be first mounted by TrueCrypt. If you are
tutorial How to Encrypt Your System Drive With TrueCrypt In a Multi-Boot Configuration

How to Encrypt Your System Drive With TrueCrypt In a Multi-Boot Configuration

Many people use TrueCrypt to encrypt their systems and maintain their data as safe as possible. Encrypting your computer when you have one operating system installed and one partition is relatively easy, even with TrueCrypt. But, what about encrypting your system drive when using a multi-boot setup? That's really complicated and this guide is here to help. Prerequisites - What You Must Have
article How Security Products Are Made - A Discussion with Bitdefender

How Security Products Are Made - A Discussion with Bitdefender

One of the topics of interest at 7 Tutorials is security. Not only we write articles and tutorials about how to have a safe computing experience but we also review security products on a regular basis. One of the things we wanted to learn more about, is how security products are made: what are the steps involved? the most important challenges? etc. Luck has
tutorial How to Backup and Restore Windows Vault Passwords

How to Backup and Restore Windows Vault Passwords

One way to use the Credential Manager is to export your Windows credentials to another Windows computer, or to back them up and import them after you reinstall Windows, so that you don't have to manually type them again. This can be useful in some scenarios and we would like to show how to backup Windows credentials and restore them when needed. Backup
tutorial Password Security - Turn Your Dumb Habits Into Geek Habits

Password Security - Turn Your Dumb Habits Into Geek Habits

When it comes to computing habits, people are always bad at security and passwords. We keep reusing the same password(s) over and over again and we don't realize how easy we make it for the bad guys to steal our credit card details and other important information. Even after the big fiasco that was the hacking of the PlayStation Network, both people and companies