13 Tutorial Topics

Remove Filter
Member Avatar for happygeek

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …

Member Avatar for rproffitt
2
967
Member Avatar for happygeek

Got Android? Then you had better be on top of your security smarts. With Android cornering more than 80 per cent of the mobile operating system market, it's no surprise that Android devices are the number one target for the mobile malware merchants. Kaspersky Lab reckoned that Android malware attacks …

Member Avatar for happygeek
1
2K
Member Avatar for happygeek

Shadow IT is the usage of unauthorized tech by employees; usually cloud applications and services. A progression of the Bring Your Own Device (BYOD) debate, I have not said that the applications or services themselves are inherently insecure. Nor that usage is for malicious purposes. Quite the opposite is mostly …

Member Avatar for Subraa_1
3
1,000
Member Avatar for happygeek

What has Schrodinger got to do with the complex and paradoxical concept of quantum computing? The answer is that both Erwin and his hypothetical cat relate directly to this subatomic world. In fact, Schrodinger is often referred to as the father of quantum mechanics. ## Erwin who? ## [Erwin Schrodinger](https://en.wikipedia.org/wiki/Erwin_Schr%C3%B6dinger) …

Member Avatar for dkary555
4
1K
Member Avatar for happygeek

The Google Experience Launcher, as it was, first arrived exclusively for the Nexus 5 towards the end of last year. That changed recently when the renamed Google Now Launcher (GNL) appeared in the Play Store as a standalone app for Nexus devices and those handsets running Google Play Edition (GPE), …

Member Avatar for Yasar_2
0
437
Member Avatar for happygeek

The start button does make a comeback, sort of, in Windows 8.1 but it's still not enough to satisfy the die-hard 'I got Windows 8 but miss Windows 7' brigade. Not least as when you click the Windows 8.1 start button it doesn't pop up the old folder-structured start menu …

Member Avatar for goodtaste
1
1K
Member Avatar for happygeek

There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of …

Member Avatar for Stuugie
5
829
Member Avatar for happygeek

The purpose of this short and sweet tutorial is equally concise: how to get the original look and feel of the Google Chrome web browser back after installing on a Windows 8 computer. Having recently been forced into buying a new laptop, I finally took the plunge and decided to …

Member Avatar for birbilis
3
1K
Member Avatar for happygeek

There is no doubt that SEO is an important part of the online marketing machine. Lest we forget, SEO stands for Search Engine Optimization and only a fool would imagine that they could do business online without being indexed by the Gods of Search (Google, Bing, Yahoo!) However, there is …

Member Avatar for ashleydaniel
4
723
Member Avatar for happygeek

There can be no denying the impact that social media has had on business, you only have to look at the reach it has: well over a billion people between Facebook, Twitter and LinkedIn subscribers. What's more, there is no sign of the social media bubble bursting just yet. ![socmedtutorial](/attachments/small/0/socmedtutorial.jpg …

Member Avatar for EDWARD_4
7
1K
Member Avatar for happygeek

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. …

Member Avatar for Hiroshe
1
1K
Member Avatar for happygeek

One of the oldest technology truisms must be that you only realise the importance of backing up your systems after disaster strikes. This is especially true if you have no backups to turn to. There are, thankfully, few excuses aside from sheer laziness not to backup your data these days; …

Member Avatar for rubberman
0
511
Member Avatar for happygeek

When it comes to web browsers, my general rule of thumb is that the latest version is usually the most secure and this is certainly the case with Internet Explorer. However, when I started using Internet Explorer 11 on my new Windows 8.1 Pro laptop I soon discovered that latest …

Member Avatar for happygeek
1
717

The End.