UP

Security

What is an antivirus or a security suite? How do I choose a good security product? How do I use my computers and devices in a secure manner?

How to Create, Configure and Use a VPN Connection in Windows 8 & 8.1

How to Create, Configure and Use a VPN Connection in Windows 8 & 8.1

Virtual Private Networks (VPN) provide an easy way to extend a private network across the Internet and gain access to them when needed, in a secure manner. You may use VPN to connect to the network from your workplace, or to your home network when you are on the go. Indifferent of the reason, both Windows 8 and Windows 8.1 offer features that enable you
5 Reasons Why the Windows Firewall is One of the Best Firewalls

5 Reasons Why the Windows Firewall is One of the Best Firewalls

Since we launched 7 Tutorials, we have tested lots of security products. Over the years, we learned a lot about what it means to provide a good security product and, we also learned that the Windows Firewall is one of the best firewalls available. Here are five reasons why we believe that the Windows Firewall is awesome: 1. The Windows Firewall Offers the Best
Scan for Open Ports & Evaluate the Security of Your System with Nmap

Scan for Open Ports & Evaluate the Security of Your System with Nmap

Would you like to know how many open ports are found on each computer or device that is part of your network? Do you want to evaluate how good their firewall protection is and how vulnerable they are? Then, you should try Nmap - an open source tool for security auditing. We use it in our reviews for security solutions and we think it is
10 Features that Make Windows 8 the Most Secure Windows Yet

10 Features that Make Windows 8 the Most Secure Windows Yet

It will be quite obvious to any first-time user that Windows 8 is very different from previous versions. While the obvious interface changes will be the most talked about, the addition of a number of great security features is really worth getting excited over. Combine new features like early launch anti-malware with oldies like the Windows Firewall and you have an operating system that you
How to Remove a Trusted Windows 8 PC From Your Microsoft Account

How to Remove a Trusted Windows 8 PC From Your Microsoft Account

Having a trusted PC is a great asset to a Microsoft account holder. It allows you to synchronize passwords between trusted Windows 8 PCs and also makes managing your account easier. Rather than having to prove your identity by accessing an email or phone, Microsoft simply accepts that you are who you say your are because you're using your trusted system. While this is very
Introducing Windows 8: How to Trust a PC Using Your Microsoft Account

Introducing Windows 8: How to Trust a PC Using Your Microsoft Account

If you are a Microsoft account holder, one of the first things you should do after creating the user account is to add your PC as trusted. From an account security standpoint, having a trusted computer gives you a secure place from which you can reset your password or confirm alterations to your account, without having to prove your identity. If you are also a
Evaluate How the Apps & Drivers Installed Weaken the Security of a PC

Evaluate How the Apps & Drivers Installed Weaken the Security of a PC

Everybody knows that installing lots of drivers and software on a computer increases its vulnerability from a security standpoint. As you install stuff, the complexity increases as well as the likelihood of encountering security issues. I always wanted a tool to evaluate how the security of a system evolves while installing software that you plan to use and so far I haven't found one. Luckily,
How to Decrypt a TrueCrypt Encrypted Drive or Partition

How to Decrypt a TrueCrypt Encrypted Drive or Partition

If encrypting a partition with TrueCrypt can be a lengthy and painful process, the decryption is a lot smoother and faster. In this guide, I would like to share the steps involved, to make you feel comfortable and confident enough to go ahead with the process. NOTE: In order to decrypt a drive, it must be first mounted by TrueCrypt. If you are working
What is the Performance Impact of System Encryption With TrueCrypt

What is the Performance Impact of System Encryption With TrueCrypt

One of my recent dilemmas was: if I encrypt my computer, how much will computing performance have to suffer because of it? Will there be a big difference? If yes, in which areas? That's why I decided to run some tests on both my computers and learn more about the impact TrueCrypt encryption has on computing performance. Systems Being Tested The tests were made
How to Encrypt Your System Drive With TrueCrypt In a Multi-Boot Configuration

How to Encrypt Your System Drive With TrueCrypt In a Multi-Boot Configuration

Many people use TrueCrypt to encrypt their systems and maintain their data as safe as possible. Encrypting your computer when you have one operating system installed and one partition is relatively easy, even with TrueCrypt. But, what about encrypting your system drive when using a multi-boot setup? That's really complicated and this guide is here to help. Prerequisites - What You Must Have Before
How Security Products Are Made - A Discussion with Bitdefender

How Security Products Are Made - A Discussion with Bitdefender

One of the topics of interest at 7 Tutorials is security. Not only we write articles and tutorials about how to have a safe computing experience but we also review security products on a regular basis. One of the things we wanted to learn more about, is how security products are made: what are the steps involved? the most important challenges? etc. Luck has it
How to Backup and Restore Windows Vault Passwords

How to Backup and Restore Windows Vault Passwords

One way to use the Credential Manager is to export your Windows credentials to another Windows computer, or to back them up and import them after you reinstall Windows, so that you don't have to manually type them again. This can be useful in some scenarios and we would like to show how to backup Windows credentials and restore them when needed. Backup Your
Password Security - Turn Your Dumb Habits Into Geek Habits

Password Security - Turn Your Dumb Habits Into Geek Habits

When it comes to computing habits, people are always bad at security and passwords. We keep reusing the same password(s) over and over again and we don't realize how easy we make it for the bad guys to steal our credit card details and other important information. Even after the big fiasco that was the hacking of the PlayStation Network, both people and companies remain