", "config" : { " ": { "groups": "default" } } } } UP

Security

What is an antivirus or a security suite? How do I choose a good security product? How do I use my computers and devices in a secure manner?

Introducing Windows 8.1: How to Improve Your Privacy When Using Apps

Windows 8.1 brings many welcome changes, some of which have not been communicated very well by Microsoft. One of the lesser known changes is that Windows 8.1 has very good privacy controls for working with Windows Store apps. As you will see in this tutorial, these...

Introducing Windows 8.1: How to Synchronize & Back Up Your Settings

A great feature, first introduced in Windows 8 and further improved in Windows 8.1, is the ability to synchronize your important Windows settings through the SkyDrive service. What's new in Windows 8.1 is that it can also back up your settings automatically, so that you can...

How to Create, Configure and Use a VPN Connection in Windows 8 & 8.1

Virtual Private Networks (VPN) provide an easy way to extend a private network across the Internet and gain access to them when needed, in a secure manner. You may use VPN to connect to the network from your workplace, or to your home network when you are on the go. Indifferent...

5 Reasons Why the Windows Firewall is One of the Best Firewalls

Since we launched 7 Tutorials, we have tested lots of security products. Over the years, we learned a lot about what it means to provide a good security product and, we also learned that the Windows Firewall is one of the best firewalls available. Here are five...

Scan for Open Ports & Evaluate the Security of Your System with Nmap

Would you like to know how many open ports are found on each computer or device that is part of your network? Do you want to evaluate how good their firewall protection is and how vulnerable they are? Then, you should try Nmap - an open source tool for security auditing....

10 Features that Make Windows 8 the Most Secure Windows Yet

It will be quite obvious to any first-time user that Windows 8 is very different from previous versions. While the obvious interface changes will be the most talked about, the addition of a number of great security features is really worth getting excited over. Combine new features...

How to Remove a Trusted Windows 8 PC From Your Microsoft Account

Having a trusted PC is a great asset to a Microsoft account holder. It allows you to synchronize passwords between trusted Windows 8 PCs and also makes managing your account easier. Rather than having to prove your identity by accessing an email or phone, Microsoft simply accepts...

Introducing Windows 8: How to Trust a PC Using Your Microsoft Account

If you are a Microsoft account holder, one of the first things you should do after creating the user account is to add your PC as trusted. From an account security standpoint, having a trusted computer gives you a secure place from which you can reset your password or confirm...

Evaluate How the Apps & Drivers Installed Weaken the Security of a PC

Everybody knows that installing lots of drivers and software on a computer increases its vulnerability from a security standpoint. As you install stuff, the complexity increases as well as the likelihood of encountering security issues. I always wanted a tool to evaluate how the...

How to Decrypt a TrueCrypt Encrypted Drive or Partition

If encrypting a partition with TrueCrypt can be a lengthy and painful process, the decryption is a lot smoother and faster. In this guide, I would like to share the steps involved, to make you feel comfortable and confident enough to go ahead with the...

What is the Performance Impact of System Encryption With TrueCrypt

One of my recent dilemmas was: if I encrypt my computer, how much will computing performance have to suffer because of it? Will there be a big difference? If yes, in which areas? That's why I decided to run some tests on both my computers and learn more about the impact...

How Security Products Are Made - A Discussion with Bitdefender

One of the topics of interest at 7 Tutorials is security. Not only we write articles and tutorials about how to have a safe computing experience but we also review security products on a regular basis. One of the things we wanted to learn more about, is how security products...

How to Backup and Restore Windows Vault Passwords

One way to use the Credential Manager is to export your Windows credentials to another Windows computer, or to back them up and import them after you reinstall Windows, so that you don't have to manually type them again. This can be useful in some scenarios and we would like...

How To Report Malicious Websites in Internet Explorer

Another less known feature of Internet Explorer is that, not only it checks the websites you visit against a list of known malicious sites, but it also allows users to report malicious websites they encounter. In this tutorial, I will show how to report such websites and...

Password Security - Turn Your Dumb Habits Into Geek Habits

When it comes to computing habits, people are always bad at security and passwords. We keep reusing the same password(s) over and over again and we don't realize how easy we make it for the bad guys to steal our credit card details and other important information. Even after the...

How to Create or Delete User Accounts in Windows 7

Building on our article about how to edit user accounts, I will try to complete this subject with a tutorial about creating and deleting user accounts and how to turn on or off the guest account in Windows 7. I'll also explain what is the difference between the available account...

How to Work with the Action Center in Windows 7

Windows 7 comes with a convenient way to help you review the state of your system and find solutions to security and maintenance issues. The feature which facilitates this is called Action Center and it is built upon the foundation set by the Windows Security...