Latest Business How-To Stories
SEE BUSINESS STORIES BY CATEGORY
Tip
The Amazon triangle scam: What it is, how it works, and what to do
Triangulation fraud is a type of scam that occurs on ecommerce marketplaces—including Amazon.How-To
How to uninstall Kaspersky antivirus before it gets banned
The US government is banning Kaspersky security software—so it’ll soon stop working. Here’s how to remove it from your system.How-To
Age verification laws threaten Pornhub, but a VPN can help
Recent age verification restrictions have made it difficult to access adult content in some U.S. states, except with the right VPN.How-To
How to master Excel: From beginner to pro
With these tips, you can become a true Excel magician.Tip
How to transcribe audio files in Microsoft Word
Word can automatically transcribe spoken texts. This saves time and effort when typing interviews or spoken files.How-To
The ultimate free digital security guide: Stay safe without spending a dime
Excellent security tools are available to everyone. You don’t have to pay a single cent to protect yourself.How-To
Quishing and vishing: How to protect yourself from new security threats
Quishing and vishing use modern technologies to obtain your data. Find out how you can protect yourself against these fraud methods.Tip
Microsoft says you should always ask this one security question to avoid scams
Online and offline threats (including seasonal scams) are on the rise. But you can ward off the danger with four words—and a little outside help.How-To
Passkeys explained: How to embrace a passwordless future today
Passkeys are increasingly replacing traditional passwords. This makes logging on to the internet much more convenient and secure. You can create your first passkey in just one minute.How-To
How Linux's insanely customizable desktop works
Anyone who familiarizes themselves more intensively with Linux will, over time, gain an appreciation of the advantages and disadvantages. However, this is the last link in the graphical system.How-To
Windows includes built-in ransomware protections. Here's how to turn it on
Did you know Windows includes ransomware protection built right in? Microsoft Defender can safeguard your PC, but the feature isn’t automatically enabled. Here's how to do it yourself.How-To
Multiboot vs. virtual PC vs. live DVD: Which is best for multiple OSes?
Do you want to use two or more operating systems on your desktop computer? Then there are three options: a parallel installation, a virtual PC, and booting from a live DVD or USB stick.Tip
Google's dark web monitoring is actually pretty helpful
I didn’t know the depth of this feature until my family got an early alert about the recent AT&T data leak.Tip
Should I disconnect my PC from the internet when I have a virus?
It is often recommended to disconnect the internet connection in the event of a virus attack. But is it really sensible or even necessary to disconnect the computer from the internet?How-To
How to turn your laptop into a desktop workstation
If you're not going anywhere for a while with your laptop, why not kick back and get the full desktop experience? Here's how.How-To
Why are your Windows Defender antivirus scans slow? Here's how to find out
If the scan of your hard drive with Microsoft Defender seems to take forever, it's worth finding out why.How-To
Windows Hello can protect your Chrome passwords. Here's how
This quick change to your settings blocks unauthorized use of passwords saved to your Google account.How-To
10 things I'd never do as an IT professional
It's about PC security. And it's about things that an IT professional would never do, but that less IT-savvy people do again and again. These 10 mistakes always cause headaches.How-To
How to prevent (or survive) a ransomware attack
Whether you're looking to stop a ransomware attack before it happens, or have already been victimized by this particularly nasty malware, we have tips to both thrive and survive.How-To