Archives - Windows


Use a PIN to protect your Windows account

While you can opt for the convenience of having no security checks before logging into Windows, this leaves you vulnerable to anyone else walking up to the machine and looking at your data. This can be especially problematic if you live with other people who don’t need to see what’s on your computer. Adding a […]

Change user account control settings in Windows

Ostensibly, user account control (UAC) is a feature automatically enabled in Windows that is designed to protect your system from any unwanted changes by notifying you every time an application or service wants to alter your system. In theory, this might sound helpful, but in practice, it’s not very useful due to the sheer number […]

Make sure your Windows Firewall autostarts

Even basic cyber protection should boot up as soon as your computer does. To toggle automatic launch in Windows settings, remember to: Go to the Services management console. Scroll and double click Windows Firewall. Check the Windows Firewall Properties box. Set startup type to Automatic and click Stop, then Start and Okay.

How to Shut Down, Sleep and Hibernate Your Windows 11 PC

In the decades since Microsoft introduced its game-changing operating system, there have been numerous iterations of the desktop OS. Windows 11 currently holds the mantle of flagship product, with the company naturally keen to push the latest version to its user base. Microsoft dominates the OS marketplace, with around 77% of all desktop devices worldwide […]

Overwrite deleted files to fully destroy your data

The idea that deleting files doesn’t truly delete the data in them is, for the most part, true. In order to truly secure your data, you’ll need to perform an overwrite on deleted files so information cannot be recovered by bad actors. This is especially important if you’re planning to sell or dispose of an […]

Windows 11 security vulnerabilities

Since its release in late 2021, Windows 11 has received unsettling levels of criticism from security experts surrounding some of the vulnerabilities identified in the operating system. Despite Microsoft’s promotion of Zero Trust — a method of reinforcing security by always asking users to verify their identity for any login or administrative activity — the […]