Web Analytics


Archive for the ‘Windows XP Security’ Category


If I’m keeping track correctly, I’ve been asked this same question seven times since I started running this website. In fact, I asked myself this question a few years ago: “why does my computer tell me it may be a risk every time I start my PC?” Now, I could drag this guide out and try and sound really smart; however, I want to keep this simple.

Read the rest of this entry »

Protect your Computer with a USB Flash Drive

Posted by Thomas On March - 20 - 2010

It’s in all the movies and TV-series where a Government Employee log on a Secure Computer. He or She insert or remove a KeyCard to log on and off. Without the KeyCard the computer is rendered useless. If you like the idea, well …

Predator, let you do exactly that !

Windows Guides’ Rating Compatible with
1 Star1 Star1 Star1 Star0 Star4 out of 5 Windows 7Windows VistaWindows XP
PROGRAM: PREDATORPROS: PREDATOR locks your PC when you are away, even if your Windows session is still opened. It is very easy to use and the security seems to be very good.

CONS: Dark interface, makes it hard to read. Tho several users can have their own key it cannot be used to Log In to different User Accounts, which would have been a great asset.

VERDICT: If you are looking for a simple way to protect your Computer while you step away from it. This what you need.

PRICE: Freeware and Paid Version ($29)

VERSION REVIEWED: 2.1.0.468

Download Link in the Article


Read the rest of this entry »

Restore points are used to return your computer to a state in which it previously was. If your computer goes wrong and settings inadvertently change, you can use a restore point to go back to a previous state when your computer was working properly. In this guide, you will learn how to create a restore point in Windows XP and you will also learn how to use the restore point should your computer go wrong.

This guide will show you how to create a restore point in Windows XP. Here are guides for Windows Vista and 7:

Read the rest of this entry »

Block Ads in Internet Explorer 8 IE8 [How To]

Posted by Rich On August - 29 - 2009

I previously showed you how to block ads when browsing; however, InPrivate browsing in IE8 takes some time to learn which content needs blocking. Windows Forums moderator rsvr85 has written a guide, which shows you how to update InPrivate’s block list with AdBlock’s list, which will cut out ~80% of ads instantly.

AdBlocking in IE8

Encrypt Files on Your Hard Drive in Windows XP [How To]

Posted by Rich On August - 25 - 2009

Many people willing to pay for file encryption programs but did you know Windows XP, Vista, and Seven have built in file encryption capabilities? File encryption is more and more important as our data is the coming more mobile by the day. If you were to Lucia laptop, a password may protect your information but if the person who finds your laptop takes out your hard drive and put it into a now the computer all install is a different operating system on your hard drive, they may still have access to your files. In this guide, you will learn how to encrypt your files in Windows XP. See this guide for Vista/Seven .

Read the rest of this entry »

Detect and Remove the Conficker Worm (Virus)

Posted by Rich On March - 31 - 2009

Windows Guides reader littlelooloo asked the following:

I had a question about this worm that is supposed to wreak havoc on computers tomorrow… the news said most security programs have it taken care of.  I just wanted to get your opinion/confirmation if that’s really the case or should I download a patch from Microsoft?

If you are concerned about the Conficker (a.k.a. downandup) worm, possibly scheduled to wreak havoc tomorrow, April 1, 2009, you can download a cleanup tool from ESET. You can also apply a patch from Microsoft

From the Sophos blog:

It’s quite possible that Conficker will not do anything significant on April 1st. Certainly it won’t be “deadly” and your computers won’t melt. :-)

The fact of the matter is that Conficker is not set to activate a specific payload on that date. Rather, on April 1st Conficker will begin to attempt to contact the 50,000-a-day potential call-home web servers from which it may receive updates.

But it’s just as likely that Conficker will receive instructions to do something on March 28th, or April 2nd, or April 14th as it will on April 1st. The emphasis by some media outlets on April 1st is really unfortunate.

What we can say with certainty is that people should keep their protection up-to-date, ensure that they have firewalls and security patches in place, have a proper policy in place regarding USB usage and passwords. In addition it wouldn’t do any harm – if you suspect you may be infected by Conficker – to run a Conficker removal tool such as the free one from Sophos.

Download the ESET Cleanup Tool

Download the Patch from Microsoft

eset-conficker-removal1


Computer tips in your inbox
Sign up for the Windows Guides newsletter to get PC tips and access to free Windows books (More details)

Subscribe now
Popular Guides

See which sites have been visited on your PC (even if private browsing mode is used)

Create a Windows 7 System Repair Disc

Best Free Anti-malware

Hibernate vs. Sleep vs. Shut-Down

i3, i5, and i7; Dual, Quad, Hexa Core Processors. How to they Differ?

Intel's Ivy Bridge Processor: new Features

Windows Guides on Facebook