
Search results for '+computers' - Page: 7
| PC World - 5 Mar (PC World)Cloud storage is better, faster, and more affordable per gigabyte than ever before. But it’s not the best way to go for everything, nor can it completely replace local storage and backups. In fact, cloud storage can be drastically inferior to local storage, placing sensitive data in real danger of oversight, theft, and loss.
Storing your data locally on a physical drive that you can touch with your hands and manage on premises can be a great way to avoid the pitfalls of remote data storage. Here are several key ways in which local storage trumps cloud storage and remains relevant in 2025.
Speed and availability
One of the main reasons for backing up important data is that it can be readily recovered in the event of an outage, data breach, ransomware, or loss. However, while cloud backups are convenient for day-to-day stuff like individual files or folders, they’re dreadfully slow when it comes to restoring large swaths of data after a catastrophic loss.
Downloading several terabytes of data from a cloud provider can take hours or even days, depending on the speed of your connection. A local drive, on the other hand, can transfer data way faster and gives you more options on how to actually access that data — over your network, with a USB cable, or even installing directly into your PC.
Think about it. Why do cloud backup companies like BackBlaze offer restore-by-mail programs, where they ship out a hard drive or flash drive with your data on it, which you can then return for a refund? It’s just plain faster and more secure than going over the internet.
Backblaze
Local storage also means your data is always available. Even if you have an ultra-fast internet connection, there’s nothing you can do if you experience an internet outage, nor can you do anything if your cloud provider goes down for any reason. Services may promise 99.9 percent uptime, but that 0.1 percent is always there — and according to Murphy’s law, it’ll go down when you most need it.
In July 2024, the infamous CrowdStrike disaster took down Windows computers across the world, rendering many sites and services inoperable for extended periods. Similarly, outages at AWS, Azure, Cloudflare, Google, et al. have killed entire chunks of the internet until issues could be addressed.
And let’s not forget that cloud services can go down permanently and you could lose all your data overnight. Is it likely? Maybe not, especially with giants like Google and Microsoft. They’ll probably give you some kind of heads up… but even so, scrambling to clone all your data before some arbitrary deadline could be a pain. Not so if you maintain local backups, at least of your most important files and folders.
Cloud backups are here to stay, I’m not arguing that. Cloud backups are good to have — as one of several options. Local backups are still important because you never know when cloud backups won’t be there for you. The only way to guarantee your data is available when you need it? Store it locally on premises.
Security and compliance
If you’re looking after client data, or if you have sensitive personal information that you want to keep away from prying eyes, then storing your data locally gives you more control and privacy. You’ll still be subject to local and national laws, but you won’t have to worry about other laws that might apply overseas and in other territories.
Dooffy / Pixabay
If you’re based in the US, storing data with a cloud provider in Europe comes with GDPR compliance requirements — and penalties for non-compliance. Cloud providers elsewhere are beholden to the laws of their own countries. That means government intervention can compel those companies to hand over your data.
Speaking about small Australian businesses in 2021, David Tudehope, CEO of Macquarie Technology Group, highlighted this issue in a chat with ABC: “[If] they keep their data offshore, even if it wasn’t a conscious choice, that data is now subject to the foreign laws of that country. … It’s subject to a foreign regulator, it’s subject to foreign courts, none of which they realized when they clicked the ‘I accept’ button.”
Data breaches
One of the best ways to avoid being hacked by malicious attackers is… to avoid presenting yourself as a target. While cloud providers do put a lot of effort into security for the data they oversee, the fact that they store so much data makes them huge targets for cybercriminals.
In 2022, cloud-based password manager company LastPass suffered a major security breach when a compromised developer account led to the theft of users’ password vaults full of incredibly sensitive information. On top of putting customer data at risk, the ripples kept going out — and in December 2024, it was reported that cryptocurrency was still being stolen from customers who had their LastPass accounts hacked.
Markus Spiske / Unsplash
In 2024, cloud-based data storage company Snowflake suffered a major breach when hackers were able to compromise the data of more than 100 customer accounts, including TicketMaster and AT&T. They stole banking information, medical data, and customer call records from millions of customers of those companies, too.
While these are isolated incidents, they aren’t unique. Even the most hardened cloud storage companies suffer data breaches, and you can’t fully protect your data just by ensuring you have a strong password and multi-factor authentication enabled on your account.
If that data is stored on a server in your office or your home, you retain complete control of its security. With the right know-how, you can guarantee it’s locked down more than any major cloud provider could, and you’re less of a target by keeping your data in a solitary location, without the global access that cloud providers offer.
Local storage still matters in 2025
Cloud storage has undoubtedly revolutionized the way we all interact with and think about data. It offers convenience, scalability, and redundancy in ways that are tough to replicate locally. But it’s not perfect. Cloud storage introduces a range of risks and concerns that can overshadow the benefits for some.
By maintaining local backups instead of (or in conjunction with) cloud backups, you can ensure that your data (or your clients’ data) is always available, with full control over its security and compliance, while mitigating the risks of cloud outages and data breaches.
Whether it’s a managed server, a NAS drive, or a portable SSD you keep in a drawer, local storage remains an important way to maintain swift and secure access to important data in 2025. In need of more local storage? Get started with our top picks for best external drives!
Further reading: Why HDDs are still far from obsolete Read...Newslink ©2025 to PC World |  |
|  | | PC World - 3 Mar (PC World)Once upon a time, you could assume you were pretty safe on the internet, so long as you were careful. But that’s changed. Through no fault of your own, your data can leak, your passwords can become compromised, and you can more easily fall prey to malware.
In 2025, you should assume online attacks are commonplace. The continued rise in use of AI is only accelerating their speed and sophistication, and that shift won’t slow.
To help, we previously outlined 10 simple security tweaks that keep you from getting hacked. But if it’s not clear what software or gear to arm yourself with overall, not to worry, the list below tells you the basics I recommend for broad protection.
Antivirus
Jim Martin / Foundry
As mentioned above, even if you’re careful, the potential of being exposed to phishing sites, malware, ransomware, and other threats is higher than ever. So having good antivirus software at your back is vital.
At the most basic level, you should have Microsoft’s built-in Windows Security antivirus suite active. (Which it should be, so long as you haven’t messed with its settings.) These days, Microsoft’s antivirus protection can be trusted and it runs unobtrusively in the background.
Paid antivirus software like Norton 360 Deluxe (our current favorite pick for antivirus) offers an extra helping hand. It simplifies the wider branches of security defense by providing additional features like dark web monitoring, VPN service, and a password manager, then integrating them into a single interface.
Password manager
Martyn Casserly / Enpass
Whether part of an antivirus suite or an independent service, a password manager is necessary to track strong, unique logins across the web. But equally important, they can help minimize how much of your personal data is saved across the web.
For example, instead of allowing individual shopping sites to keep your credit card info or physical address on file, you can maintain privacy (and security) by storing those details in your password manager. You’ll be less at risk for basic fraud if someone gets unauthorized access to your account (no ability to use your credit card to buy things), or personalized scams based on leaked data through breaches.
The simplest choice is the password managers offered by Google or Apple, though Google has the edge due to being available on more platforms. While on the basic side, they’ve come a long way, and work well to combat the temptation of using weak passwords (or worse, reusing them).
Upgrading to an independent service like Bitwarden or Dashlane opens up more features, like unrestricted password sharing, shared vaults for families, emergency access, and monitoring for compromised passwords. The two services named here are our top picks for best free password manager and best password manager, respectively, but you can check out our full recommendations for more options.
Two-factor authentication app
PCWorld
These days, you want more than just a lone password standing between you and a bad actor. Two-factor authentication (aka multi-factor authentication) adds a second checkpoint to clear before you can access an account—meaning that even if a hacker steals or deduces your password, they won’t have all the info needed to log in successfully.
If you have the option, the simple way to use 2FA is through app-generated one-time codes. They’re more secure than codes sent over text message (SMS), which have a risk of being intercepted. Authy is popular among our staff, as you can use it across multiple platforms, limit access to new devices, and restrict app access with a PIN or biometric authentication.
Google Authenticator is also another alternative, though it’s not quite so full-featured and requires a Google account to back up your codes to the cloud. For the more cautious, Aegis and Raivo allow you to store your codes locally on your device (though you’ll need to back these up, in case your phone bites the dust).
While you can store 2FA tokens in a password manager, I recommend two separate apps—just on the off chance your vault is compromised, the attacker won’t get full access to all your accounts.
Your phone (or PC)
Mark Hachman / IDG
Yep, what you have in your pocket (or on your desk) can be a powerful security tool. If you hate passwords and 2FA, you can use your phone or PC to log into your accounts in a different way—via passkeys.
Passkeys are fast, easy, and arguably simpler than passwords. You don’t have to memorize them—you just save the passkey to your device. Plus, they’re tied to the device you’ve stored them on, so they can’t be stolen and used by hackers the way passwords can. And all you need is biometric authentication or PIN to authorize a passkey’s use.
Mobile devices and computers alike support passkeys—you can save them to your phone, PC, or both. They’re uniquely generated per device, but you can generate as many as the website will allow.
Sadly, not every every site or service supports passkeys yet. Many major ones do, like Google, Apple, Microsoft, Facebook, Best Buy, Target, etc, but integration is still rolling out across the web. So for those other sites—you’ll still want to use the combo of good password + 2FA.
Email masks
PCWorld
You know to use unique (and strong) passwords for your accounts. But random unique user names are now a good idea, too.
With all the data breaches, credential stuffing is barely work for an attacker. They just plug your usual username (or email address) into login forms, along with the stolen password, and see what takes.
A good password manager can generate unique usernames for you. For sites that use email addresses as your userID, an email masking service will create disposable email addresses that forward to your main account.
Email masks differ from email aliases offered by Gmail and ProtonMail, which let you add additional text after your username (e.g., username+randomaddition@gmail.com). Those address variations, while helpful for filtering incoming messages, don’t give you true privacy. It’s easy to deduce what the real email address is.
Free email masking sites exist—DuckDuckGo lets you create as many as you like while Firefox Relay offers five free masks. For paid options, Apple iCloud+ subscribers get access to the company’s Hide My Email feature while SimpleLogin offers a wider array of features (including integration with password managers like Bitwarden and ProtonPass). Select email providers like Fastmail also offer masked email as an integrated feature.
If you’re on a budget, at least consider email masks for your most sensitive accounts (financial, medical, etc).
Optional bonus: Google Voice number
Jared Newman / IDG
Not every website supports software-based codes for two-factor authentication. Some only support SMS codes, which aren’t as secure. (Banks are the worst offenders.) Hackers know this, which means they sometimes resort to SIM jacking to steal codes.
To lower this risk, some people only share their real phone number with valuable or sensitive services like financial and medical institutions. For everything else, they give out their Google Voice number—a service available to anyone with a personal Google account. You get a US-based phone number that you can use for calls and texts through Google’s desktop website or mobile apps. You can also forward any calls to your real number. No one knows it’s not the number issued by your cell phone carrier.
Why not do the reverse? Many banks won’t send 2FA one-time codes to a VOIP number, so Google Voice numbers don’t qualify. It’s a pity, too, since Google Voice numbers can’t be SIM jacked. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 2 Mar (PC World)After October 14, 2025, Microsoft will no longer release any regular updates to Windows 10. The company may make exceptions if a really serious security flaw is discovered — this has happened with older, discontinued versions like Windows XP and Windows 7.
get windows 11 pro for cheap
Windows 11 Pro
Many people who are running Windows 10 and haven’t updated to Windows 11 are doing so because their computer doesn’t support the greatly increased system requirements. So what can you do if you have one of these millions of computers? If your computer has no other faults and is not too slow for your needs, buying a new one just to get system updates probably seems unnecessary.
Option 0: Postpone the decision – pay for extended support
If you don’t have the time or energy to organize a longer-term solution and don’t mind paying a little extra, you can choose to take advantage of Microsoft’s extended support offer. The company announced last autumn that it would be offering a year of continued security updates for around $30, but that’s it.
Buying yourself a year’s grace may make sense, especially if you really want to get a new computer with Windows 11, but would prefer waiting until next year.
Further reading: How I finally learned to love Windows Task View
Option 1: Force Windows 11 onto your old computer
Perhaps the easiest way to continue using an older computer that doesn’t officially meet the system requirements for Windows 11 is to ignore the system requirements. Microsoft doesn’t recommend it, of course, and in a way it’s right. The TPM requirement tied to newer systems has to do with the ability to store private encryption keys and other secrets in a truly secure way.
But if the alternative is to keep running Windows 10 without security updates, it’s obviously much better to run Windows 11 even if your computer won’t be as secure as a slightly newer machine. One way to increase security a little is to use a hardware key or just your mobile phone for two-factor authentication.
In order to run Windows 11 at all, your computer must have a processor that supports the SSE 4.2 and Popcnt instructions. This basically means an Intel processor from 2009 or later, or an AMD processor from 2013 or later. If the option is available, you should also enable Secure Boot in the BIOS.
What you need:
An .iso file of Windows 11 from Microsoft
The latest version of the Rufus program
A USB stick of at least 16GB
Start Rufus and select your connected USB stick under Device at the top. Locate and select your downloaded .iso file under Boot selection.
Leave the other settings as they should be by default: Standard Windows installation under Image, GPT for Partition scheme, and UEFI (non CSM) under Target system.
Rufus
Then click Start and the Windows User Experience dialogue box will appear. Here you should tick the top option, Remove the requirement for 4GB RAM, Secure Boot, and TPM 2.0. That’s all that’s required, but if you intend to do a fresh install instead of an upgrade, you can also fill in any other options you wish, such as running local account instead of Microsoft account.
Click OK and accept the warning that the USB stick will be erased (you didn’t have anything important on it, did you?). The program will then chew for quite a while it copies all the files and makes the desired changes.
Further reading: How to prevent forced installation of new Outlook on Windows 10 PCs
Upgrade
Now you can open the USB stick in Explorer and start the Setup.exe program. You will first need to accept the user agreement and click through some other things, then the program will check for available updates. It may take a long time so be patient.
Microsoft
Finally, it will finish and you can start the installation. When you install using this method, the default choice is to keep all personal files and installed programs, so you won’t have to redo any settings (other than what has changed between Windows 10 and 11).
Foundry
Reinstallation
If you prefer to start from scratch or to test drive Windows 11 before switching full time, you can reboot your computer from the USB stick and install the system to an empty SSD (or hard drive, but I don’t recommend this as it will make your computer slow as syrup).
The Windows installer can be a bit tricky. If you have problems with more than one storage device in your computer, try temporarily removing all but the blank disc you are installing to.
Option 2: Switch to Linux – how to get started
Linux Mint
If you’re tired of Microsoft’s shenanigans and feel ready for an adventure, try switching to Linux instead of harping on about Windows. Linux is more capable today than ever, and thanks to open source projects like Wine, Vulkan, and Proton, it’s easy to run many, if not most, Windows programs and games.
Linux is not a unified operating system that looks and works in a particular way. Instead, there are a large number of so-called distributions, different flavors of Linux that may use different graphical user interfaces and different tools for basic functions like system updates.
To give you an idea of what a jungle it is, I can list some of the major distributions: Arch, Debian, Fedora, Manjaro, Mint, Opensuse, Red Hat, and Ubuntu. There are many more, and often several variants of each distribution. It’s no wonder that many people who want to try Linux get decision anxiety and give up.
My recommendation if you come from Windows and have never used Linux is to start with Linux Mint. It has a graphical interface that is fairly close to Windows and is designed to work well right after installation without having to tinker with settings. If you don’t like it, you can always try something else.
I recommend starting by installing Linux on a separate hard drive or SSD alongside Windows, so you can easily switch back.
1. Download and create installation drive
Download an .iso file of the latest version of Linux Mint from the distribution website. Then download and open the Balena Etcher application. Select the .iso file in step one and a connected USB stick of at least 4GB (without any important files!) in step two. Then click on Flash and authorize to overwrite the USB stick with the Mint installer.
Linux Mint
2. Start the installation
Restart your computer and press the correct key to access the start menu before Windows starts. Which key it is varies between different computer manufacturers, but it is usually, for example, the Esc key, F2, or F10. Select the USB stick and wait until Mint has started.
Double-click on the Install Linux Mint icon on the desktop and the installer will start. The first thing to do is to select the language. Then select the keyboard layout and move on. In the next step, you should tick Install multimedia add-ons.
Linux Mint
Next, it’s time for disc formatting. Select Erase the disc and install Linux Mint and move on. The next step is important: Choose the right disc to install on. You can usually start from the size. For example, if Windows is on a 1TB SSD and you’re installing Linux on a 512GB SSD and you don’t have any other SSDs or hard drives, simply select the 512GB drive. Click Install Now and then Continue.
While the installation is running in the background, select the time zone, fill in a username and password, and a few other things. Then just sit back and wait for it to finish.
Further reading: Newbie’s guide to Windows BitLocker: Why you need it and how to set it up
3. Getting started with Linux Mint
When you restart your computer after installation and enter the password you chose, you’ll be greeted by the Mint desktop and a welcome program to help you get started. The First Steps tab provides shortcuts to a number of important features that you can use right from the start.
Here, for example, you’ll find Driver Manager, which you should run to see if there are drivers for your hardware that are not pre-installed. If you have an Nvidia graphics card, this can be particularly useful, as the system does not pre-install the company’s proprietary drivers, which often work better than its open-source drivers.
To install software, you can usually use the Software Manager application, and system updates are installed using Update Manager. However, there are exceptions. For example, if you want to play Windows games from Steam, go to store.steampowered.com and click Install Steam, and do not use the version that appears in the Application Manager. Valve has made it very easy, and most games will work as long as you have enough modern hardware.
Try it out! Much of the system is similar enough to Windows that you should be able to find your way around as long as you are curious.
It’s easy as pie to install Steam and start playing Windows games on Linux.Foundry
If you run into trouble, a quick web search is usually enough, but there are also plenty of forums with helpful members, not least on Reddit. It can help to keep in mind that Mint is based on Ubuntu, so if there are no instructions specifically for Mint, you can usually use those for Ubuntu.
‘Linux Lite’ with Chrome OS
If you don’t fancy getting into Linux “for real,” Google’s Chrome OS can be an alternative. This is the system that powers Chromebooks, and although it is essentially Linux, it is greatly simplified and almost all interaction with the system is via the Chrome browser.
Option 3: Keep Windows 10 – how to protect yourself
Foundry
If you don’t want to give up on Linux or force Windows 11 onto your old computer, you really only have two options: Buy a new computer or keep running Windows 10 without any updates.
Microsoft isn’t kidding when it says you’re exposing yourself to a security risk if you choose to continue running Windows 10. It’s impossible to say how long it will take, but sooner or later someone will find a serious security flaw that can be exploited to take over your computer.
If you’re lucky, such vulnerabilities will still require you, the user, to be tricked into clicking a link or opening a downloaded file. With less luck, it could allow computers to be hacked just by visiting a website with malware.
That said, there are some things you can do to protect yourself from the biggest risks and avoid the worst consequences. Here are some tips:
Foundry
1. Keep your programs up to dateJust because Windows doesn’t get updates doesn’t mean that other programs on your computer can’t be kept up to date. Browsers are by far the most important, but so are email clients like Thunderbird and various chat programs.
2. AntivirusPay for a good security package and make sure all antivirus features are switched on.
3. Be extra vigilant about what you do onlineAvoid visiting “dodgy” sites and only install programs that you know come from trusted sources.
4.Use your mobile phone for two-factor authenticationLog in to all your important sites with an extra code (or key/passkey) that you store on your mobile phone and not on your now vulnerable Windows computer. This way, malware or hackers cannot take over your accounts via your computer.
Glasswire is a popular firewall for Windows.Skärmdump
5. A firewall can protectUse an application firewall like Glasswire or Safing Portmaster that can block individual programs’ internet access and detect when a program is trying to “phone home.”
Pi-hole.Foundry
6. Protect via DNSUse Pi-hole or similar to block advertising and malicious websites across the network.
7. Minimize your exposureIf possible, use a computer or mobile device with a more secure operating system to log into important accounts and manage sensitive data. If you don’t have anything sensitive on your computer, there’s nothing for a hacker to pick up.
8. Backups are becoming even more importantPerhaps the biggest risk as an individual running an operating system with known security flaws is being targeted by an extortion program that encrypts all files on your computer. This makes it even more important to have a good backup strategy. Don’t keep all your backup devices connected to your computer at all times, otherwise an extortion program could also encrypt your backups.
Other possibilities
If you can’t do any of the above yourself, there are other ways to keep your old computer out of the scrapyard. One option is to give the computer away to someone else who has more energy. Another is to use it as a server in a home lab. Yet another is to use it as a gaming computer, without connecting it to the network. You can copy over new games from a newer computer using a portable hard drive. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 1 Mar (PC World)Fifteen minutes after “hanging up” with Sesame’s new “lifelike” AI, and I’m still freaked out.
So-called “conversations” with AI don’t do a lot for me, especially where text is concerned. With voice chats, such as the new options for Google Gemini and Microsoft’s Copilot, all voice does is save some typing. While Google and Microsoft designed its assistants to be helpful, they’re not especially personable — or sometimes, they’re just artificially cheery.
Sesame’s model, however, is a simple one: “We believe in a future where computers are lifelike,” according to the company’s mission statement.
Sesame wants to build an AI companion, with a natural human voice. Eventually, it wants to design realistic eyewear to put that companion right in your ear, and let it see what you do. It’s very much in keeping with the movie Her, in which a user was introduced to and eventually became enamored with an AI companion.
Sesame unveiled a demo this week of its AI companion, available in both a “Maya” (female) and “Miles” (male) voice. I chose the Maya voice.
An unexpected conversation with an ex
There’s no easy way to say it: When the Maya voice came on, “she” sounded virtually identical to an old friend, who I’ll call Kim. Kim and I went to high school together, dated, and have remained friends for decades, though our lives moved on in different directions long ago. There’s history there.
When you speak to someone, there are levels of nuance and tone which define the conversation. I don’t ask female colleagues details of their private lives, but Maya was pretty nosey, inquiring about what I liked and why. As a reporter, I instinctively understand that some people like to talk about themselves, which makes them feel valued and important. But it’s also a technique that you use while dating, in part to get to know about the other person and establish intimacy.
And that’s not what I wanted, at all. Maya already had Kim’s mannerisms down scarily well: the hesitations, lowering “her” voice when she confided in me, that sort of thing. It wasn’t exactly like Kim, but close enough. It was enough that I backed out pretty quickly, even when I was simply explaining that I liked tech and asked Maya if she had any friends. The combination of a “familiar” voice plus questions about what I was interested in was just too unsettling.
(Just to be clear, the similarity between the voice of Maya and Kim was just coincidence. I didn’t have to log in, provide an email address, or any other form of personal information. I suspect that Sesame used a browser cookie to “know” who I was on my additional visits.)
Thankfully, I was able to put some distance between us. My middle-schooler went through a phase (as did most middle-schoolers, apparently) where they were obsessed with an internet skit about “Skibidi toilets,” and I asked Maya if she knew what that was. “She” didn’t, and became obsessed with the term, bringing it up frequently. That was enough to remind me that I was talking to an AI, and that’s all.
Most AI voices don’t remind me of anyone I know, which means that I simply ignore them as another artificially generated voice. You’ve likely heard of deepfakes, AI audio that mimics the sound of celebrities and others for use in “pig butchering” scams and so on. Lifelike, emotionally resonant audio will simply make those schemes even more enticing.
If Sesame’s AI is the future, the concept of Her seems more real than ever — for better or worse. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 28 Feb (PC World)Ages ago, coworkers asked why I covered my laptop’s webcam. Then they saw a video where a hacker used a remote access trojan (RAT) to spy on two people sleeping. They started taping over their webcam lenses, too.
But that’s actually not enough to keep someone from spying on you. If you want full privacy on a laptop, you need to block your microphone, too.
Malware capable of recording your camera’s feed can just as easily capture your incoming audio, as antivirus maker Kaspersky recently reminded us. (These types of data aren’t the only ones a hacker can steal, but they’re among the creepiest.) Fortunately, you can do this in a few ways, and quickly, too.
An easy method is plugging in a headset (headphones with a built-in or attached mic) with a mute button. One with a non-functional mic will also do, so long as the mic still recognized by Windows. Connect the headset, mute it, and then verify in Windows’ Sound settings that it’s the active mic (Sound settings > Input). Usually, it should automatically switch over.
You can test your microphone while in the Sound settings to verify it’s muted. In Windows 11, click on the mic, then find the Microphone test option. In Windows 10, you can perform the test from the main Sound settings screen.
Windows 11 Sound settings scrolled down to the Input (aka microphone) section.PCWorld
Windows 10 Sound Settings general screen, with output and microphone both active.PCWorld
The most effective method isn’t much harder, but it requires manual undoing every time you want to use the microphone again. For Windows 11, open the Sound settings, then scroll to Input. Click on the mic. Under Audio, press on the Don’t allow button.
For Windows 10, head to Sound settings, click on the Device properties link, then tick the box for Disable. It will disappear from the list of input options.
This option is best if you rarely (or never) use your laptop’s built-in microphone, or even the mic of on your headset or earbuds.
Windows 11 Sound settings for a specific microphone.PCWorld
To re-enable the microphone in Windows 11, head back to Sound settings > [your device] > Audio, then click on the button that says Allow. For Windows 10, hit up Sound settings > Input, then choose Manage sound devices. Find your device under Input > Disabled. Click on it, then on the Enable button.
Speaking of additional audio equipment—if you have multiple devices with microphones, you can selectively disable ones you don’t use. I do this for the Logitech C920 webcam connected to my desktop PC. I hate how it sounds, and disabling reduces the number of devices I have to scroll through whenever I change my settings.
Laptop users have the most to be concerned about, when it comes to hackers listening to them on the sly—most desktop PCs don’t have built-in microphones. (A notable exception are all-in-one desktop computers.) But for peace of mind, owners of desktop PCs can still check in Sound settings to see if you have an active microphone.
Our Favorite antivirus
Norton 360 Deluxe
Read our review
Of course, the best way to avoid someone spying on you is to never allow a rogue piece of software on your PC to begin with. Keep your antivirus up to date, and be wary about sites you visit and downloads you voluntarily grab. Compromised or malicious sites can result in drive-by downloads, and any “Linux distros” (ahem) distributed through torrents can have unwanted extras.
But sometimes our first lines of defense fail, and so limiting use of your laptop’s audio and video can be a secondary safeguard. And if nothing else, these measures can save you from accidentally broadcasting a side conversation when you’re in a company-wide Zoom call. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 27 Feb (PC World)At a GlanceExpert`s Rating
Pros
Good speeds
Inexpensive pricing
Unrivaled user anonymity
Versatile payment options
Cons
Struggles with unblocking streaming services
Smaller server network
Not as feature-rich as competitors
Our Verdict
Mullvad VPN is one of the most private and secure VPNs on the market. It also offers a user-friendly interface, good speeds, and inexpensive pricing. All of these things and more make it one of the top VPN services—especially for the privacy-Conscious user.
Price When Reviewed
This value will show the geolocated pricing text for product undefined
Best Pricing Today
Sweden-based Mullvad is like the Swiss Bank account of VPNs—it doesn’t ask questions and gives you the best privacy and security possible.
When I say that Mullvad takes your privacy seriously, I mean it. Unlike other VPNs, Mullvad goes so far as to disconnect your account from an email by auto-generating an account number for you. They will even let you pay in cash. And this level of anonymity goes well beyond just registration, permeating everything you do with the app.
Since our last review the service has undergone another independent audit and adopted post-quantum encryption on all platforms, further cementing its place as one of the most secure and trustworthy VPNs on the market.
Read on to learn more, and then see our roundup of the best VPNs for comparison.
Mullvad VPN in brief:
P2P allowed: Yes
Device connections: 5 simultaneous connections
Business location: Sweden
Number of servers: 650+
Number of country locations: 44
Cost: $5.16 per month
What are Mullvad VPN’s features and services?
Mullvad’s Windows app is clean and easy to use.
Sam Singleton
When you open Mullvad’s Windows app it strikes one as modern and clean. It starts with a non-interactive map in the primary section of the window and a red banner up top to indicate you’re not currently connected, with the device name and remaining time left on your account listed.
Towards the bottom of the app screen you’ll find a button showing your currently selected VPN server and below that a Connect button which you can click to connect to the chosen server.
When connected, you’ll see a Switch location and Disconnect button at the bottom of the window. The top of the screen, meanwhile, becomes a green banner with the Mullvad VPN logo indicating you’re now connected to the VPN.
Mullvad has a relatively small server network, but provides a lot of useful detail for each server.Sam Singleton
If you jump into the country listings, you can either select a country, select a specific location within the country if more than one is available, and even drill down to individual servers. The app doesn’t show any specific metrics about each server such as ping times or load, but if there’s a red circle next to a server, that means it’s not available for use. Green, meanwhile, means it’s working.
With over 650 total servers, Mullvad VPN’s server network is rather small compared to some of its competitors. Services such as CyberGhost VPN and Private Internet Access boast server networks of over 10,000. Still, I never felt that I was limited in my options while using the service.
The app itself is very easy to read and understand both in the Windows and Android versions. The default Windows’ app panel is automatically fixed to the bottom-right corner of the screen, but you can change this under settings if you wish.
Mullvad traditionally hasn’t been big on extra features or services compared to other VPNs. It doesn’t promise to get past Netflix VPN restrictions (though sometimes it does), there aren’t any double-hop connections, or smart DNS; however, that doesn’t mean it’s a barebones VPN by any stretch.
Mullvad recently did away with automatic-renewals on its subscription plans in order to minimize the private information it stores.
Mullvad’s settings menu allows a ton of customization and is packed full of tweakable privacy options.
Sam Singleton
The service still provides the most important and frequently used features such as a kill-switch, split-tunneling, and ad-/tracker-blocking. It even takes its kill-switch one step further with a feature called Lockdown mode that will only allow your device to connect to the internet when it’s connected to a Mullvad VPN server. All of these features can be found by clicking the gear icon on the homescreen to access the settings menu.
Go to Settings > VPN settings, and you can enable Mullvad’s IPv6 option, as well as manually choose between using OpenVPN or WireGuard. Mullvad was one of the earliest VPN services to implement WireGuard. Its multi-hop feature for WireGuard is also available here as well.
Since 2024, all WireGuard connections through Mullvad come with default “quantum-resistant” encryption technology. Mullvad once again places itself at the forefront of security innovations by fully adopting this standard.
Another nice tool to use with the VPN is Mullvad’s connection check webpage. It lets you know if the app is working and currently connected to Mullvad. It also checks to see if you are leaking DNS requests, suffering from a WebRTC leak, or using a blacklisted IP address.
Mullvad has apps for Windows, Mac, Linux, iOS, and Android, all of which are open-source.
How much does Mullvad VPN cost?
Mullvad’s pricing is pretty cut and dry. For one month you’ll pay €5, or about $5.16 at the time of writing. It also offers subscription options for one year and a staggeringly long one decade. That’s practically a lifetime in the VPN market and just goes to show you how confident it is in the future of its service.
Despite these long-term subscription options, the price still remains the same €5 every month. To compare, other VPN services typically offer their monthly subscription for around $10 per month and longer-term subscriptions average out to around $3 or $4 per month. That makes Mullvad VPN an extremely affordable short-term month-to-month VPN, but a more expensive long-term option.
It’s also worth noting that Mullvad recently did away with automatic-renewals on its subscription plans. According to the company, this was “in order to store less data” such as on-file credit cards and other private information. As a result, you will need to manually re-up each month, or year, or decade, in order to keep using the service. A bit tedious, but that’s the price you pay for ultimate privacy.
How is Mullvad VPN’s performance?
In order to test Mullvad VPN’s speeds I measured connection rates across servers in different countries around the world for multiple days and then compared them to my baseline internet speed. I did this using both the OpenVPN and WireGuard protocols.
The average download speeds across both protocols were rather impressive, clocking in at 53 percent of base speeds. The upload speeds were similar, maintaining an average of 49 percent of the baseline. That makes Mullvad a contender for one of the fastest VPNs, but still a ways behind speed demons such as Hotspot Shield and ProtonVPN.
While testing speeds using different protocols I didn’t notice too much of a difference. WireGuard, as expected, had slightly faster averages than OpenVPN but the margins were so slim in my testing that I would be hard pressed to recommend one over the other for speed.
The bottom line is that, overall, Mullvad’s speeds are more than enough for everyday internet activities, with the usual caveat that your experience may vary depending on your location in the world, equipment, and ISP.
On Mullvad’s website you can find a list of which servers are rentals and which are owned by the service.
Sam Singleton
In recent years Mullvad started renting servers in addition to those it owns itself. Despite this change, there are no apparent speed decreases and from what I could tell, virtually no differences between the servers it owns and those it rents. If you’re interested, you can see which servers are owned and rented on its servers page.
While Mullvad has a lot going for it, one area where it doesn’t impress is in unblocking streaming services. In my previous testing I found that the ability to access services such as Netflix, Hulu, and HBO Max while connected was extremely hit or miss. Some servers had no issues while others detected the VPN and blocked access.
This time around I found a slight improvement to the services I could access though. While Mullvad is certainly not the best VPN for streaming, it does okay at unblocking content. The good news is that once you’re able to find a connection that isn’t blocked, the speeds are fast enough to provide a seamless viewing experience with no buffering.
How is Mullvad VPN’s security and privacy?
The short answer is: excellent. Mullvad prides itself on user privacy, anonymity, and security. And it shows, too. Even from the time that you first pay for the service, it takes this seriously.
You have multiple options to pay for the VPN including by cash—unique among all other VPNs to my knowledge. Should you choose this method, Mullvad says it will take the cash, add credits to the account number included in the envelope, and then shred the envelope and the note. If you choose to use credit cards or PayPal, however, your usage of the service will be identifiable through those payment services—but it won’t be connected to any of your online activity.
My DNS leak tests for both the Windows and Android apps came up clean with no leaks detected. This means you can trust Mullvad to keep your true IP address hidden while connected to its servers. By default, its DNS leak protection is always-on and can’t be disabled.
Mullvad provides an additional feature called DAITA, or Defence Against AI-guided Traffic Analysis, which you can turn on under the settings menu. This will add network noise and make all network packets the same size.
It’s a way to further obfuscate your VPN traffic from sophisticated AI which may be able to distinguish your individual traffic patterns. Very few VPNs currently offer this advanced level of obfuscation, making it one reason Mullvad is a great option for privacy-conscious users.
Mullvad offers WireGuard and OpenVPN protocol options with configurable settings for each.
Sam Singleton
In regards to VPN protocols, Mullvad keeps it simple by only offering the choice between OpenVPN and WireGuard. These are the two most secure protocols currently available and probably the best options anyways.
You also have the option to tweak and configure each connection to your own needs by choosing Ports, Obfuscation, and whether you want to use a Quantum-resistant tunnel. In the last year, Mullvad made all WireGuard connections quantum-resistant by default. While that might be a bit unnecessary now, we’ll all probably be thankful for this feature when quantum computers become more widely used in the future.
Moving onto its privacy policy, Mullvad’s policy has exactly what you’re looking for in a VPN. Though it has now been split into two different documents: the general privacy policy and the “no-logging of user activity policy.” In those two documents the company says it does not “store any activity logs or metadata.” There’s no logging of your online traffic, DNS requests, connections, timestamps, IP addresses, bandwidth, nothing.
The only data Mullvad saves are the total number of current connections of all users on its network, the CPU load per core on its servers, and the total bandwidth used per server. It also logs the real-time number of connections per account as the service allows five simultaneous for each account.
In 2023, Mullvad completed migration of its servers to RAM-only diskless servers meaning data does not persist on its servers nor can it be confiscated should the servers be physically removed—this goes for both the servers it owns and those it rents.
Another welcomed development since our last review is that Mullvad underwent two new independent security audits by Cure53 and X41 D-Sec. Independent audits are always a good sign that a VPN is sticking to its no-log policy and maintaining strong security. They go a long way towards building user trust.
Mullvad is owned and operated by Amagicom AB and based in Sweden. This means that it could be subject to mandatory government data sharing regulations since Sweden is a member of the 14 Eyes signals intelligence sharing alliance.
It’s not a huge deal as Mullvad does not log user data, but it’s good to be aware of, especially for the ultra-privacy conscious. Notably, Mullvad does seem to publish a notice on its blog whenever it’s subject to a search warrant.
Is Mullvad VPN worth it?
Mullvad VPN promises privacy and security and delivers both in droves. It might not have all of the flashy extraneous features of some other VPNs, nor does it excel at unblocking Netflix, but in practically every other area it shines.
Its dedication to protecting user anonymity has never been in question and the latest independent security audits further prove this point. With this level of commitment to privacy as well as performance, Mullvad continues to be one of our top recommendations.
Editor’s note: Because online services are often iterative, gaining new features and performance improvements over time, this review is subject to change in order to accurately reflect the current state of the service. Any changes to text or our final review verdict will be noted at the top of this article. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 26 Feb (PC World)Once upon a time, you could assume you were pretty safe on the internet, so long as you were careful. But that’s changed. Through no fault of your own, your data can leak, your passwords can become compromised, and you can more easily fall prey to malware.
In 2025, you should assume online attacks are commonplace. The continued rise in use of AI is only accelerating their speed and sophistication, and that shift won’t slow.
To help, we previously outlined 10 simple security tweaks that keep you from getting hacked. But if it’s not clear what software or gear to arm yourself with overall, not to worry, the list below tells you the basics I recommend for broad protection.
Antivirus
Jim Martin / Foundry
As mentioned above, even if you’re careful, the potential of being exposed to phishing sites, malware, ransomware, and other threats is higher than ever. So having good antivirus software at your back is vital.
At the most basic level, you should have Microsoft’s built-in Windows Security antivirus suite active. (Which it should be, so long as you haven’t messed with its settings.) These days, Microsoft’s antivirus protection can be trusted and it runs unobtrusively in the background.
Paid antivirus software like Norton 360 Deluxe (our current favorite pick for antivirus) offers an extra helping hand. It simplifies the wider branches of security defense by providing additional features like dark web monitoring, VPN service, and a password manager, then integrating them into a single interface.
Password manager
Martyn Casserly / Enpass
Whether part of an antivirus suite or an independent service, a password manager is necessary to track strong, unique logins across the web. But equally important, they can help minimize how much of your personal data is saved across the web.
For example, instead of allowing individual shopping sites to keep your credit card info or physical address on file, you can maintain privacy (and security) by storing those details in your password manager. You’ll be less at risk for basic fraud if someone gets unauthorized access to your account (no ability to use your credit card to buy things), or personalized scams based on leaked data through breaches.
The simplest choice is the password managers offered by Google or Apple, though Google has the edge due to being available on more platforms. While on the basic side, they’ve come a long way, and work well to combat the temptation of using weak passwords (or worse, reusing them).
Upgrading to an independent service like Bitwarden or Dashlane opens up more features, like unrestricted password sharing, shared vaults for families, emergency access, and monitoring for compromised passwords. The two services named here are our top picks for best free password manager and best password manager, respectively, but you can check out our full recommendations for more options.
Two-factor authentication app
PCWorld
These days, you want more than just a lone password standing between you and a bad actor. Two-factor authentication (aka multi-factor authentication) adds a second checkpoint to clear before you can access an account—meaning that even if a hacker steals or deduces your password, they won’t have all the info needed to log in successfully.
If you have the option, the simple way to use 2FA is through app-generated one-time codes. They’re more secure than codes sent over text message (SMS), which have a risk of being intercepted. Authy is popular among our staff, as you can use it across multiple platforms, limit access to new devices, and restrict app access with a PIN or biometric authentication.
Google Authenticator is also another alternative, though it’s not quite so full-featured and requires a Google account to back up your codes to the cloud. For the more cautious, Aegis and Raivo allow you to store your codes locally on your device (though you’ll need to back these up, in case your phone bites the dust).
While you can store 2FA tokens in a password manager, I recommend two separate apps—just on the off chance your vault is compromised, the attacker won’t get full access to all your accounts.
Your phone (or PC)
Mark Hachman / IDG
Yep, what you have in your pocket (or on your desk) can be a powerful security tool. If you hate passwords and 2FA, you can use your phone or PC to log into your accounts in a different way—via passkeys.
Passkeys are fast, easy, and arguably simpler than passwords. You don’t have to memorize them—you just save the passkey to your device. Plus, they’re tied to the device you’ve stored them on, so they can’t be stolen and used by hackers the way passwords can. And all you need is biometric authentication or PIN to authorize a passkey’s use.
Mobile devices and computers alike support passkeys—you can save them to your phone, PC, or both. They’re uniquely generated per device, but you can generate as many as the website will allow.
Sadly, not every every site or service supports passkeys yet. Many major ones do, like Google, Apple, Microsoft, Facebook, Best Buy, Target, etc, but integration is still rolling out across the web. So for those other sites—you’ll still want to use the combo of good password + 2FA.
Email masks
PCWorld
You know to use unique (and strong) passwords for your accounts. But random unique user names are now a good idea, too.
With all the data breaches, credential stuffing is barely work for an attacker. They just plug your usual username (or email address) into login forms, along with the stolen password, and see what takes.
A good password manager can generate unique usernames for you. For sites that use email addresses as your userID, an email masking service will create disposable email addresses that forward to your main account.
Email masks differ from email aliases offered by Gmail and ProtonMail, which let you add additional text after your username (e.g., username+randomaddition@gmail.com). Those address variations, while helpful for filtering incoming messages, don’t give you true privacy. It’s easy to deduce what the real email address is.
Free email masking sites exist—DuckDuckGo lets you create as many as you like while Firefox Relay offers five free masks. For paid options, Apple iCloud+ subscribers get access to the company’s Hide My Email feature while SimpleLogin offers a wider array of features (including integration with password managers like Bitwarden and ProtonPass). Select email providers like Fastmail also offer masked email as an integrated feature.
If you’re on a budget, at least consider email masks for your most sensitive accounts (financial, medical, etc).
Optional bonus: Google Voice number
Jared Newman / IDG
Not every website supports software-based codes for two-factor authentication. Some only support SMS codes, which aren’t as secure. (Banks are the worst offenders.) Hackers know this, which means they sometimes resort to SIM jacking to steal codes.
To lower this risk, some people only share their real phone number with valuable or sensitive services like financial and medical institutions. For everything else, they give out their Google Voice number—a service available to anyone with a personal Google account. You get a US-based phone number that you can use for calls and texts through Google’s desktop website or mobile apps. You can also forward any calls to your real number. No one knows it’s not the number issued by your cell phone carrier.
Why not do the reverse? Many banks won’t send 2FA one-time codes to a VOIP number, so Google Voice numbers don’t qualify. It’s a pity, too, since Google Voice numbers can’t be SIM jacked. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 26 Feb (PC World)After October 14, 2025, Microsoft will no longer release any regular updates to Windows 10. The company may make exceptions if a really serious security flaw is discovered — this has happened with older, discontinued versions like Windows XP and Windows 7.
get windows 11 pro for cheap
Windows 11 Pro
Many people who are running Windows 10 and haven’t updated to Windows 11 are doing so because their computer doesn’t support the greatly increased system requirements. So what can you do if you have one of these millions of computers? If your computer has no other faults and is not too slow for your needs, buying a new one just to get system updates probably seems unnecessary.
Option 0: Postpone the decision – pay for extended support
If you don’t have the time or energy to organize a longer-term solution and don’t mind paying a little extra, you can choose to take advantage of Microsoft’s extended support offer. The company announced last autumn that it would be offering a year of continued security updates for around $30, but that’s it.
Buying yourself a year’s grace may make sense, especially if you really want to get a new computer with Windows 11, but would prefer waiting until next year.
Further reading: How I finally learned to love Windows Task View
Option 1: Force Windows 11 onto your old computer
Perhaps the easiest way to continue using an older computer that doesn’t officially meet the system requirements for Windows 11 is to ignore the system requirements. Microsoft doesn’t recommend it, of course, and in a way it’s right. The TPM requirement tied to newer systems has to do with the ability to store private encryption keys and other secrets in a truly secure way.
But if the alternative is to keep running Windows 10 without security updates, it’s obviously much better to run Windows 11 even if your computer won’t be as secure as a slightly newer machine. One way to increase security a little is to use a hardware key or just your mobile phone for two-factor authentication.
In order to run Windows 11 at all, your computer must have a processor that supports the SSE 4.2 and Popcnt instructions. This basically means an Intel processor from 2009 or later, or an AMD processor from 2013 or later. If the option is available, you should also enable Secure Boot in the BIOS.
What you need:
An .iso file of Windows 11 from Microsoft
The latest version of the Rufus program
A USB stick of at least 16GB
Start Rufus and select your connected USB stick under Device at the top. Locate and select your downloaded .iso file under Boot selection.
Leave the other settings as they should be by default: Standard Windows installation under Image, GPT for Partition scheme, and UEFI (non CSM) under Target system.
Rufus
Then click Start and the Windows User Experience dialogue box will appear. Here you should tick the top option, Remove the requirement for 4GB RAM, Secure Boot, and TPM 2.0. That’s all that’s required, but if you intend to do a fresh install instead of an upgrade, you can also fill in any other options you wish, such as running local account instead of Microsoft account.
Click OK and accept the warning that the USB stick will be erased (you didn’t have anything important on it, did you?). The program will then chew for quite a while it copies all the files and makes the desired changes.
Further reading: How to prevent forced installation of new Outlook on Windows 10 PCs
Upgrade
Now you can open the USB stick in Explorer and start the Setup.exe program. You will first need to accept the user agreement and click through some other things, then the program will check for available updates. It may take a long time so be patient.
Microsoft
Finally, it will finish and you can start the installation. When you install using this method, the default choice is to keep all personal files and installed programs, so you won’t have to redo any settings (other than what has changed between Windows 10 and 11).
Foundry
Reinstallation
If you prefer to start from scratch or to test drive Windows 11 before switching full time, you can reboot your computer from the USB stick and install the system to an empty SSD (or hard drive, but I don’t recommend this as it will make your computer slow as syrup).
The Windows installer can be a bit tricky. If you have problems with more than one storage device in your computer, try temporarily removing all but the blank disc you are installing to.
Option 2: Switch to Linux – how to get started
Linux Mint
If you’re tired of Microsoft’s shenanigans and feel ready for an adventure, try switching to Linux instead of harping on about Windows. Linux is more capable today than ever, and thanks to open source projects like Wine, Vulkan, and Proton, it’s easy to run many, if not most, Windows programs and games.
Linux is not a unified operating system that looks and works in a particular way. Instead, there are a large number of so-called distributions, different flavors of Linux that may use different graphical user interfaces and different tools for basic functions like system updates.
To give you an idea of what a jungle it is, I can list some of the major distributions: Arch, Debian, Fedora, Manjaro, Mint, Opensuse, Red Hat, and Ubuntu. There are many more, and often several variants of each distribution. It’s no wonder that many people who want to try Linux get decision anxiety and give up.
My recommendation if you come from Windows and have never used Linux is to start with Linux Mint. It has a graphical interface that is fairly close to Windows and is designed to work well right after installation without having to tinker with settings. If you don’t like it, you can always try something else.
I recommend starting by installing Linux on a separate hard drive or SSD alongside Windows, so you can easily switch back.
1. Download and create installation drive
Download an .iso file of the latest version of Linux Mint from the distribution website. Then download and open the Balena Etcher application. Select the .iso file in step one and a connected USB stick of at least 4GB (without any important files!) in step two. Then click on Flash and authorize to overwrite the USB stick with the Mint installer.
Linux Mint
2. Start the installation
Restart your computer and press the correct key to access the start menu before Windows starts. Which key it is varies between different computer manufacturers, but it is usually, for example, the Esc key, F2, or F10. Select the USB stick and wait until Mint has started.
Double-click on the Install Linux Mint icon on the desktop and the installer will start. The first thing to do is to select the language. Then select the keyboard layout and move on. In the next step, you should tick Install multimedia add-ons.
Linux Mint
Next, it’s time for disc formatting. Select Erase the disc and install Linux Mint and move on. The next step is important: Choose the right disc to install on. You can usually start from the size. For example, if Windows is on a 1TB SSD and you’re installing Linux on a 512GB SSD and you don’t have any other SSDs or hard drives, simply select the 512GB drive. Click Install Now and then Continue.
While the installation is running in the background, select the time zone, fill in a username and password, and a few other things. Then just sit back and wait for it to finish.
Further reading: Newbie’s guide to Windows BitLocker: Why you need it and how to set it up
3. Getting started with Linux Mint
When you restart your computer after installation and enter the password you chose, you’ll be greeted by the Mint desktop and a welcome program to help you get started. The First Steps tab provides shortcuts to a number of important features that you can use right from the start.
Here, for example, you’ll find Driver Manager, which you should run to see if there are drivers for your hardware that are not pre-installed. If you have an Nvidia graphics card, this can be particularly useful, as the system does not pre-install the company’s proprietary drivers, which often work better than its open-source drivers.
To install software, you can usually use the Software Manager application, and system updates are installed using Update Manager. However, there are exceptions. For example, if you want to play Windows games from Steam, go to store.steampowered.com and click Install Steam, and do not use the version that appears in the Application Manager. Valve has made it very easy, and most games will work as long as you have enough modern hardware.
Try it out! Much of the system is similar enough to Windows that you should be able to find your way around as long as you are curious.
It’s easy as pie to install Steam and start playing Windows games on Linux.Foundry
If you run into trouble, a quick web search is usually enough, but there are also plenty of forums with helpful members, not least on Reddit. It can help to keep in mind that Mint is based on Ubuntu, so if there are no instructions specifically for Mint, you can usually use those for Ubuntu.
‘Linux Lite’ with Chrome OS
If you don’t fancy getting into Linux “for real,” Google’s Chrome OS can be an alternative. This is the system that powers Chromebooks, and although it is essentially Linux, it is greatly simplified and almost all interaction with the system is via the Chrome browser.
Option 3: Keep Windows 10 – how to protect yourself
Foundry
If you don’t want to give up on Linux or force Windows 11 onto your old computer, you really only have two options: Buy a new computer or keep running Windows 10 without any updates.
Microsoft isn’t kidding when it says you’re exposing yourself to a security risk if you choose to continue running Windows 10. It’s impossible to say how long it will take, but sooner or later someone will find a serious security flaw that can be exploited to take over your computer.
If you’re lucky, such vulnerabilities will still require you, the user, to be tricked into clicking a link or opening a downloaded file. With less luck, it could allow computers to be hacked just by visiting a website with malware.
That said, there are some things you can do to protect yourself from the biggest risks and avoid the worst consequences. Here are some tips:
Foundry
1. Keep your programs up to dateJust because Windows doesn’t get updates doesn’t mean that other programs on your computer can’t be kept up to date. Browsers are by far the most important, but so are email clients like Thunderbird and various chat programs.
2. AntivirusPay for a good security package and make sure all antivirus features are switched on.
3. Be extra vigilant about what you do onlineAvoid visiting “dodgy” sites and only install programs that you know come from trusted sources.
4.Use your mobile phone for two-factor authenticationLog in to all your important sites with an extra code (or key/passkey) that you store on your mobile phone and not on your now vulnerable Windows computer. This way, malware or hackers cannot take over your accounts via your computer.
Glasswire is a popular firewall for Windows.Skärmdump
5. A firewall can protectUse an application firewall like Glasswire or Safing Portmaster that can block individual programs’ internet access and detect when a program is trying to “phone home.”
Pi-hole.Foundry
6. Protect via DNSUse Pi-hole or similar to block advertising and malicious websites across the network.
7. Minimize your exposureIf possible, use a computer or mobile device with a more secure operating system to log into important accounts and manage sensitive data. If you don’t have anything sensitive on your computer, there’s nothing for a hacker to pick up.
8. Backups are becoming even more importantPerhaps the biggest risk as an individual running an operating system with known security flaws is being targeted by an extortion program that encrypts all files on your computer. This makes it even more important to have a good backup strategy. Don’t keep all your backup devices connected to your computer at all times, otherwise an extortion program could also encrypt your backups.
Other possibilities
If you can’t do any of the above yourself, there are other ways to keep your old computer out of the scrapyard. One option is to give the computer away to someone else who has more energy. Another is to use it as a server in a home lab. Yet another is to use it as a gaming computer, without connecting it to the network. You can copy over new games from a newer computer using a portable hard drive. Read...Newslink ©2025 to PC World |  |
|  | | BBCWorld - 24 Feb (BBCWorld)Quantum computers will be able to crack existing encryption and threaten critical infrastructure. Read...Newslink ©2025 to BBCWorld |  |
|  | | BBCWorld - 20 Feb (BBCWorld)It says a new chip it has created could end up being as important a breakthrough as the semiconductor. Read...Newslink ©2025 to BBCWorld |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
Auckland FC have had All Blacks great Dan Carter in camp to help them prepare for the A-League finals More...
|

BUSINESS
Businessman and convicted sex offender James Wallace has failed in a bid to lift his release conditions More...
|

|

 | Today's News |

 | News Search |
|
 |