Deleting the root user is a security precaution and overall just something that is good to do. Here is how you can disable the root account in Linux.
If you are always mistyping your sudo password because nothing is shown on the screen, here’s a quick fix to get asterisks to show up as your sudo password in Ubuntu.
If you’re using the Apple Notes app, you may want to protect your info from prying eyes. Here’s how to lock Apple notes with Touch ID and a password.
Tired of having to enter your password when downloading free apps in the Mac App Store? Here’s how to bypass the password prompt for free apps.
Looking to add a password to protect files downloaded in your browser? Zip It is a free drag-and-drop web app that can be used on your PC or smartphone. Here’s how it works.
Online security gets tougher and tougher to maintain, but more and more options for keeping it secure are being developed. How do you safeguard your online logins?
Besides storing WiFi passwords, the Mac Keychain Access app stores a number of other passwords. Here’s how to use it to retrieve a forgotten WiFi password.
If you are a Windows administrator managing multiple user accounts or computers, here’s how you can enforce password rules to keep computers safe.
Want to temporarily see your password as you type it in the password field? Try installing a Firefox add-on called Show Password Field for convenience.
Most modern browsers come with a password manager for us to save our passwords. This article will take you through the steps to manage your saved passwords in various browsers.
If you have forgotten a password that you had entered into Keychain in Mac OS X, you can view the password using the Keychain Access utility. Here’s how.
To wipe your Android phone, doing a factory reset is not enough. Here is how you can securely reset your Android device so your data is beyond recovery.
Have you encountered websites where Google Chrome refuses to remember the login username and password? This extension can fix it.
As of late, many people have been hacked and are the victims of password leaks and Trojan horse infections. The following are some tips if it happens to you
Using some of the password managers listed, you can have all of your login data handy and use them at any time you want. Included here are 8 of the best.
The default configuration for Raspberry Pi is completely functional, but if your Pi is exposed to the Web, changing the default configuration is essential.
One proposition that security experts made recently was to use short sentences as passwords, rather than a complicated string of characters. Let’s see if this is a more secure method.
Passwords have been with us for a long time, but who says we have to use passwords for everything? You’ll be surprised to find several viable alternatives.