TOP HAT TECHS
   Home
   Contact Us
   Services
   Tips
   Top Hat Techs
   720.425.8889
    
Top Hat Techs
Computer Support For Individuals And Small Business

Security and Privacy
Tips and resources to help make your computing experience more secure and protecting your privacy.

Six Keys To Basic Computer Security - Six Important Keys To Keeping Your Computer And Data Secure.

Monitoring Windows XP Security Programs - Using the Security Center to Monitor Windows XP Security Programs and Settings.

Monitoring Windows Vista Security Programs - Using the Security Center to Monitor Windows Vista Security Programs and Settings.

Monitoring Windows 7 Security Programs - Using the Action Center to Monitor Windows 7 Security Programs and Settings.

Everyone Is After My Data - How Do I Protect It?? - Tips on Protecting Personal Data.

What Is This Thing Called Metadata?? - Explanation and Illustration of Metadata.

Facebook Secure Browsing - How to activate the Facebook Secure Browsing option.

Facebook Social Advertising Settings - How to Change the Facebook Social Advertising Settings.

LinkedIn Social Advertising Settings - How to Change the LinkedIn Social Advertising Settings.

Strong Passwords - How to create strong passwords that you can remember.

Changing or Creating a Windows 7 User Password - Changing or creating a user password to log on to Windows 7.

Changing or Creating a Windows Vista User Password - Changing or creating a user password to log on to Windows Vista.

Changing or Creating a Windows XP User Password - Changing or creating a user password to log on to Windows XP.

Backup - Backup?? Do I Have To? @#&!? - Considerations on backing up a computer.

Backup System Testing Testing the backup system on a personal computer.

Flash Cookies - Managing Flash Cookies.

Seven Keys To Basic Email Security - Basic guidelines for safe email use.

Aggravating Aggregation - Sites that make it just a little too easy to find personal information about almost anybody.

Epsilon?? Who Is That, And Why Do They Have My Email?? - Epsilon Data Management, an email marketing company, had their database compromised. How does this affect users?

Canning The Spam - The end of a major botnet, how botnets work, and how not to be part of one.

Please Help! Email Scam - What do you do when you receive an email from a friend stranded in a foreign country needing a loan? Is it legitimate?

Email Hoaxes - What do you do about email hoaxes?

Recognizing Email Hoaxes - Seven Tell-Tale Signs for Recognizing Email Hoaxes.

Browsing Information available to Websites - Your information available to websites when you visit them.
Home | Contact Us | Services | Tips | Privacy
© 2014 Top Hat Techs. All rights reserved.