Download as pdf or txt
Download as pdf or txt
You are on page 1of 287

The Complete

Windows 10
Manual

Expert Tutorials to Improve Your Skills


100% INDEPENDENT
Discover more of our
guides today...
The Complete The Complete The Complete The Complete

iPhone
Manual
iPadOS
Manual
Mac
Manual
Android
Manual
NEW
iOS 14
Update

NEW
iPadOS14
Update

Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT

The Complete The Complete The Complete The Complete


Black & White
Photography
Build Your
Own PC
Canon Cloud
Computing
Manual Manual
Manual Manual
BDM’s
| Play sy Series
ps Made Ea
me | Ma
ve | Chro
mail | Dri
NEW! | G plete
The Com
Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT

ideboo k
FRITZ!Box GuGoogle
The Complete The Complete The Complete The Complete
BDM’s M

s
free app

Coding GoPro
missable
ster Google’s un
w to ma
ade

Learn ho
Easy Serie

Manual Manual Ove


r Manual Manual
827
s The Co

ips
mplete

s&t
hint side
in £9.99
19
Volume 9
US$19.9
.99
Can$19
.99
Aus$17
9
NZ$18.9
Guideb

pendent
100% Inde
ook Vo
lume 19

Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT

os
ur phot
r Keep yo safe
r apps fo & docs
Discove play
best work &
Get the free
ect ions for
e & prot
The Complete The Complete Enhanc ivacy The Complete
applicat
The Complete
Internet
your pr

Instagram WhatsApp Landscape


Photography
Manual Manual Security Manual
Manual

Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT
Contents
8 Windows 10 Essentials 80 Exploring Skype in Windows 10
82 The New Windows 10 Game Bar
10 The Start Menu, Taskbar & Action Center 84 Explore the Windows 10 Calendar App
12 How to Use the Start Menu 86 Listening to Music with the Spotify App
14 How to Use the Action Centre 88 Move or Install Apps to a
16 How to Quickly Switch Between Tasks Different Drive
18 Manage Notifications in Windows 10 90 Changing File Associations & Protocols
20 How to Use Snap Assist 92 OneDrive Files On-Demand
22 Manage Your Activities with Timeline 94 Installing a Printer in Windows 10
24 How to Use the File Explorer 96 Setting Up Dual Monitors
26 Create and Manage Desktop Folders 98 Windows 10 Update Cache
28 Personalise and Customise the Desktop 99 Installing New Fonts
34 Exploring the New Edge Browser 100 How to Update Windows 10
36 Browsing with Edge Chromium 102 What to Keep Updated in Windows 10
40 How to Use Windows Mail 104 Sharing to Nearby Devices
42 How to Set Up and Use the Mail App 105 Using the Focus Assist Tool
46 Using Windows 10 Search Tools 106 Windows 10 Power User Tips
49 Doing More with Cortana 113 Extra Power User
52 Connect Your Phone to Your PC
54 Connecting Your PC to the Internet

114 Windows 10 Security,


Maintenance & Performance
Windows 10 Apps and
56 Software Guides
116 Encrypting Your Windows 10 Laptop
118 What is Encryption?
58 Explore the Windows Store 120 Secure Your Home Network
60 Find Apps and Windows Downloads 122 Manage Your Privacy in Windows 10
62 Ten Essential Windows 10 Apps 124 Protect Devices on Public Wi-Fi
64 Explore the Powerful Maps App 127 Best Antivirus Software
66 Navigating with the Maps App 128 Windows Defender - is it
68 Importing Photos in Windows 10 Good Enough?
70 Working with Photos and Images 132 Device Performance & Health
74 Using the Cloud Clipboard 133 Online Safety Tips
76 Screenshots with Snip & Sketch 134 Blocking PUPs with Windows Defender
78 Manage Libraries in Windows 10 135 Using Windows 10 Dynamic Lock
79 How to Use AutoPlay 136 Create a Windows 10 System Image

4 www.bdmpublications.com
196 Modern Day Security

+Protect
198 Digital Security in Numbers
200 Types of Security Risk
202 Hackers and You
204 Social Engineering
206 Ransomware: How it Works
208 The Virus Top Ten
210 Phishing, Vishing and Smishing
212 Pharming

Your PC 214 Windows 10 Security


216 Digital Security FAQ

218 Protecting Yourself


220 Be Smart
222 Top Ten Antivirus and Security Packages
224 Bitdefender Total Security Review
138 Improving the Windows 10 Firewall
226 Kaspersky Total Security Review
140 How to Remove Malware from
228 McAfee Total Protection Review
Windows 10
230 Setting Up Windows 10 Security
142 What is a VPN?
232 Why Updating is Important
144 How a VPN Can Improve
234 What to Keep Updated and How
Windows Security
236 How to Secure Your Web Browser
146 Backup with a Recovery Drive
238 How to Secure Your Home Network
148 Manage Disk Partitions in Windows 10
240 What are Wireless Security Standards?
150 Using the Task Manager
242 How to Secure Your Wireless Network
152 Monitor Tasks with the Task Manager
244 What is Encryption?
154 Fix Wireless Network
246 Encrypting Your Windows 10 Laptop
Connection Problems
248 Top Ten Encryption Tools for Windows 10
156 Windows 10 Registry Tweaks
250 What is a VPN?
158 Windows 10 Maintenance Tools
252 How Can a VPN Improve Windows Security?
160 How to Reset or Fresh Start
254 Top Ten VPNs
162 10 Ways to Reuse an Old USB Stick
256 Using a VPN for Added Security and Privacy
165 Using Windows 10 Storage Sense
166 Easily Sync Files to an External Drive 258 Online Protection & Disaster Recovery
168 Limiting Data Usage when Tethering
260 How Does Information Move Around the Internet?
170 Check and Manage RAM Usage
262 How Can Internet Data be Intercepted?
172 Tweak and Modify Windows 10
264 10 Tips to Protect Yourself Against Interception
174 Ten Things to Disable in Windows 10
266 How to Secure Your Devices
176 Defragment Your Hard Drive
268 How to Secure Yourself on Facebook
178 Updating Your Device Drivers
270 How to Secure Yourself on Twitter
180 Windows 10 Touchpad Gestures
272 How to Secure Yourself on WhatsApp
182 Windows 10 Hotkeys
274 What to Avoid when Creating a Password
184 Six Steps to a Faster PC
276 Password Generators and Tools
186 Remove Windows 10 Bloatware 278 Top Ten Password Managers
188 How to Free Up Space in Windows 10 280 Shopping Online and Security
190 Troubleshooting Windows 10 282 Remove a Virus or Malware from a Windows PC
192 Diagnosing Windows Problems 284 Glossary of Terms

www.bdmpublications.com 5
The Complete Windows 10 Manual

Microsoft 32%
THE APPROXIMATE PERCENTAGE

Windows
OF WINDOWS STORE
DOWNLOADS THAT ARE GAMES

in Numbers SIXTY-FIVE
THE AGE MICROSOFT’S FOUNDER BILL
GATES WILL HIT IN 2020 (WONDER IF
Microsoft and the Windows OS have been around for HE’LL CLAIM HIS STATE PENSION?)
a long time and have had the chance to build up some
frankly impressive statistics. Let’s take a look at a

1909
few of those Windows and Microsoft numbers, to give THE CURRENT
you an idea just how popular and widespread the STABLE VERSION
operating system is in 2020. OF WINDOWS 10
(AT TIME OF WRITING)

900 million
THE APPROXIMATE NUMBER OF DEVICES
CURRENTLY RUNNING WINDOWS 10

18 billion
CORTANA, MICROSOFT’S VIRTUAL
ASSISTANT, HAS BEEN ASKED A LOT
OF QUESTIONS SINCE LAUNCH
15
THE NUMBER OF
DIFFERENT VERSIONS
OF WINDOWS
RELEASED SINCE
WINDOWS 1.0 IN 1985
(NOT COUNTING 3.1,
8.1, ETC.)

6 www.bdmpublications.com
Microsoft Windows in Numbers

35 3.6% AT ITS PEAK, THE WINDOWS PHONE OS HAD


LESS THAN 4% MARKET SHARE (BASED ON
THE NUMBER OF DEVICES SHIPPED)

million
THERE ARE ESTIMATED TO
BE MORE THAN 35 MILLION
WINDOWS APPS AVAILABLE

1985
THE FIRST VERSION
OF WINDOWS WAS

115
RELEASED IN NOVEMBER
OF THAT YEAR

million
THE NUMBER OF
ACTIVE USERS
OF MICROSOFT
ONEDRIVE CLOUD
STORAGE

2015
THE YEAR WINDOWS
10 WAS RELEASED,
REPLACING THE MUCH-
MALIGNED WINDOWS 8.1

www.bdmpublications.com 7
Index

Windows 10
Essentials
Windows 10 Essentials includes guides to getting you started and
making the most of Windows 10. From all of the main elements of the
Windows 10 desktop, including the Start Menu, Action Centre and
Taskbar, to setting up email and personalising the desktop. These
essential guides will help you understand the core features better.

12 34 49
Using the Using the Using Your Windows
Start Menu Edge Browser Personal Assistant
Live Tiles, shortcuts to folders, Discover the many things you The more you use Cortana, the better
settings and more. Learning how to can do with the safe and secure your experience will be. Learn just
use the Start menu is a must. Microsoft Edge browser. how powerful a tool it can be.

8 www.bdmpublications.com
Windows 10 Essentials

10 Discover the Start Menu, Taskbar 28 Personalise and Customise the Desktop
and Action Center
34 Exploring the New Edge Browser
12 How to Use the Start Menu
36 Browsing with Edge Chromium
14 How to Use the Action Centre
40 How to Use Windows Mail
16 How to Quickly Switch Between Tasks
42 How to Set Up and Use the Mail App
18 Manage Notifications in Windows 10
46 Using Windows 10 Search Tools
20 How to Use Snap Assist
49 Doing More with Cortana
22 View and Manage Your Activities
with Timeline 52 Connect Your Phone to Your PC

24 How to Use the File Explorer 54 Connecting Your PC to the Internet

26 Create and Manage Desktop Folders

www.bdmpublications.com 9
Windows 10 Essentials

How to Use the


Start Menu
The Start menu in Windows 10 is useful for much more than just displaying a list of your apps and
software. It includes Live Tiles, shortcuts to folders and settings, and you can even create folders within
the menu itself. Learning how to use the Start menu is a must.

Get to Grips with Start


Microsoft has completely redesigned the Start menu for a new era and it seems to be improved with every update to the OS,
so it takes a little getting used to at first. Here’s our tour of the new Start.

You can right-click anything in the live tiles area of the


1 You open the Start menu by clicking the Windows icon 3
Start menu to bring up the tile menu. This lets you resize,
in the bottom left of the desktop or by pressing the
unpin and even turn the live tile into a static tile. There
Windows Key on your keyboard. The menu in Windows 10 is a
are up to four different sizes of live tile: small, medium, wide and
mix of the Windows 7 and 8 styles but works better than either,
large, giving you lots of ways to build the perfect Start menu.
with a list of apps on the left and Live Tiles on the right.

2 The live tiles work in the same way as they did 4 The tiles are split into groups. You can click the headings
in Windows 8. You can drag any of them around the menu on existing groups to rename them. Dragging one of the
should you wish to reorder them. You can right-click any file, folder tiles to the bottom of the menu, to an unused area of the
or app in Windows 10 and select Pin to Start to include it here. menu, enables you to create a new group. A bar will appear at
Once in the menu, click and drag to rearrange tiles. the bottom to indicate that a new group will be created.

12 www.bdmpublications.com
How to Use the Start Menu

5 The Start menu now allows for the creation of folders. 8 The Most Used section at the top of the list enables
This means that you can further organise the menu by you to access recently opened programs. This will also
keeping related app icons in a single place. To create a folder, show recently opened files, so if you have Microsoft Word
simply click and drag an app icon over another. The icon installed, simply go to the menu next to the icon in the most
beneath will expand slightly. Drop the dragged icon and the used apps menu and you can instantly open your recently
folder is created. worked upon files.

6 On the left-hand side at the bottom, there’s a list of key 9 Clicking on any of the headings (including the individual
items, such as the Settings app and a shortcut to the File letters) of the apps list will open an A-Z selection menu.
Explorer. Click the power icon and you can shut down or restart You can then quickly click on any of the letters to skip directly to
your PC. You can add more options to this shortcut section in the listed apps that begin with that letter, rather than having to
Settings > Personalisation > Start > Choose which folders appear. scroll down through the entire thing.

7 The final area of the Start menu is the apps and software 10 Finally, Windows 10 also makes it easy to resize the Start
list. This displays all of the installed apps and software on menu. Move the mouse to the edges and resize handles
your computer (software which doesn’t require installation to will appear, so you can have it covering half your screen or a
run won’t be shown here). Scroll up and down to view the full much smaller proportion. You can even set the Start menu to
list and click the arrow next to apps to see more options. open full screen, by going to Settings > Personalisation > Start.

www.bdmpublications.com 13
Windows 10 Essentials

How to Use the


Action Centre
There have always been pop-up messages in Windows but now there is a centralised way in which
these are viewed and interacted with. Called the Action Center, it is designed to work more like the
notifications panel on a smartphone or tablet.

Exploring the Action Center


The new Action Center is a key interface element in Windows 10, providing you with access to Quick actions buttons as well as
the notifications and alerts.

1 You can open the Action Center by clicking the speech 3 Clicking on a notification will take you to the app
bubble icon on the far-right of the taskbar or by pressing that generated it. You can also interact with certain
the Windows Key + A on your keyboard. If you hover the mouse notifications within the Action Center panel. On this screen, you
pointer over the Action Center button, it will tell you if you have can see that the Calendar notification allows you to snooze it for
any new notifications. various lengths of time.

2 This is what the Action Center looks like when you click 4 You can also control whether or not an app sends
the button. Any notifications are grouped by app, with a notifications, or whether notifications are prioritised,
heading showing which app they are from. Notifications will from within the panel. Right-click on the app heading when
remain in the panel until you actively dismiss them or action a notification arrives and choose the desired option from the
them (click through to the apps). action menu that appears.

14 www.bdmpublications.com
How to Use the Action Centre

5 If you right-click on the actual Action Center button in 8 A very useful addition to the Action Center is the Quick
the taskbar, you will see some different options in the actions panel at the bottom. This allows you to quickly
action menu that appears. These include the option to turn on perform some key functions (or actions) such as connecting
Quiet hours, show/hide app icons and show/hide the number of to Wi-Fi. You can expand or collapse this bar by clicking the
notifications on the button. relevant heading.

6 In addition to being displayed in the Action Center, 9 The Quick actions panel contains the Tablet mode
notifications will create a pop-up window that appears button. Tablet mode automatically prepares the desktop
at the bottom right of your screen. Clicking on these pop-up for use with a touchscreen and your fingers; perfect if using
windows will also take you to the app that generated the Windows 10 on a touchscreen laptop or tablet. Upon activation
notification (the Calendar app for example). you will notice an instant change.

7 When you’re done with the notifications on the menu, 10 Whether you are on a Windows tablet or a laptop, at some
you can click the Clear All button at the top to dismiss point you will probably need to shut down the Wi-Fi and
them. In Settings > System > Notifications and Actions, you can Bluetooth (on an aircraft for example). Clicking Flight mode halts
choose the Quick Actions that appear at the top of the bottom all wireless communication and places an aeroplane icon in your
panel in the Action Center. notifications area.

www.bdmpublications.com 15
Windows 10 Essentials

How to Quickly Switch


Between Tasks
The taskbar not only gives you quick access to several key Windows 10 tools like Search and Cortana, it
can be further customised with pinned apps, system tools and settings. Making full use of the taskbar
can really improve how Windows 10 works for you.

Mastering the Windows 10 Taskbar


There are a lot more features and functions of the taskbar than may first meet the eye. Let’s take a look at how you can
discover and master them.

Start Menu Button Clicking this, as you will no doubt Cortana Cortana is now separated from Windows search,
know by now, opens the Start and is activated using the small circular button
menu. This is where you find all of the apps and software on next to the search box. It is now a more focused virtual assistant,
your computer listed, along with Live Tiles and system folders. allowing you to create reminders, lists and perform functions using
Right-clicking on the Start menu button opens a different menu, voice, or one of the many Cortana-connected apps.
containing links to system tools like Task Manager.

Search Box The Search box is integrated into the taskbar Task View The icon next to the search bar is Task View,
in Windows 10, so it is always visible and which also includes Timeline. This is Windows
available. Just click anywhere in the search box to begin using it. 10’s new way to switch between open apps and it’s really rather
If you prefer, you can hide the search box completely, or replace good, providing you can get used to using it. Click to open
it with a search icon. Right-click on the taskbar to change or alternatively you can open the Task View by pressing the
between these. Windows Key + Tab.

16 www.bdmpublications.com
How to Quickly Switch Between Tasks

Pinning Apps A few apps and other software will be Peek Hovering over any open app icon in the taskbar
pinned to the taskbar when you first use brings up a Peek preview of the window. If a movie
your Windows 10 PC. You can add more as and when you choose. is playing, for example, you will see it playing here too. If you
To pin apps, right-click on the app icon anywhere you see it (Start mouse over the preview, the X icon appears so you can close the
menu for example), click More and then Pin to taskbar. Shortcuts window down directly from the taskbar should you wish to.
can also be pinned.

System Icons Quick access to various system tools, Taskbar Tools The taskbar contains several unique tools.
including sound and network settings. These can be shown or hidden as you
The exact icons that appear here will vary depending on your prefer. They include the People app, Task View, the Windows Ink
system set up and apps installed. If we were using a laptop here workspace and the Touch keyboard button. Right-click anywhere
rather than a desktop, for example, a battery icon would be in the on the taskbar and you can show or hide these tools in the menu
notifications area. that appears.

Notifications The Action Center gathers together all your Jump Lists Right-clicking anything on the taskbar once
pop-up notifications from things like the again brings up a context menu. Apps such
email app or Windows update. It also features Quick Settings as Word and Excel feature jump lists, showing you recent files
buttons for things like Wi-Fi. The Anniversary update added that you can pin to the list using the drawing pin icon. What
notification badges, meaning you can see how many unread appears in the jump list varies between apps, e.g. Edge will
notifications you have. show recent websites visited.

www.bdmpublications.com 17
Windows 10 Essentials

Manage Notifications
in Windows 10
If you’ve used a modern smartphone, you should be all too familiar with Notifications and alerts.
Windows 10 has embraced the use of similar notifications in a much bigger way than older versions.
Here’s how to manage those useful little pop-ups and alerts.

Viewing Notifications
Viewing your notifications is very straightforward, as they are all grouped together within the Action Center. You can see when
you have new notifications by the numbered badge that appears.

1 Some notifications pop up in a small window in the 3 Some notifications can be interacted with in the pop-up
bottom right corner of the screen as they arrive, others or in the Action Center. For example, after installing an
will simply arrive in the Action Center and display a badge on the app such as Spotify, a notification will appear telling you that
Action Center button, again at the bottom right of the screen. To the installation was successful, and letting you launch the app
see your active notifications, click the Action Center button. or pin it to the Start menu straight away.

2 Notifications are displayed under relevant headings and 4 Notifications of events from the Calendar app will always
will be grouped together accordingly. So if you have appear as a pop-up first and then appear in the Action
two different Calendar app notifications, find them grouped Center. You have the option to interact with both, by snoozing
together under a calendar heading. Notifications that pop up a the notification for a selectable period of time. Doing this will
window will vanish after a few seconds if you ignore them. remove it from notifications until it pops up again later.

18 www.bdmpublications.com
Manage Notifications in Windows 10

Managing Your Notifications


You have a high level of control over how you are notified of things happening or requiring attention on your Windows 10
computer. Let’s take a look at managing your notifications.

1 Notifications that are showing in the Action Center 4 Open the main Settings > Notifications & actions and you
will disappear after you have clicked on them or can see several more ways to manage your notifications
actioned them. You can also remove them from the panel by and the Action Center. At the top you will see the panel for
hovering your mouse pointer over them and clicking the X reviewing, adding and removing Quick actions buttons (that
that appears. Some notifications can be safely ignored, but be appear in the Action Center). Available Quick actions will vary.
wary about which.

2 Right-clicking on a notification heading in the Action 5 You will also see a few sliders that allow you to control
Center will bring up a small action menu allowing you to general notifications settings such as whether you get
choose to turn off future notifications from that app or service, or notifications from apps, notifications are shown on the lock
make it a priority. You can also go directly from this action menu screen of your PC and whether they are shown when you are
to the main notifications settings. duplicating the screen.

3 Right-clicking on the Action Center button will bring up 6 Below these are sliders to enable or disable notifications
a small options menu, allowing you to turn on/off Quiet for individual apps or services in Windows 10. Click on
hours (a period when no notifications are shown), whether app the name of the app or the feature and a new screen will open,
icons are shown in the Action Center and whether the number letting you fine-tune the notification setting for each in much
of notifications is shown on the Action Center button. more detail (e.g. set the max number of notifications to show).

www.bdmpublications.com 19
Windows 10 Essentials

How to Use
Snap Assist
Snap Assist enables you to ‘snap’ windows to the sides of the screen. With displays getting bigger, the
logic is that we can have more windows on our screens. Being able to split the screen into different
sections for different windows is useful and Snap Assist in Windows 10 is designed to help.

Snapping Windows
It is very easy to have several windows open after just a few minutes of working on your PC and it is equally easy to lose track
of them. Snapping windows helps prevent that.

1 To snap any open window or app to the side of the 3 If you have several windows open when you snap one to
screen, left-click on the title bar at the top of it and drag it the left or right, the snap assist display will be shown. This
over to either the far left or right of the screen. Your mouse display contains all of your other open windows as smaller
cursor will need to reach the edge, not just the side of the thumbnails, positioned on the side of the screen opposite where
window, for this to work properly. you snapped the window.

2 As the cursor reaches the edge of the screen, a 4 Left-click on any of these thumbnails and that window
transparent outline will appear with a small flash, to show will snap to the other side of the screen (opposite the
where the window will appear once snapped. Release the one already snapped). You can also snap windows by selecting
mouse button and the window will snap into place. You don’t them and pressing the Windows key and an arrow button on
need to wait to see the outline, just drag and release. your keyboard.

20 www.bdmpublications.com
How to Use Snap Assist

5 You can also snap four windows in Windows 10, one into 7 You can also combine snapped windows in different ways.
each corner of the screen. Having four windows snapped For example, one full height window snapped to the left,
into the four corners of your screen is only really workable if and two windows snapped in the two corners on the right, giving
you have a large monitor, although anyone with Windows 10 you three windows open at once but keeping one of the
can do it. windows at a more usable size.

6 To snap four windows, you click and drag in the same way 8 To unsnap windows you simply click on the title bar of
as explained above but you drag into the corners rather each window and drag it away from wherever it is
than just to the edge. You will see the transparent outline appear snapped to: sides or corners. Snapping is a great multitasking
but it will now only cover a quarter of the screen. The snap assist tool and once you start using it, you won’t want to go back to
display will still appear. randomly floating windows.

Snapping Vertically
Windows 10 also adds support for vertical window snapping. This works slightly differently to normal window snapping, as
most modern monitors make vertical snapping a less useful option for splitting a screen.

1 Press Windows Key + Up or Windows Key + Down to snap 2 You can’t do this with the mouse, you need to use the
the current app to the top or bottom halves of the screen. keyboard shortcuts. Dragging a window’s title bar to the
Pressing Windows Key + Up a second time will maximise the top of your screen will just maximise it, while dragging it to the
window, while pressing Windows Key + Down a second time will bottom of your screen won’t do anything. Some universal apps
minimise it. may not behave well with vertical or 2×2 snapping.

www.bdmpublications.com 21
Windows 10 Essentials

How to Use the


File Explorer
Here we’ll take you through the improvements to the general Windows 10 file browser. Many features
remain from Windows 7 and 8 (such as clicking in the far right of the taskbar to minimise everything)
and apps on the taskbar work the same.

What’s New in File Explorer?


File Explorer is a much undervalued part of Windows. And while it hasn’t fundamentally changed for several versions of the
operating system, Windows 10 introduces some interesting enhancements, which we’ll take you through here.

1 The way you browse files in Windows 10 is broadly similar 3 There are also new icons across all File Explorer views,
to previous versions of Windows, but File Explorer has while there are a lot more file operations that you can
been enhanced. The main Quick Access window shows you access on the menu at the top of the window (known as the
your most frequently used folders (after all, how many of us dip ‘ribbon’ in Microsoft speak) without the need to use the right-click
into more than five or ten folders in a day?) and also recent files. menu. This is to make it easier for PCs with touchscreens.

2 The sidebar also works on the same principle and via a 4 This PC is similar to before, but the link to Control Panel
new Quick Access feature you can pin folders or files that has been replaced by the Settings app, which you can
you want to stick around. It will also show you Frequent folders now see on the menu bar. Although the Control Panel is still
too. You can pin things permanently onto Quick Access by present in the background of Windows 10, Microsoft intends for
right-clicking them and selecting Add to Quick Access. you to use the new Settings app and directs you there
wherever possible.

24 www.bdmpublications.com
How to Use the File Explorer

5 Also from This PC (you might know it as My Computer if 8 The Windows 8 Charm bar has been abandoned in
you previously used an older version of Windows), you Windows 10 and the functions for Windows Store apps are
can access the Programs and Features Control Panel area if you hidden away inside the apps themselves; functions such as the
want to uninstall a particular piece of software. Settings for the app itself and the ability to Print or Share.

6 File Explorer’s Share tab also gets a new treatment, with 9 If you’ve come from an earlier version of Windows, you
the Share logo (first introduced with Windows 8’s Charm might not be familiar with OneDrive. It’s Microsoft’s cloud
bar) now used for file sharing from all apps. You can choose to storage application and it’s available right from File Explorer in
email a file straight from the File Explorer window, add it to a zip Windows 10, so you can access your files just as if they were on
file or share it with other Windows users. your own computer.

7 If you want to see what other options you have for 10 On-screen notifications have changed in Windows 10.
sharing – perhaps using the Windows Mail app - highlight Unlike in Windows 8, where they display in the top right
the files you want to share, then click Share. A pop-up bar will of the screen, all notification action is now centred around the
appear on the left of the screen and will show you the options bottom right. There’s also a place where notifications reside after
you have to share that file(s) or folder(s). they’ve popped up.

www.bdmpublications.com 25
Windows 10 Essentials

Create and Manage


Desktop Folders
Despite all of the changes to the Windows OS, folders have remained as one of the core tools for
organising your files. Much more than just boxes to keep your photos or music files in, folders can really
help to improve how you use Windows 10 on a day-to-day basis.

Creating New Folders


It may sound too simple if you are a long time Windows user but here’s a look at how to create new folders on the desktop
and within other folders.

1 On the desktop, right-click and select New folder from the 3 Double-click any folder to open it and view the contents.
action menu that appears. The familiar yellow folder icon You can move items into a folder by selecting, dragging
will then appear at that position on the desktop (wherever you and dropping into an open folder or a closed one. If the folder is
clicked), with the name automatically set as ‘New folder’ but closed, drag the selected items over the top of it until the folder
highlighted ready to change. is highlighted, then release.

2 You can leave the name as ‘New folder’ if you wish. If 4 To delete a folder, right-click on it and select Delete from
you then create a second folder next to the first, it will the action menu. You can also click and drag the folder
automatically be named ‘New folder (2)’. You can rename to the Recycle Bin icon on your desktop. Anything in the folder
a folder at any time by left-clicking on the title once, or will also be placed in the recycle bin. To move folders around
right-clicking and selecting Rename from the menu. the desktop, just click, drag and drop them.

26 www.bdmpublications.com
Create and Manage Desktop Folders

Managing Your Folders


Once created, folders can be adapted and customised in a number of ways. You can even change the default icon used
whenever a new folder is added.

1 You can manage a folder in a number of ways without 4 Most of these options are self-explanatory, such as copy,
even opening it. Right-click on any folder and the paste and select all but some are a little more confusing.
action menu appears. The exact options that appear will Most casual computer users won’t need to use 90 per cent of
depend on the apps or software you have installed but can the options in their day-to-day use but it is worth understanding
include scan for viruses, compress, shred, zip and more. them anyway. Add a few files to the folder and experiment.

2 The standard (Windows 10) options in the folder action 5 If you want to get really deep into managing your
menu include Pin to Quick Access, Open, Share With, Pin folders, there are even more options to explore. Open
to Start, Send To, Cut, Copy and Create Shortcut. If there is a any folder and right-click anywhere inside the main window.
small arrow next to an option in the menu, it means a further From the action menu that appears, click Properties. Here you
options menu will open when rolled over. can manage all sort of things, from security to icon style.

3 Open the folder and a whole range of further options are 6 To change the icon style, that will change the style of
available along the top of the new window. You will see all folder icons, click the customise tab and then click
four main tabs along the top: File, Home, Share and View. Each Change Icon at the bottom. Scroll to view all of the available
one of these, when clicked, will display a different set of further icons (downloaded icons can be accessed by browsing), click on
options relevant to the section. your preferred icon and click OK.

www.bdmpublications.com 27
Windows 10 Essentials

Personalise and
Customise the Desktop
One of the most welcome features of Windows 10 is the return to the familiar desktop environment
and there are many ways to customise it to suit your needs and tastes; including icon size, background
image and colour scheme.

Change the Desktop Background


The Desktop personalisation procedure hasn’t changed much since Windows 7, so if you’ve used that OS before this will feel
very familiar.

1 You can get started with personalising the Windows 10 3 To select your own pictures for the background, click on
Desktop in exactly the same way as you did with Windows the Browse button and navigate to the folder containing
7. For anyone completely new to Windows, that means the images you want to use. For best results, you might need to
right-clicking anywhere on the Desktop screen and selecting crop some of your pictures to the same aspect ratio, i.e.
Personalise from the action menu that appears. widescreen, as your monitor screen.

2 The Background settings will be displayed first by default. 4 To set a picture as your Desktop background, simply click
Click the first drop-down menu to select whether to use on it. It will instantly be set as your new Desktop
the default backgrounds, solid colours or choose to display background image (a preview will display). The screen shows
folders of your own images. Your choices here changes what is you the last five images used or you can click the Browse button
displayed in the background settings. to choose a new one from your folders.

28 www.bdmpublications.com
Personalise and Customise the Desktop

5 If you opt for Slideshow, you will see some additional 6 Even if you set a background image, you can also change
options to choose from. You can set the interval for the the colour of the actual desktop. Click on the Colours
slide show from the ‘Change picture every’ menu and decide option at the bottom and choose a background colour. You can
how you’d like the images to fit on the screen by clicking the also choose a custom colour from a more detailed hexadecimal
‘Choose a fit’ menu. colour selector.

Choose Accent Colours


By accent colours we mean the colour of the taskbar, the Start menu and the frames of new windows and so on, that you
open on your computer.

1 Windows 10 now allows you to change the default 3 If you prefer, you can also let Windows automatically match
Windows colour mode from light to dark. You can also the accent colour to the current desktop image. This isn’t
choose custom colour mode, which will give you the option to a perfect solution and works best if the desktop background
choose light Windows and dark apps, or vice versa. Use the image you are using is predominantly one colour. To do this, just
drop-down meu to select the mode. tick the checkbox.

2 In both light or dark mode, you can further customise 4 You can choose where your new colour accent is applied.
how Windows 10 looks by changing accent colours. This You can set it so it changes the Start, taskbar and Action
affects things like the toolbar of open windows, the tiles in the Center and the Title bars of windows. You can also pick one or the
start menu and various other accents. Just choose from the other, or a combination of all options. You can also make these
colour swatch. elements semi-transparent.

www.bdmpublications.com 29
Windows 10 Essentials

Lock Screen Customisation


The lock screen can feature custom backgrounds with Spotlight Images, display app statuses, and even give you direct access
to Cortana.

1 The first thing to choose is whether to display one of 4 You can check how the detailed and quick statuses are
your own images, a slideshow of images or something displayed on your lock screen by letting your PC sleep or
from Windows Spotlight. If you choose either of the first two of by pressing the Windows Key and choosing Sleep. Be aware
these, more options will appear to select the images you want however, that statuses may not show up straight away for things
to use (single or multiple). like Messages and Email.

2 You will see that there are two separate sections for 5 There are several other lock screen customisation options
adding apps here. The section with the single app icon here. You can choose whether to display an image on the
is the one which will display more detailed information and sign-in screen as well as the main lock screen and there are
the section with seven icons/spaces for adding apps which will direct links to Cortana settings, where you can control how
show quick statuses. Cortana works on the lock screen.

3 You can add as many apps as you wish here, up to the 6 The final two links take you to screen timeout and screen
maximum of eight. To choose which apps have statuses saver settings. The settings you choose there will depend
displayed, click on one of the spaces and choose from the on your personal preference and also on your computer
pop-up menu that appears. The menu for the detailed location. Setting a shorter timeout means that your computer
information space will be slightly shorter than for quick statuses. will be secure if you have to leave it.

30 www.bdmpublications.com
Personalise and Customise the Desktop

Disable the Lock Screen


There is no setting to disable the lock screen completely but it is still possible to do by delving into the Registry. This is fairly
advanced customisation, so approach with care.

1 To access the Registry, press the Windows Key 2 Name this new key “Personalisation” and then navigate
+ R, enter regedit, and then click OK. With the Registry inside it. Right-click inside the right-hand pane and select
open, navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ New > DWORD (32-bit) Value. Name it “NoLockScreen”. Then
Microsoft\Windows\. Right-click the final Windows folder and double click this new value and change the Value data to 1. Then
click New > Key. click OK and exit the Registry Editor.

Adding New Themes


Themes can be added from a variety of sources but the best place to find them initially is the official theme page from
Microsoft, or from the Windows 10 Store.

1 You can access the current theme page in a couple of 3 Each theme is displayed with a thumbnail and the
different ways. You can open the web browser and number of images supplied shown. The Microsoft theme
navigate to www.support.microsoft.com/en-gb/themes, or page doesn’t allow you to view all of these images before you
Google “Windows 10 themes”. Alternatively, open Settings > download, you just have to base your choice on the title and
Personalisation > Themes and click ‘Get more themes in thumbnail. Click Download on any you like the look of.
the store’.

2 All of these actions should bring you to the same themes 4 Different themes will contain different amounts of
page. Be aware that all themes here will soon be moved content. Some might only have a colour profile and a few
into the Windows Store app. Themes are listed in a variety of desktop wallpapers; others might contain icons, colours,
categories down the side of the page, ranging from Featured wallpapers and sounds. Even the simplest of themes is likely to
Themes, to themes with custom sounds supplied. be more than just changing the desktop wallpaper.

www.bdmpublications.com 31
Windows 10 Essentials

Applying a Theme
A theme can spice up your desktop significantly, adding animations, custom icons and mouse pointers. Here’s how to apply a
desktop theme.

1 Once a theme is downloaded, you may need to open it to 3 Themes downloaded from the Windows Store won’t need
activate it. You can do this directly from the download to be activated in this way. You can just click the Get button
interface that appears at the bottom of the browser window on the theme page in the store and then view the theme in
(showing download progress) or you can go to your Downloads settings > personalisation > themes. You can switch between
folder, right-click on the file and click Open. themes here just by clicking the thumbnail.

2 The theme will then be applied, and the first desktop 4 Each theme applied can be customised further using the
wallpaper in the sequence will appear on your screen. options in the Themes section. You can alter the
Any colour profile changes will also be applied. If you want to background, colour, sounds and even the mouse cursor of any
manage the theme settings, head to Settings > Personalisation > theme, making it completely unique to you. When you have
Themes > Theme Settings. chosen the changes, you will need to click Save Theme.

32 www.bdmpublications.com
Personalise and Customise the Desktop

Change Your Desktop Icons


If you use desktop icons such as This PC, your personal folder or Network connections, you can change those icons. You can
even download complete icon packs online, giving your desktop a completely different feel.

1 Open the Personalisation screen of the Settings menu and 3 If you wish to do so, it is possible to choose different icons
select Themes from the sidebar menu. You now need to for these system tools and you can even download
look for the Related Settings option. In the Related Settings custom icons online. To change the appearance of the desktop
section, click on the link to Desktop icon settings. icons, click on the icon you want to change and then click the
Change Icon button.

2 The window that now opens lets you choose which default 4 The icon chooser window that appears will look very
icons appear on your desktop. The Recycle Bin is just familiar to veteran Windows users, since it’s essentially
about essential but the others, including Computer, Users Files, unchanged from Windows 98. Scroll through the gallery until
Network and Control Panel icons are optional. you find an icon you like or use the Browse button to navigate
to any icon pack you’ve downloaded.

www.bdmpublications.com 33
Windows 10 Essentials

Browsing with
Edge Chromium
The latest version of Edge, Edge Chromium, is a significant change and offers a much better browsing
experience. Based on the Google Chrome browser, Edge is focused on modern web standards, privacy
and security and boasts several new features.

Get Started with Edge Chromium


Edge Chromium feels much less clunky than the previous version and already feels more like the most popular browsers
available, such as Chrome or Firefox.

1 If you haven’t already updated to Edge Chromium, you 3 Depending on the layout you chose during setup, the
can download it from www.microsoft.com/edge. Once start page will either display a news feed or a cleaner
downloaded, click on the download to install it. The new version page (with the news feed just a scroll away below it). You can
automatically overwrites the old version of Edge, completely check out the other layouts easily by clicking the Gear icon at
replacing it on your computer. the top right and choosing from the menu.

2 During setup, you have the option to import browser data 4 To search for a website or web page, you can type in the
such as bookmarks and favourites from Google Chrome, search field at the top (which is always there), or you can
choose the initial start page layout, and set up syncing across type in the search box floating in the start page. When you type
devices (other computers, your phone, etc.) Once installed, Edge in either box, Edge shows a list of suggestions based on what it
opens at the start page. thinks you require.

36 www.bdmpublications.com
Browsing with Edge Chromium

5 All of the main Edge controls run along the top bar. On the 6 The news feed displayed on the Start screen is split into
far left are the Back, Forwards, Refresh Page and Home sections: News, Entertainment, Sport, etc. and you can
buttons. The Set Aside and All Tabs buttons from the old version scroll down in each section to see more stories. To go to the
of Edge are gone. Clicking the + opens a new tab and clicking the source website in a new tab, click on any of the stories in the
small X closes an open tab. feed. Click Personalise to choose news categories to display.

Edge Tools
Lots of the old Edge tools have been removed, including Set Aside Tabs and the ability to write on web pages. There are,
however, still lots of tools in Edge.

Favourites To access Favourites, or bookmarked sites, InPrivate Window If you want to browse in private
click the button directly to the right of the mode when using Edge, you can do
address bar (star with three lines). Clicking opens a fly-out list, at so easily. To open a new InPrivate tab, click the browser menu
the top of which is the option to “Manage favourites”. This opens button at the top right and select “New InPrivate Window”. You
the list in a new page, where you can remove or re-order them. can also open a new private tab by using the keyboard shortcut
Ctrl + Shift + N while Edge is active.

Recent Sites The new Edge start page features a row Browser Zoom The option to zoom is also in the
of icons showing your recently visited browser menu. This increases/decreases
websites or pages. Clicking these shortcuts takes you to that the text and image display size in Edge, and will remain at
site/page instantly. You can also use this tool to show your whatever zoom level you set even when you close and re-open
favourite sites. Just click the + at the end and enter the name Edge. Also available here is a button to switch the Edge window
and URL of a site you want to add. into full screen view quickly.

www.bdmpublications.com 37
Windows 10 Essentials

EDGE PRIVACY
Microsoft seems to be taking users’ privacy choices seriously adverts) is displayed and how well all Website features work
with Edge Chromium, and you now have a much easier way to depends on the level you choose.
control your browsing data and history. The biggest Our advice is to switch to Strict and then see how it affects
improvement is Tracking Prevention. You can access these your favourite websites. If you find things are not displayed as
settings in Browser Menu > Settings > Privacy & Services. they should be, you can always switch back to Balanced.
You can choose three different levels of tracking prevention: You can view sites that you have blocked from tracking you,
Basic, Balanced and Strict. These options all block known and also allow exceptions if there are sites which you want to
harmful trackers, but how personalised content (such as allow to track you.

Edge Tools
Now that you understand the basics of using the new Edge browser, let’s take a look at some of the features and tools that turn it
from a good browser into a great browser.

Immersive Reader If you find the adverts, social links Read Aloud While you are in Immersive reader mode,
and other elements of a modern you have the option to “Read Aloud”. This
website distracting, you can use the Immersive reader in Edge to starts a text-to-speech tool, which reads out the text of the
clear the clutter. Not all pages are compatible, but most are. To Website. You can also do this while viewing a website in normal
enable Immersive reader, open the page and click the Book icon view (Browser Menu > Read Aloud), but it works better while in
in the Edge address bar. Immersive reader.

38 www.bdmpublications.com
Browsing with Edge Chromium

The Edge Menu Click the Menu button (three small dots Edge Tabs New tabs are opened either by clicking on a
in the top right) to open the Edge menu. link (if the link is set to open as a new tab) or by
From this menu, you’re able to access Settings, print a page and clicking on the small + button at the top left of the browser. You
find words or phrases in the open web page. Another option can have lots of tabs open at the same time. Right-click on any
allows you to pin a particular web page to the taskbar as an icon, tab to see further options such as Reopen closed tabs.
should you wish to.

Edge Settings Clicking the Settings option in the Edge Custom Layout You can change the layout between the
menu opens another menu with further three presets by clicking the Gear icon.
options. Tabs down the side of the menu take you to different You can also choose a custom layout. Here, you can enable/
settings sections, including Privacy & Security and Advanced. disable the Quick links bar, the image of the day and set the
In the General settings, you can change the theme, homepage visibility level of the content in the news feed. You can also
and other basic options. change the browser language.

Edge Theme In addition to the ‘light’ default theme of Extensions Just like the previous version of Edge, Edge
Microsoft Edge, there’s an option in Settings Chromium features extensions, which are
to display a black theme. It’s becoming a lot more common for downloaded from the Microsoft Store. You can view installed
applications to have dark themes and the Windows 10 taskbar extensions in the Browser Menu > Extensions. There are fewer
is dark too. It’s a good alternative to having super bright apps. extensions available for the new version, but this situation will
improve as it matures.

www.bdmpublications.com 39
Windows 10 Essentials

How to Set Up and


Use the Mail App
The Windows 10 new email client is a lot different from previous apps such as Outlook Express. It’s a
relatively recent idea for you to have all your emails in one place, whether it’s your work account, a
Hotmail or Outlook address or email from Gmail.

Meet Your New Email Client


Mail has been completely redesigned for Windows 10 and is wholly unrecognisable from the Windows 8 equivalent (that’s a
good thing). But even with these improvements, it still needs a bit of tweaking before it comes into its own.

Welcome As it says here, the idea behind the Mail app Account Type If you click Add Account, you can add
in Windows 10 is to gather all your emails accounts from many popular providers
together in one place to “simplify life a bit”. The app is quite including Google, Yahoo and Apple’s iCloud. You can also set up
clever in how it handles email and it certainly differs to older other more specialist accounts if you have the details. Finally,
apps such as Windows Live Mail and Outlook Express. there’s also an option to add a Microsoft Exchange account if
your workplace uses that (including Office 365).

Default Account If you signed into Windows 10 with a Advanced Set-up If you need to select the Advanced
Microsoft account, the Mail app will Set-up option, you can choose
automatically pull this in if it’s enabled for email. As you can see, between the type of account you’re setting up. Usually you’ll
you can also click Add Account if you have other email accounts select the Internet Email option – this includes accounts that use
you want to add (this can be from basically anywhere as long as the POP3 or IMAP protocols to retrieve email (if your provider
it’s your account). gives you the choice of which of those to use, select IMAP).

42 www.bdmpublications.com
How to Set Up and Use the Mail App

Google Accounts If you’re adding a Google account, Writing a Mail There’s also a Refresh button as well as
you’ll get this somewhat familiar a Select mode, so you can select various
pop-up appearing inviting you to enter your username and emails (with a view to moving or deleting them). Now we’ve
password. If you have Google’s two-step authentication clicked the Forward button along the top to forward this email.
enabled, you’ll get a text message to confirm your identity and As you can see, this has created a draft under the original email
you’ll be asked to enter it. on the left.

Microsoft Accounts As we said before, normally your Insert Attachment Emails are ‘grouped’ like this in
Microsoft account will have already Mail, meaning that if you and
pulled in automatically. If not, you can add it manually. Just a friend have a conversation, all the emails will be grouped
enter your email address and password. If you don’t already together so that they’re easy to retrieve. You’ll notice we’re still
have a Microsoft account, you can set one up from here by composing our email here, and we’ve clicked the Attach button
clicking the link and following the steps. to select an attachment.

Your Inbox Here’s your inbox! Your email list is shown Sent Mail This is what a sent mail looks like. As you can
on the left, with the contents of each email see, it’s now ‘nested’ under our original email
appearing on the right. We have three new emails here, and the sender is me (or you). You’re able to look at just sent
designated by the blue colour. You can also search for any items in your folder still, and we’ll show you how to do that in a
emails using the search box at the top – this works much more few steps.
quickly than in older apps.

www.bdmpublications.com 43
Windows 10 Essentials

Edit Text As well as just writing simple plain text emails, More Text Options As well as styles, Bold, Italic and
there are plenty more editing functions in Mail, Underline, there are other ways you
which we’ll check out in the next few steps. Using the Format can make text stand out or add emphasis. As in Word, you can
tab at the top of the editing window, you can change selected have subscript or superscript text or add highlighting (quite
text – here we’ve used bold to highlight a particular phrase. useful for quick editing of paragraphs in emails). Finally, you can
clear the formatting of any selected text.

Apply Styles There are also various pre-defined styles you Change Colour You’re able to easily change the colour
can apply to text – useful if you’re writing a of the text in your email and, while you
long email and you need to have sub-headings or headlines in still have a limited range to choose from, you’ve still got a lot of
the text. These work very similarly to styles in Microsoft Office; choice (far more than in many other apps, anyway). Strangely
styles that you might use for a report or essay. Windows chooses to take most of these colours from your
current Windows theme. No, we’re not sure why, either.

Define Styles You can browse through these styles using Inserting Images As well as the button to include
the drop-down arrow next to the style attachments, the Insert tab features
selection box. As well as fairly standard styles, there are some a Picture button so you can insert an image into your email, as
other ways you can get text to stand out including quotes and opposed to just sending it as an attached file. Once inserted,
what are called ‘Intense’ styles, which place quotes in between you can select it with your mouse and adjust its size (drag the
parallel lines to encourage reading. corners as you can see here).

44 www.bdmpublications.com
How to Set Up and Use the Mail App

Spelling Options Before you send an email, you can Change Zoom If the text in emails is too small for you,
always spell check it – this is integrated you can zoom in to your messages –
into Mail under the Options tab. You can select the language you again, this is also accessed through the … menu. A handy
need (you might be emailing a hotel in France so using French, keyboard shortcut for zooming in is Ctrl-+ to zoom in or use Ctrl
for example) and correct any spelling errors as you go. and – to zoom out. This actually works in most apps, including
many web browsers, too!

Email Menu As well as the basic reply, reply all, forward, Right-Click Even if you’re not actually looking at a
archive and delete commands at the top particular email, you can still perform
of each email, there’s also this extra menu – just click the … numerous actions on it. You can right-click on emails to move,
button. You can move to the next email or previous message if archive or delete them or mark them as read/unread. If you’re
you want to do that, but crucially you can also move your email deleting emails, you can also just select them and use the
into a folder. delete key (we find this is actually the easiest way).

Move Folder If you chose to move your email in the Print it Off From this menu you can also print off emails
previous step, you’ll see this browser view – this will open the now-standard Windows
which enables you to add your email to an existing folder. You print dialog box which is now black (presumably to make the
can always create a new folder for storing emails in particular predominantly white print preview stand out). You can select to
categories. If you just want to remove your email from the inbox print off the whole email or just the first page, as well as browse
but still keep it, use Archive. through the pages using the controls at the top.

www.bdmpublications.com 45
Windows 10 Essentials

Using Windows 10
Search Tools
Search and Cortana are no longer combined into one tool in Windows 10. Search now has some
additional tools and settings which help you find things both on and off your computer. Added extras to
search include recent activities and most used app links.

1 Click in the search field at the left of the taskbar and the 3 If you don’t want to display everything associated with
new search panel will pop up on screen. You can now your typed search term, you can use the tabs at the top
simply start typing your search term and watch as the results of the search panel when it opens. These let you filter results
are listed in the panel. The results will be split into sections such to just Apps, Documents, Emails, Web, Folders, Music, People,
as Documents, Apps, Photos and Web. Photos, Settings and Videos.

2 If the app, setting, photo or document you are looking for 4 Results will display more information on the right side of
is highlighted at the top of the search panel as you type, the search panel. For example, a web search will display
you can simply press Enter to open it. To view a non-highlighted a list of search results from Bing. Mouse-over any of the results
result or category, you can just click on it to open it (open a web in the list on the left, and then click the right-pointing arrow that
result in the browser, for example). appears to see more info in the search panel.

46 www.bdmpublications.com
Using Windows 10 Search Tools

5 When web results are shown in the search panel, you can 8 Search is linked to Timeline, so the search panel also
scroll the list to see more (assuming there are more than shows recent activities when first opened. These include
a few results) just like when viewing search results in Bing or documents you have recently edited, web sites and pages you
Google. You can further refine search results shown, by using the have visited and app/games you have had running. Click the
web, images and videos tabs at the top. “Open Timeline” link to do just that.

6 For things like documents and photos on your computer, 9 You can access search settings from the Menu button at
the right panel will display information about the file the top right of the search panel. This will also tell you
(when it was created and where it is stored), as well as links to which account is currently in use and connected to search. Click
Open, Open File Location and Copy Full Path to the file. Apps the link to manage accounts, including which email account will
found in the store have an Install link. be searched here.

7 The search panel also includes a set of links to your most 10 Click on Search Settings to open the main settings
used apps or software. These are displayed along the top app to the relevant section. Here you can control Safe
of the panel when it first opens, but are replaced by search results Search settings, cloud search content, and your search history.
as you begin to type. Clicking on any of these app links will open You can also control what is searched (all files, or just libraries
the app directly from the panel. and desktop) and choose to exclude folders from search.

www.bdmpublications.com 47
Windows 10 Essentials

Advanced Search Settings


Head into the main settings app and click on the Search section. Here you can find search settings under two categories:
Permissions and History, and Searching Windows.

Enhanced Search The default file search setting is Manage Search History Windows 10 can collect
Classic, which just returns results from search history from one or
your libraries and from your desktop folder. You can change this more devices, to provide a much more personalised search
to Enhanced search, which will re-index your files and provide a experience. If you prefer, you can disable search history, either
much wider set of search result in the search panel. Libraries and on a single device or across all of your connected Windows 10
desktop are still included. devices. You can also clear existing search history.

Excluding Folders You can choose enhanced search Troubleshoot Search If you having problems with
and then exclude folders from the search (files not appearing in
search index. This means that those folders and their contents results as expected, for example), you can run the indexing
won’t appear in search results. There are already several troubleshooter. Open Settings > Search > Searching Windows
folders excluded, including important system folders and and scroll to the bottom. Run the troubleshooter, and then select
things like AppData. the problem you are having.

Advanced Index Settings You can further tweak the Taskbar Display Windows 10 now separates the search
areas of your computer that field from the Cortana button. You can
are indexed by the search by clicking on Searching Windows > further customise how search is displayed in the taskbar if you
Advanced Search Indexer Settings. Here you can choose to index wish. Right-click on the taskbar and highlight “Search” from the
encrypted files, rebuild the search index, and even change the action menu. You can choose Hide, Show Search Icon or Show
search index location. Search Box.

48 www.bdmpublications.com
Using Windows 10 Search Tools/Doing More with Cortana

Doing More
with Cortana
Cortana is your personal digital assistant in Windows. The more you use Cortana, the better your
experience will be. So if you haven’t used it much yet, or are feeling slightly underwhelmed, this guide
will show you just how powerful a tool it can be.

The Cortana Notebook


The Notebook in Cortana is your way of making the feature more helpful when using it every day with your PC and
Windows 10. The Notebook contains the Organiser and Cortana Skills.

1 You can view your 3 With the Organiser tab


Notebook by clicking selected, you will see
in the search field in the your lists and reminders. If
taskbar, and then clicking you have not created any, you
the Notebook icon in the left will see the options to create
sidebar. You will see your both. Click the Lists option
name, plus the email address and you can choose to create
associated with your Microsoft a shopping list, a to-do list,
account, at the top. And or any other type of list. Also
below that, two more tabs, for here are some pre-made lists,
Organiser and Manage Skills. but they can be altered.

2 To edit some of the 4 When you open


information about a list, you will see
yourself, click the Edit icon suggestions for things to
(the pencil) next to your add. Click these to add them,
name. Click “Add a place” along with a check box. If you
to search for, and then want to add custom items
add, important locations to the list, just type what you
to Cortana. These could be want in the text field at the
your home address, your top and click the + button.
work address, or the location Click the Menu button at the
of your favourite cafe. top of the list to delete all
items from it.

www.bdmpublications.com 49
Windows 10 Essentials

5 Back in the Organiser 6 Once reminders are


panel, click the set in Cortana, they
Reminders option to view and will appear as a pop up and,
add reminders. With the at the allotted time, as an
reminders panel open, click Action Center alert. You can
the + button at the bottom to then snooze, or set the
begin a new reminder. Type a reminder as complete, just
name for the reminder, and as you can for any alert that
then use the buttons below appears in the Action Center.
the name to set a time, place A list of previous reminders
or person, or to add a photo. remains in the Cortana
Reminders panel.

Cortana Skills
Cortana Skills are the various things you can allow Cortana to do, such as connecting it to a Gmail account or allowing it
access to your music library.

Manage Skills Calendars & Reminders

You can manage your Skills You can choose whether


by opening the Cortana Cortana can access and
panel and clicking on the display your upcoming
Notebook. Select the meetings, your upcoming
“Manage Skills” tab, and then reminders, and your calendar
scroll down to see the skill timeline. You can switch each
category you want to of these options on and off
manage. The exact skills independently. For this to
you’ll see here will vary, work, you will need to be
depending on the apps and using the Windows 10
features you have in Calendar app, not a
Windows 10. third-party app.

Connected Services Commute & Traffic

This skill allows you to This skill can be set to work


connect app services like with driving times, or public
Gmail, or Wunderlist, to transport times, and will
Cortana. Select the option alert you to traffic
you want to connect, then congestion and delays on
click the Connect button. your way to or from work (or
Normally, you will then need to and from any other of
to sign in to the account “your places”), and can even
associated with that app or tell you when you need to
service (your Gmail account leave in order to arrive at a
login, for example). meeting, or appointment,
on time.

50 www.bdmpublications.com
Doing More with Cortana

Cortana Tips and Tricks


As well as helping you search, both on and off your computer, and letting you create lists and reminders, Cortana has some
other clever tricks up its electronic sleeve.

Notification Mirroring Forward app notifications Sticky Note Reminders Cortana can be instructed
from your phone to your PC. to create a reminder from a
Download and sign in to Cortana on your Android phone. Sticky Note message. Open Sticky Notes and type, or use the
Then go to Cortana settings on your PC, and switch on Send Pen, to write down a reminder like “Call Mum at 4 PM.” Select
notifications and information between devices. Messages and the text that’s in a different colour, then select Add Reminder.
alerts you receive on your phone, will now be mirrored on your PC. Select Remind and Cortana will remind you later.

Cortana and Alexa Locked Device You can use Cortana to search for
something, or do something, even when
Connect Cortana and your device is locked. You need to turn on Use Cortana even
Alexa. Enable the Alexa skill when my device is locked in Cortana’s settings. When your PC
and link it to your Cortana is locked, say “Hey Cortana” and ask her something to see this
account. Then, just say in action.
“Cortana, open Alexa”
on your Windows device
and talk to Alexa as you
normally would. Alexa and
Cortana are always getting
smarter, so new features like
music and audible will be
available soon.

Change Your Name Track Packages

You can change what You can have Cortana


Cortana calls you. Select the track your packages. Open
Search box on the taskbar Cortana and select the
to open Cortana. Select the Notebook icon and then
Notebook and then select Skills. Connect Cortana to
your hyperlinked email Outlook (or other email
address. Select Change my provider) and then go to
name, enter the name you Permissions in the Cortana
want Cortana to call you, Settings and switch on
and then select Enter. Communications history.
This allows Cortana
to recognise package
confirmation emails from
most major carriers.

www.bdmpublications.com 51
Windows 10 Essentials

Connect Your
Phone to Your PC
You can connect an iOS or Android phone to both your Microsoft account and Windows 10, allowing you
to view the photos on your phone from the comfort of your desktop and even view call and SMS details
on your computer as they arrive on your phone.

Set Up the Your Phone App


We have used a Galaxy S10 here, but the setup steps for connecting a mobile device to Windows 10 are almost exactly the
same for both iOS and Android devices.

1 Open the Settings and look for the “Phone” option. Click 3 Make sure you use the correct country code (e.g. +44
the link and then click the “Add a phone” button on the if in the UK) and then click the “Send” button. Within
next screen. The Your Phone app then opens in a new window. a few seconds, you should receive an SMS message on your
You can also get to the app directly from the link at the bottom phone from Microsoft. Click on the link in the message and, if
of the apps list in the Start menu. asked, allow the Companion app to take photos.

2 In the right-hand sidebar, click on the type of phone 4 Meanwhile, on your computer screen you should see a
you have (Android or iPhone) and then click “Continue”; new window open, showing a QR code. Scan this using
another window opens, showing your Microsoft account. To link the Companion app now open on your phone. Again, you may
your phone to your PC, you need to enter your phone number be asked to allow certain app permissions on your phone. If you
here (if not already in your account). decline, you can’t connect your devices.

52 www.bdmpublications.com
Connect Your Phone to Your PC

5 If all is successful, you should now see your phone 8 If you want to be able to see notifications from your
displayed in the Your Phone app on your computer. phone on your PC screen, you need to click on
There is a new screen displayed on your phone, this shows the Notifications and then click “Get Started”. Again, you need
settings for the Microsoft companion app, alongside to which to allow this on your phone settings, which are opened by
Windows 10 computer it is connected. clicking the button on the screen in the Your Phone app.

6 Now it’s time to start using the Your Mobile app. In the 9 To view photos stored on your phone from the comfort of
left-hand sidebar are several different sections. These your PC, click the Photos section. Allow access as before,
include Photos, Messages, Notifications and Phone Screen. and then wait while the view refreshes. The most recent 25
Each part of the app needs to be enabled to begin using it, so images captured on your phone are displayed. You can open
you don’t have to allow full access if you don’t want to. them in the Photos app by clicking on them.

7 10 The Phone Screen option allows you to mirror your


phone screen on your PC, displaying everything that
Click on Messages is happening on your mobile device in the live feed of the Your
first, and then click phone app. To fine-tune any settings, click the Settings button
the “See texts” at the bottom of the sidebar in the Your Phone app.
button. When asked,
send the notification
to your phone to ask
permission to access
messages (if already
given, this opens the
messages list). Your
phone messages are
now displayed, and
you can click on any
to read and reply.

www.bdmpublications.com 53
Windows 10 Essentials

Connecting Your
PC to the Internet
Setting up your Internet connection is an important step in Windows 10. Joining and managing
networks is easier than ever. One of the new features is Wi-Fi Sense that enables you to securely share
network connection details with your contacts.

Manage Your Network Settings


We’ll show you how to master your Wi-Fi settings and explain what you need to do if you have a problem connecting to the
Internet in Windows 10.

Your Settings Network and Internet is one of the key VPN Settings If you need to log in to a corporate
sections within the new Windows 10 network, this is where you need to enter
Settings app. It features a plethora of settings for the different the appropriate settings. It’s fairly easy to do but you’ll need the
ways to connect to the Internet. While the Wi-Fi screen is configuration details from your IT helpdesk (they will have to
fairly straightforward, there are different settings windows for enable you to have VPN access) plus your username and password.
Ethernet connections and even dial-up.

Wi-Fi Sense We don’t mind ourselves but some Proxy Settings If you use a proxy server, this is where
people are worried about the security you enter any specific settings to do with
implications of sharing network settings; or simply don’t want that. However, Windows 10 should automatically detect proxy
to automatically connect to networks shared by others. You can settings. Note that the settings you configure here won’t apply
disable it by visiting the right settings; just click Manage Wi-Fi if you connect via a VPN, because a VPN is essentially a tunnel
Settings from the Wi-Fi window. You can also manage your directly into the corporate network you’re connecting to.
known networks here.

54 www.bdmpublications.com
Connecting Your PC to the Internet

Your Usage In a move designed to keep up with more Troubleshoot From the Network and Sharing Center you
mobile-based computing devices like the can also click the Troubleshoot Problems
iPad, Windows 10 now includes a data usage page in Settings button if you’re having issues with connectivity and networking.
too. Here it splits your data between wired and wireless. We’d Another way to troubleshoot problems with a Wi-Fi connection
like to see more advanced settings than this too, so you could is to right-click the Wi-Fi icon in your Notifications area near the
see how much data you used on a public wireless hotspot, clock. Select Troubleshoot Problems from the menu that appears.
for example.

Control Panel Here we’ve left the Settings app and Disable Adapters Another thing you can do is
we’re now in the Network and Sharing to disable and re-enable your
Center within Control Panel. The easiest way to get to this is network adapter (like the Wi-Fi card in your laptop). View your
to search for it or go to the Control Panel by right-clicking the network connections by clicking Change Adapter Settings in
Start button and selecting it from the menu. You can also get the Network and Sharing Center and then right-clicking the
to it by right-clicking any network icon in the notifications area network connection in question in the view above. Disable it
near the clock. and then re-enable.

Sharing Settings From the previous window, select Firewall Another thing to bear in mind is the Windows
Change Advanced Sharing Settings Firewall. Normally you won’t have any dealings
from the left-hand sidebar. You’ll be taken to this screen where with this whatsoever but if you’re having problems accessing
you can turn on network discovery; this governs whether your the Internet with a particular app, ensure it is listed here. Go to
computer can see others on your network and whether you are Control Panel > Update and Security > Windows Firewall and
visible to them. You can also turn file and printer sharing on or off. then select Allow an App or Feature through Windows Firewall.

www.bdmpublications.com 55
Index

Windows 10 Apps
and Software Guides
Get the most from the powerful Windows 10 apps and features available
to you! Save time, and a great deal of frustration, by knowing precisely
what you can do with the pre-installed or free apps that can be found on
the app store and elsewhere. Learn how to keep Windows 10 up to date,
and how to manage the software you have on your PC.

64 80 106
Exploring the Using the Windows 10 Power
Maps App Skype App User Tips
Discover all of the really useful tools Learn how to use Skype to keep Dig a little deeper and explore
available in the refreshed Microsoft in touch with friends and family, the more powerful ways
Maps app. without running up huge phone bills. Windows 10 can be used.

56 www.bdmpublications.com
Windows 10 Apps and Software Guides

58 Explore the Windows Store 86 Listening to Music with the Spotify App
60 Find Apps and Windows Downloads 88 Move or Install Apps to a Different Drive
62 Ten Essential Windows 10 Apps 90 Changing File Associations and Protocols
64 Explore the Powerful Maps App 92 OneDrive Files On-Demand
66 Navigating with the Maps App 94 Installing a Printer in Windows 10
68 Importing Photos in Windows 10 96 Setting Up Dual Monitors
70 Working with Photos and Images 98 Windows 10 Update Cache
74 Using the Cloud Clipboard 99 Installing New Fonts
76 Screenshots with Snip & Sketch 100 How to Update Windows 10
78 Manage Libraries in Windows 10 102 What to Keep Updated in Windows 10
79 How to Use AutoPlay 104 Sharing to Nearby Devices
80 Exploring Skype in Windows 10 105 Using theFocus Assist Tool
82 The New Windows 10 Game Bar 106 Windows 10 Power User Tips
84 Explore the Windows 10 Calendar App 113 Extra Power User

www.bdmpublications.com 57
Windows 10 Apps and Software Guides

Find Apps and


Windows Downloads
There was a Windows Store inside Windows 8 but Microsoft has a new version inside Windows 10.
That’s because, like the new so-called ‘Universal’ apps, the Store will work across all Microsoft devices
including Windows Phones and the Xbox One.

Take a Look Around


The great thing about the new Windows Store is that the quality of the apps has improved, so it’s actually worth browsing. But
aside from better apps, the whole experience of looking for new software has been improved in Windows 10.

1 As well as being more responsive to use, the Windows 3 Each section also features charts of the most downloaded
Store has improved vastly in terms of content – as well as apps as well as curated app recommendations. Here the
apps and games there are now movies to buy or rent and music selection is reasonably uninspiring but presumably this would
to download. You can switch between the major sections using improve as you downloaded more apps. You can also easily flick
the buttons at the top of the window. through the top free and paid apps.

2 Clicking on one of these main sections – here we’ve 4 As in many Windows 10 apps, there’s a search box in the
clicked on Apps – takes you to a Browse screen where top right. The search will pick up results from across the
you’re presented with the latest apps as well as those that are Store, whatever you search for. Here we’ve found a film we’d like
growing in popularity at the moment. You can also refine your to see. This page is roughly the same whether you’re looking at
search using the categories on the left – say you just wanted to a game, movie or app.
see Education apps, for example.

60 www.bdmpublications.com
Find Apps and Windows Downloads

5 Here’s what it looks like if you go to an album page in the 8 You don’t have to pay for most apps on the Windows
Music section. Like the movie page in the previous step, Store. There are stacks of apps you can get hold of for
there’s a Buy link but no button to rent as there is with movie free. Each app has a helpful star rating and user reviews, so you
downloads. With movies you can also choose to watch the can always see which apps aren’t ones that are recommended
trailer, while you can preview a snippet of music. by others.

6 You’re also able to buy single tracks, too – here they’re 9 When you download an app or other content, it will be
99p. At every stage the Windows Store will select other added to your download queue. Apps will download and
appropriate content for you to look at (often from the back then install relatively quickly but other content – especially HD
catalogue or related artists), while you can also click any artist movies – could take longer. You can also click the blue Check
or album name to go to the relevant page. for Updates button to check for app updates, though these will
install automatically.

7 Should you wish to, you’re also able to join Microsoft’s 10 Paid-for apps use your credit or debit card. This is all
subscription music service Groove Music Pass. We’ve talked connected to your Microsoft account and you can
more about the service in our Groove Music app tutorial, but view your current account and billing information at account.
essentially it gives you unlimited access to the Windows Store microsoft.com. You can have multiple payment options should
music catalogue and you can listen on basically any device, you choose to. At the Microsoft account site you’re also able
including Android and iPhone. There’s a 30-day trial but the to view what Microsoft services (like Groove Music Pass) you’re
service usually costs £9/$12.60/€10.25 per month. currently signed up to.

www.bdmpublications.com 61
Windows 10 Apps and Software Guides

Ten Essential
Windows 10 Apps
The Windows Store is crammed full of useful apps for your computer, from well-known names like
Spotify to little-known but useful apps like Pin More. Here, we will take a look at some of the best, most
useful, or just unique apps available to download right now.

Netflix Netflix is the world’s leading subscription service File Viewer Plus Are you tired of cluttering your PC with
for watching TV episodes and movies. Netflix dozens of apps? The free version of File
membership gives you access to unlimited TV programmes and Viewer Plus allows you to open over 150 different file types with
films for one low monthly price. - With the Netflix app, you can one, simple app. Open documents, spreadsheets, presentations,
instantly watch as many TV episodes and films as you want, as images, audio files, video files, archives, and much more. Save
often as you want, any time you want. both time and money with File Viewer Plus.

Pinterest Looking for creative ideas? Whether you’re One Calendar The most popular all-in-one app for
planning your next big travel adventure, viewing all your calendars including
searching for home design concepts, or looking for fashion & Google, Live, Outlook, iCloud, Exchange, Office365 and
fitness tips; check out new recipes, or explore lifestyle inspiration, Facebook. It integrates all your calendars into an easy-to-read
on Pinterest. Discover billions of possibilities for every part of overview. View and manage all your appointments, events and
your life, from new recipes to creative home design ideas. birthdays. Easily filter the appointments you would like to see.

62 www.bdmpublications.com
Ten Essential Windows 10 Apps

TuneIn Radio TuneIn brings you sports, music, news, PDF Reader - View, Edit, Share PDF Reader by Kdan
podcasts, and radio live from around the Mobile, a PDF expert
world. Listen to the audio you love and let the moments move for Windows platform, not only enables you to read, annotate,
you. Listen to commercial-free music curated by leading-edge and share Adobe Acrobat PDF documents on your computers
DJs, live mixes and special guests, coverage from the news and smartphones, it also provides a brand new free-hand
sources you trust like CNN, BBC, NPR, Fox, MSNBC & more. drawing and writing experience! Enterprise solution is also
available. For more details, check our website.

Audiobooks from Audible Not enough time for all Dropbox Dropbox brings your cloud content and
the books you want to traditional files together with the tools you
enjoy? Download the app by Audible, an Amazon company, love—so you can be organized, stay focused and get in
and access 200,000+ titles including bestsellers, classics and sync with your team. With all your files organized in one central
everything in between. Immerse yourself in a great story place, you can safely sync them across all your
anytime, anywhere, by downloading a great story today. devices and access them anytime, anywhere. Free or paid
accounts available.

Adobe Photoshop Express Snap. Edit. Share. EasyMail for Gmail Easily access your Google
Smile. The free Adobe emails, notes and calendar in
Photoshop Express app provides photo magic at your fingertips. a standalone app. EasyMail allows you to switch between
Join millions of creative folks who trust and use Adobe different accounts with just one click. Benefit from the seamless
Photoshop Express for fast, powerful, and easy editing. It’s the integration into your operating system and receive native mail
one-stop-shop for your quick and fabulous photo editing needs. notifications. With EasyMail, you always stay up to date without
needing to keep your web browser open.

www.bdmpublications.com 63
Windows 10 Apps and Software Guides

Navigating with
the Maps App
Boasting excellent mapping, great aerial photography, up-to-the-minute traffic and the ability to
calculate directions by public transport, road or foot, the Maps app is one of the very best ways to
navigate. New additions make the Maps app even more useful.

Moving Around in Maps


There are few controls in the Maps app but they allow you to do a lot of things very easily. Let’s take a look at how you move
around in the app.

1 The easiest way to move the map around is to left-click 3 Clicking on things like Saved Places or 3D Cities in the top
and drag it and use the mouse wheel or trackpad slider control bar, tabs will line up alongside the permanent
to zoom in and out. This allows you to move the map around Search and Directions buttons at the top left of the window.
to focus on the area you need. If you are zoomed far out of the You can then click on them at any time to see the information
map, double-clicking the mouse zooms in quickly. contained in each pane or tab.

2 Maps has a dedicated control panel on the side of the 4 Right-clicking on the map brings up a small action
window containing, from top to bottom: Rotate, hold menu. This lets you set a To location, a From location
pointer on it to see; Tilt, hold pointer over to see options; Show (for planning a route), add a new destination and drop a pin in
Location; Map Views/Layer; and Zoom in and Zoom out. You a specific location. When you drop a pin, a new window opens
can also tilt by holding the right Mouse button and moving up allowing you to search for things at that location, add favourites
and down. and more.

66 www.bdmpublications.com
Navigating with the Maps App

Planning a Route
Maps is great for checking out an area, looking around a city or just finding businesses local to you. It is also great for planning
detailed routes.

1 To start planning a route, click the Directions tab at the 4 The route is now shown on the map, with an estimated
top left of the Maps window. A small panel opens with travel time readout above the destination. If alternative
boxes for your starting and ending location. You can either type routes are available, they are shown as a light blue line, with the
a destination or you can choose one from the list that appears main route shown as a dark blue line. Points along the route are
below the box when you click on it. marked, usually where a change of direction is needed.

2 If you need to make detours or multiple stops along 5 If you click Go in the directions pane, Maps switches to a
your route, you can click the + button to add more satnav-style view and traces your route as you continue
destination boxes. Each one can have a destination in it, making along it. This is more for portable devices such as phones and
up your complete route. When you view directions, each of the tablets that you could use for directions in a vehicle. Click the
destinations you added is marked with a relevant letter. Back button to return to the normal maps view.

3 Routes vary depending on whether you are driving, 6 You can also plan a route by drawing it. Click the Ink
walking or need to take public transport. You can button and then the Directions tool in the menu that
quickly flick between these options using the buttons at the opens. Draw a line along the route you wish to take and Maps
top of the directions pane. When you have your start and end refines that into a proper route along roads, missing dead-ends,
points entered and travel method chosen, click Get Directions. etc. You can save or share the route just as with any other.

www.bdmpublications.com 67
Windows 10 Apps and Software Guides

Importing Photos
in Windows 10
Importing photos from a digital camera or phone on to your PC may seem like a simple task to some
but if you have never done it before you can encounter problems and have no idea how to fix them.
Let’s take a look at importing photos from phone, tablet or camera.

Importing to a Folder
Importing your photos or images directly to a folder on the desktop, or elsewhere, is the traditional method. It tends to be
quicker but offers fewer importing options.

1 The first thing you need to do to import photos directly 3 Normally, when you first plug a device in to your
from a phone or camera is to connect the relevant cable computer which contains storage of some sort, Windows
to your PC. In almost all cases, this will be a USB cable of some will ask how you want to handle the files in that storage. Scroll
sort. You will have been supplied a transfer cable with the down the list to see ‘Open in a Folder’. In some cases, Explorer
device you are using. Plug this into a free USB port. will open showing the connected device.

2 Plug the other end in to your phone or digital camera and 4 Now click on the device storage: this may be Phone and
wait a few moments. Your PC should detect the device Card on a smartphone and navigate to where the photos
and may need to install some drivers to make the USB are stored. This will normally be in a folder called DCIM on your
connection work. phone or camera. You can now simply cut and paste or drag
and drop images to a new folder on your PC.

68 www.bdmpublications.com
Importing Photos in Windows 10

Importing to the Photos App


The Windows 10 Photos app is a great tool for importing photos from a phone, tablet or camera. It allows you to preview and
individually pick images more easily, and even sorts them.

1 Open the Photos app on your Windows 10 PC. Now 4 By default, every image detected on your device will be
connect your phone or camera to your computer using selected for importing. If you want to import everything,
the relevant USB cable. If you see the pop-up menu asking how click Continue. If not, you can use the check boxes on the
you want to deal with the storage media you just connected, images to select those you want to import; use the Clear All and
ignore it or click it closed. Select All buttons as required.

2 The Photos app should have opened up with the 5 You can now choose where the imported photos will be
Collections screen showing. If not, click the tab at the top saved. By default, this will probably be somewhere like
to open it now. Along the top of the Collections tab are your C:\Users\YourName\Pictures. Click the ‘Change where they’re
controls: Refresh, Select, Slideshow and Import. Import is the imported’ link to do just that. You can also choose to import
only one you need to click at this point. into folders arranged by month or day.

3 The Photos app will now search for photos available to be 6 Click Import. Your image will now begin to appear in the
imported. If your device is not connected properly, or the Photos app window, within the Collections section. An
correct USB drivers are not installed, it will fail to find anything at album will also be created called Last Import. Click on one of
this point. If you are transferring from a phone or tablet, you may the images shown to begin editing or enhancing it with the tools
also have to unlock the screen to continue. Photos offers.

www.bdmpublications.com 69
Windows 10 Apps and Software Guides

Working with
Photos and Images
The Photos app was first introduced in Windows 8 but it wasn’t the best experience when compared to
most third party apps. In Windows 10 it has been improved, with better ways to browse photos and a lot
more editing options to make the most of your images.

Managing Your Images


The Photos app has seen some useful improvements over the last few years and is actually very powerful now. It doesn’t offer
the flexibility of an app like Photoshop Elements, but it does a lot of simple edits very well.

1 Photos shows all of your images in a scrolling timeline 3 If you’re signed into Windows 10 with your Microsoft
of images, like we’re now used to seeing on many account, you’ll also be signed in automatically to the
smartphones or tablets. This is called your photos Collection. You Photos app. The benefit of this is that photos stored on
can click on any image to get a full-window view and then click OneDrive also appear in Photos. You can auto-upload photos
the Back arrow in the top left corner to return to the main list. from the OneDrive app for your phone as you take them.

2 Albums is a completely automated feature. If you have an 4 Photos settings,


iPhone or iPad, you may have seen Apple’s Moments click the More
feature; this works in much the same way. Albums gathers button at the top right, lets
together groups of photos you took around the same time, so you choose whether the
you can easily look back through them later. Photos app automatically
enhances badly exposed
photos as well as whether
you want the app to show
duplicate images as one
file; say you saved a photo
twice or imported it twice
without realising.

70 www.bdmpublications.com
Working with Photos and Images

5 You can also choose where Photos should look for 8 You can also copy your photos and images into another
images here. Your own Pictures folder, plus Windows’ app or File Explorer window. To do this, select the photos
public Photos folder are automatically included; but it’s really you want, then click the Copy button in the toolbar (the old
useful to be able to change this if you store your images Ctrl-C keyboard shortcut works too). You can then paste the
somewhere else, perhaps an external hard drive you always use. photos wherever you want on your computer.

6 Back to the Photos Collection. You’re now going to use 9 To delete photos, select them as detailed previously and
the Select feature, found in the menu at the top right. click the Delete button in the Toolbar. You will see a
This enables you to select individual or multiple images. You’ll pop-up to confirm you want to continue with the action.
see the top menu bar has now changed, while each image has Deleted photos are moved to the recycle bin anyway, so you
a tick box appear on it. Click it to choose the images you want. have a chance to retrieve photos deleted in error.

7 The Photos app allows you to do several things with 10 The final tool in the Select toolbar is the Add to Album
your photos and images. The first is to email them. button. This adds any images you have selected to
Select the images you want to send and click the Share button either one of the auto-created albums, or to an album you
in the toolbar. The share options window will open, allowing create for the purpose. Click ‘Create new album’ in the popup
you to choose how to share the images, including Mail. window, give it a name and then click ‘Create album’.

www.bdmpublications.com 71
Windows 10 Apps and Software Guides

Drawing on Images
The Photos app in Windows 10 allows you to draw or write on top of your images, as long as you have installed the
Anniversary update, and then save them as a completely new file.

1 Open the Photos app and select your image (or double 3 The contextual menus allow you to change the colour and
click an image to open it in Photos if that is the default the thickness of the pen or pencil tools. When you have
app). Along the top of the image are several buttons, click the picked a style, colour and size, you can begin to draw or write
Draw button to begin editing your image. You will see a new set over the top of your image. The drawing tool in Photos works
of buttons and controls appear at the top. best with a touchscreen PC, of course.

From left to right, these buttons allow you to draw/write in Once you have completed drawing or writing on your
2 4
pen style, pencil style, calligraphy style, erase, switch out of image, you can save it. If you want to retain the original
touch writing mode, save your file, share your file, and exit image, change the name of the edited image in the save
drawing mode. If you click on any button and see a small arrow, dialogue box before you finish. If you click on Share, a list of
click again to open a contextual menu for it. sharing possibilities will appear to choose from.

Editing Images
The image editing tools in the Photos app have been improved and added to in the Anniversary update, including the
addition of preset filters and effects.

1 Open your image in Photos and click on the Edit button 2 Starting at the top of the editing toolbar, you have the
at the top right of the screen. If you had the Photos app Crop and Rotate button. Click this to see further options
running in full screen, the image will be shrunk down slightly to for managing the aspect of your image. You can choose a preset
fit the new toolbar, down the right of the of the editing window. aspect ratio, or drag the handles at the corners to crop to a
custom shape.

72 www.bdmpublications.com
Working with Photos and Images

3 If you need to straighten the image, you can do so using 6 The tools in the Adjust tab allow you to tweak the Light,
the handle to the right of the photo. Click on this and Colour, Warmth and Clarity of an image. You can also use
move your mouse up or down to carefully rotate the image in a slider to apply a Vignette (lighten or darken the edges of an
small amounts. As you do this, a grid appears to help you line up image). Just use the sliders to adjust any of these effects until
the photo. Click Finished when done. you are happy with your image.

4 Moving down the main edit toolbar you will see the 7 At the bottom of the Adjust tab are Spot Fix and Red Eye
Enhance button. You can click this to let the software tools. Click Spot Fix and the cursor will change to a blue
make changes and improvements to the image automatically. circle. Place this over the part of the image you want to fix and
You will see the image change slightly, and you can then use the click. The software will try to match the location of the spot to
slider on the button to increase or decrease those changes. the scenery or colour around it, hopefully removing it.

5 You can, of course, apply enhancements yourself. Below 8 The Red Eye tool works in a similar way. Click the tool
the Auto-enhance button are the photo filters. Click on and move the circle cursor over the red part of your
any of these to see the changes applied to your image. You can subject’s eye and zoom in if you need to. The tool will try to
apply a filter and then adjust its effects by clicking on the Adjust take the red out of the image and match it to the surrounding
tab at the top of the toolbar. colour. The results are usually very good.

www.bdmpublications.com 73
Windows 10 Apps and Software Guides

Using the
Cloud Clipboard
Copying and pasting is something we all do. However, what do you do if you need to copy the same few
things again and again and how do you copy content across your devices? The new Cloud Clipboard
solves both of those problems in a single, simple interface.

A New Way to Copy + Paste


The Cloud Clipboard gives you a new way to cut and paste. Simply press the Windows key + V at any time and you’ll see the
Cloud Clipboard panel appear in the bottom corner of the screen.

1 Before you can use all the features of the Cloud Clipboard in 3 With the Cloud Clipboard settings configured to how you
Windows 10, you will need to enable them in the settings. want, you can start using the feature. Just like the old
Go to Settings > System and look for the Clipboard section. You can clipboard, things are added to it when you copy something. This
turn on the clipboard history using the slider toggle. To sync across can either be by pressing Ctrl + C with some text highlighted or
devices, click ‘Get started’. right-clicking on an image or file and selecting Copy.

2 Follow the instructions to confirm your Microsoft account 4 The difference now is each thing you copy is stored in the
(if this is requested) and then choose whether you want to clipboard, rather than being overwritten by the next thing
enable automatic syncing across devices or not. If you want to be you copy. To see the things stored in the Cloud Clipboard, press
able to sync the clipboard to your phone, you will also need to Windows Key + V. In the new Cloud Clipboard window, you will
download and install an app on that device. see a list of the things you have copied.

74 www.bdmpublications.com
Using the Cloud Clipboard

5 The things you have copied can be made ready to paste 8 Pinned items even remain in the Cloud Clipboard when
by selecting them in the Cloud Clipboard. You can then you restart your computer. The only way to remove them
use Ctrl + V to paste or right-click and select Paste from the now is to unpin them from the clipboard. To do this, highlight
menu. When you select something in the Cloud Clipboard, it the item again and click the pinned icon. Copying something
remains there to be pasted again. that is already saved in the clipboard doesn’t overwrite it.

6 You can clear the items from the clipboard easily, either 9 Syncing clipboard data between devices works using the
by opening settings > System > Clipboard and clicking on same Microsoft Graph technology that powers the
‘Clear clipboard data’ or by opening the clipboard window and Timeline, introduced in Windows 10’s April 2018 Update. You
clicking the ‘Clear all’ button. Once the clipboard is cleared, you need to be signed into both devices with the same Microsoft
cannot recover the copied data. account for this feature to work.

7 If there is copied data in the Cloud Clipboard that you 10 If you select ‘Never automatically sync text that I copy’,
think you will always need to keep, you can pin it. you’ll have to manually choose what you want to copy.
Pinned items in the clipboard do not get cleared when using To do so, open your Clipboard history with Windows+V, hover
the methods described in the previous step. To pin something, over an item in your Clipboard history and click the cloud-shaped
move your mouse over the item and then click the pin icon Sync to Other Devices icon.
that appears.

www.bdmpublications.com 75
Windows 10 Apps and Software Guides

Screenshots with
Snip & Sketch
The new Snip & Sketch tool, which will eventually completely replace the old Windows snipping tool,
includes a few extra features that help you to easily capture and annotate screenshots on your
computer, and then save them or share them with others.

Taking Screenshots with Snip & Sketch


There are many reasons why you might need to capture an image of your screen, but whatever the reason, the new snipping
tool allows you to do exactly that, and much more.

1 There are a couple of different ways to open the Snip & 3 Click the New button to begin snipping. The screen will
Sketch tool but there’s no dedicated keyboard shortcut at darken and you will see a small toolbar appear at the top.
this time. You can open the app by clicking on it in the Start From left to right, the tools here are Rectangular clip, Freeform
menu apps list, by searching for it in the search box or by clicking clip and Fullscreen clip. Let’s start with the most useful of the
the Screen snip button in the Quick Actions panel. three, the Rectangular clip tool.

2 If you open the tool using either of the first two methods, it 4 Move the + cursor to the corner of the area you want to
will open as a blank window with a variety of buttons along capture and click and hold the left Mouse or Trackpad
the top for editing or writing on captured images. The New button button. Drag the cursor down and you will see the capture area
takes you to snipping mode. If you open the tool using Quick highlighted. When you have the correct area of the screen
actions, it goes straight to the snipping mode. highlighted, release the Mouse button to snip.

76 www.bdmpublications.com
Screenshots with Snip & Sketch

5 The captured image will now appear in the previously 7 In the top middle of the Snip & Sketch window, is a set
blank Snip & Sketch window. If the image is all you need, of editing tools that you can use to alter the captured
you can simply click the Save button in the top right and choose image. These give you the ability to write or draw on the
where you want to store the image. You can also make a copy of screenshot, adding annotations or highlighting areas. You can
the image here, as well as share the image via email. also crop the image down to size.

6 To capture a freeform screenshot, open the snipping 8 Click on any of the pen or pencil tools to select them and
mode again and click the second of the tools at the top. then click again to open an additional tools menu. This
You can now use the mouse to draw around the area you want menu will let you change the colour of the pen or pencil, as well
to capture, cutting out any shape you want. When complete, the as change the thickness of the line that is drawn, using the slider
freeform screenshot will open in the window as before. at the bottom of the menu panel.

Open the Snipping Mode with PrtScn


Although there is no dedicated keyboard shortcut using the Windows key, you can set the PrtScn button to open the snipping
tool when pressed.

1 Until Microsoft decides to give it a dedicated keyboard 2 Scroll down to the ‘Print Screen shortcut’ heading and
shortcut, you will need to take advantage of the Ease of use the slider to turn the shortcut on. You may need to
Access options to create a quicker way to open the snipping tool. restart your computer before the shortcut will work. You can
Head into Settings > Ease of Access > Interaction section and look now press the PrtScn button (usually in the top right of your
for the Keyboard options. keyboard) at any time to open snipping mode.

www.bdmpublications.com 77
Windows 10 Apps and Software Guides

Manage Libraries
in Windows 10
Libraries in Windows are used as a central place for bringing together related files. They differ from file
folders in that they contain links to a collection of folders, locally or across a shared network, rather
than the actual files. The default libraries are Documents, Music, Pictures and Videos.

Find and Manage Libraries


Libraries are very useful tools for finding and organising files, even if they have been slightly sidelined in Windows 10. Let’s
take a look at using your libraries effectively.

Displaying the Libraries By default, Windows 10 Change Default Save Location Each library has a
doesn’t show the libraries in default save location.
the sidebar of the File Explorer (or any other folder) as it used to Whenever you choose to save or copy a file to a library, it will be
in older versions. To reveal the library folders, open File Explorer saved to that location. You can change the default save location
and click the View tab and then Navigation Panel. You can then of any library. Right-click on the library in file explorer, choose
choose to show libraries. Properties and either select or add a location using the top window.

Reordering Files in Libraries Adding a folder in a Library Attributes If required, the following library
library doesn’t actually attributes can be modified within
change the storage location of the files or folders within it. The Windows Explorer, the Library Management dialog or the
library simply gives you a quick way to reach those files. To Library Description file (*.library-ms): Name, Library Locations,
reorder folders, select a library and then right-click on it. Select Locations Order and Default Save Location. You can also
Properties and then reorder the folders shown by drag and drop. optimise libraries for particular file types such as music.

78 www.bdmpublications.com
Manage Libraries in Windows 10/How to Use AutoPlay

How to Use
AutoPlay
AutoPlay is the function in Windows that determines what automatically happens when you plug in a USB
drive or click on an email link, i.e. should a file format automatically play in an associated app. It’s an
important thing to know how to set up correctly but it’s not something that you can find easily.

Set Up AutoPlay
You can configure the programs you want to have priority using the AutoPlay options in both the Settings app and Control
Panel. Here’s how to set up and use the AutoPlay feature in the Windows 10 operating system.

1 In Settings click on Devices, then select AutoPlay from the 3 In Control Panel you’ll see all the options you could see in
bottom of the list. You can then choose the options you want the Settings app plus a whole lot more. There are options
for a variety of common options. Here we’ve got the cloud app for all kinds of things and notably what you want your computer
Dropbox highlighted if we insert a memory card into our laptop. Our to do if you insert a DVD (if you have a DVD drive). Do you want it
photos are automatically uploaded to our cloud storage. to play the disc in Movies & TV or in another app you choose?

2 However, the AutoPlay options within the Settings app 4 There’s an option for memory card, too. It’s a more
aren’t exactly comprehensive, since they only deal with complex version of the one in the Settings app; you can
the most common AutoPlay options. For a more detailed also filter removable drives by type of media – so you can specify
configuration selection, you need to go to Control Panel > a default for pictures, another for videos and so on. Just click the
Hardware and Sound and then click on AutoPlay. relevant box and the options will no longer be greyed out.

www.bdmpublications.com 79
Windows 10 Apps and Software Guides

The New Windows 10


Game Bar
Windows 10 hasn’t seen many new features recently but one area that did have a update was the Game
Bar tool. Even if you have never played a single game on your Windows PC, the Game Bar can still be
useful, and can be accessed by a quick shortcut and customised to your needs.

Using the Game Bar


No longer solely about gaming tools, the Windows 10 Game Bar now includes handy quick panels for volume control, resource
usage, playing music and a lot more

Open the Game Bar You open the Game Bar in the Broadcast & Capture These are the controls that were
same way as previously, by previously in the Game Bar,
pressing Windows Key + G, or by opening the Start menu and allowing you to take screen captures, record on-screen action,
scrolling down to the bottom where you will see “Xbox Game control an in-game microphone, and broadcast your game to
Bar”. The new Game Bar will open, dimming the screen slightly Mixer, Microsoft’s gaming broadcast service (similar to Twitch).
and displaying a number of overlays. You can also view previous captures.

Adding Overlays By default, four or five overlays and Audio Controls As in many Windows 10 apps, there’s a
controls will be active. You can choose search box in the top right. The search
to show several more by clicking the Menu button, on the thin will pick up results from across the Store, whatever you search
panel with the time displayed in the middle of the screen at the for. Here we’ve found a film we’d like to see. This page is roughly
top, adding the Overlay buttons to this panel, and then clicking the same whether you’re looking at a game, movie or app.
on each to open the overlay.

82 www.bdmpublications.com
The New Windows 10 Game Bar

Performance Display The performance overlay shows Manage Overlays You can rearrange the position of
you a real-time snapshot of all of the overlay panels by clicking
how much strain is being put on the processor (CPU), graphic on their top bars and dragging them into the desired position.
card/chip (GPU) and the internal memory (RAM). It allows you Several of the panels can be pinned, meaning that they will
to monitor how much power a game is using, but also works for remain visible on screen even after the Game Bar is hidden. Just
any action you are performing (watching videos, etc.). click the Pin icon in the top bar.

Spotify Music The Game Bar now features Spotify Game Bar Settings You can access the settings for the
integration. You can sign into your Spotify Game Bar via the Main settings
account and use the Spotify widget to play music and control app in Windows 10, or you can click the Gear icon in the top
playback. This is more convenient than Alt+Tabbing out of middle panel of the Game Bar itself. This top middle panel also
full-screen games to manage the background music. gives you access to the folder containing any previous captures
you have taken of the screen.

Xbox Panels There are also two (currently in Beta testing) Close Game Bar You can close the Game Bar overlay
panels for chatting to others using the Xbox screen by clicking anywhere else on
network, and finding groups of like-minded gamers. To use these the screen, or by pressing Windows Key + G again. If you want to
two additional panels, you will need to be signed in with the disable the Game Bar completely, open the Main settings, go to
Microsoft account associated with Xbox Live. the Gaming section, and use the slider to disable the tool.

www.bdmpublications.com 83
Windows 10 Apps and Software Guides

Listening to Music
with the Spotify App
Recently, Microsoft announced that Groove music would be completely replaced by Spotify in Windows
10. Spotify is an extremely good music playback and discovery app, so this is definitely a good move.
Let’s take a look at using Spotify in Windows 10.

Exploring the Spotify App


The free version of Spotify offers a great selection of features and access to loads of music. However, if you want an ad-free
experience, you will need to buy a premium account.

1 You can download and install the Spotify app from the 3 When you first open the app, the browse screen will be
Windows store for free. It is also free to use, although displayed. Here you can see new releases, charts, albums,
some of the features will need a premium (paid) account. Once podcasts and other media to stream and buy. A premium
downloaded and installed, you can either create a Spotify account will allow you to listen to almost everything you see
account to sign in or you can sign in with Facebook. here, and elsewhere within Spotify.

2 If you have used Groove Music before, the layout and 4 Click the radio link in the left sidebar and you can see a
controls of Spotify should be fairly familiar. The main areas selection of digital radio stations to listen to. These will be
of the app (music store, radio, local files, etc.) are accessed by a random selection of music by different artists and different
using the menu on the left-hand side of the main window. The genres. Just roll your mouse over a radio station and click the
playback controls are always along the bottom. Play button to start listening.

86 www.bdmpublications.com
Listening to Music with the Spotify App

5 When you use the app more, it will learn the types of 8 If you are browsing albums, you can click the green Play
music you like to listen to and display more of that type button at the top of the list of tracks. This will begin
(or similar) on the radio screen. You can also create your own playing all music in the album, or within the folder that is being
radio station by clicking the Create button at the top and viewed. Right-click on any song title and you will see more
searching for artists or genres you like. options, such as viewing other songs from that artist, or opening
a radio.

6 Music you have downloaded or bought, and any music 9 You can create your own playlists in Spotify, containing
stored on your computer, will appear under the Your any selection of songs you want. Click New Playlist in the
Library heading in the left sidebar. You can view all of this music menu on the left, give your playlist a name and click Create. It
by song, album, artist, recently played, etc. Clicking Local Files will then be displayed in your library and will also open within
will display only those songs actually stored on your PC. the main window, prompting you to add music.

7 To play any individual song in your library, simply find it 10 To add songs to your playlists, find a song in your
in one of the lists, move the mouse pointer over the library and right-click on it. From the action menu
song title and click the Play button that appears. You can also that appears, click Add to Playlist and then select the playlist
select the song and then use the playback control panel at the you want to add it to. If you have Spotify on your phone or
bottom of the Spotify window (this is always displayed). tablet, your created playlists will show up there as well.

www.bdmpublications.com 87
Windows 10 Apps and Software Guides

Move or Install Apps


to a Different Drive
Windows 10 makes it easy to control where your software is installed. There is now no reason to worry
about moving all your apps to another internal drive, or even to a removable USB flash drive. With just a
few clicks of your mouse, you can move apps to whichever storage area suits you best.

Change Where Apps are Installed


Not every user realises that apps can be installed on the hard drive of their choice, not just the one preselected by the
Windows 10 OS. Knowing this is useful for general Windows 10 maintenance.

1 By default, apps you install will be saved to the main 3 Click on ‘Change where new content is saved’ and a
partition of the hard drive (usually the C drive). However, new list will open. Here you can see exactly where apps,
you can choose to save them to any other connected drive, both documents, music, photos, videos and more are saved by
internal and even removable external hard drives (including USB default (unless this has been changed previously). Each of the
flash drives). listed items will have a drop-down menu below it.

2 In the newer versions of Windows 10, this is a reasonably 4 Click the drop-down menu below Apps and choose the
easy thing to do. Open the main Settings and click on new drive or partition you want apps to be saved to. This
System. Here you will see a whole list of useful sections, but the only changes where apps (from the Store) installed after this
one you need to open is the Storage section. This will show a moment are installed. Previously installed apps will still be saved
visual representation of your storage drives as a whole. on to the drive that was set when they were added.

88 www.bdmpublications.com
Move or Install Apps to a Different Drive

Move Installed Apps


If you have a lot of apps installed, moving them to a different drive can be one of the easiest ways to free up space on your
main storage volume. Be aware that not all apps can be moved.

1 You can move already installed apps, if you like. There’s 3 You may see a Modify button instead of the Move button.
no limit to the number of different drives you can store This means the app is a traditional desktop app, and you
apps on. This allows you to make the most of the storage space can’t move it. If you see a Move button, but it is greyed out, this
you have available. To do this, head to Settings > Apps > Apps & is a Microsoft system app and also cannot be moved. You can
features. Click an app and click the Move button. only move apps installed from the Windows Store.

2 You will then be shown where the app is currently 4 If you move or install apps to an external drive, the apps
installed and will be asked to choose another drive for the will cease to work if the drive is unplugged. This is why you
app to be saved on to. Drives are listed in a drop-down menu, cannot move Microsoft system apps to a different drive. Apps
with their drive letter shown to make picking the right one that you need to have always available should be left in the main
easier. Click Move again when you are happy with your choice. system hard drive partition.

Removing Apps and Software


There are two different ways to remove apps and other software from your Windows 10 computer, but both options may not
be available in every instance, so it is useful to understand each.

Remove in Settings In Windows 10, the easiest way to Remove in Control Panel On the Start menu, enter
remove apps or other software is in Control Panel in the search box
Settings. Open settings and select Apps. Select the program and and select Control Panel from the results. Select Programs > 
then select Uninstall. Follow the instructions on the screen. Be Programs and Features, and then select the program. To fix the
aware that some apps built into Windows can’t be uninstalled. program, select Repair or, if that’s not available, Change. To remove
the program, select Uninstall.

www.bdmpublications.com 89
Windows 10 Apps and Software Guides

Changing File Associations


and Protocols
Windows 10 comes with its own default set of associations that open specific file types. A file
association controls which apps or programs are set to open which types of files. If you’re not happy
with the default associations and want to choose your own, it’s easy to do.

Default Programs and Protocols


The ability to change the default apps and programs that Windows 10 uses goes a long way to helping you take full control of
your PC and the system software.

1 Click on the search bar on the left of the taskbar and type 3 Below the description, you will see two options: Set this
“default programs”. You can also navigate to this settings program as default and Choose defaults for this program.
tool by opening the All Apps list, scrolling down to W and clicking The amount of default file associations are also shown. Click
Windows System > Default Programs. Either way, open the tool ‘Set this program as default’ first.
on screen.

2 A list of apps already associated with various functions will 4 Next, click on the ‘Choose default apps by file type’ option
appear. Click on any of these to see alternative options. to see a list of all the file types that can be associated with
The options shown will vary depending on the apps you have your currently installed apps. These are the types of files which
installed at this time. If a function has no apps associated with it, will automatically open in that app when clicked. Anywhere a + is
you can click ‘Look for app in the Store’. shown, is without a default app.

90 www.bdmpublications.com
Changing File Associations and Protocols

5 You can also choose default apps based on protocols. 7 You now have two options: Setting the app as default for
This generally means that typing or accessing a certain any and all files or protocols it can open, or choosing
URL will trigger the app to open, rather than a webpage. For individual defaults the app will use. Clicking the first results in an
example, if MAILTO is detected by the browser, our default email instant change, clicking the second will show you a list of
client (Thunderbird) will launch to handle the request. current defaults for that app, allowing you to choose.

6 Finally, you have the ability to set defaults by app, rather 8 If you run into problems after changing protocols and
than choosing apps to go with certain files or actions. Click defaults, you can easily reset to the Microsoft
‘Set defaults by app’ at the bottom of the screen. A new window recommended defaults with a click of the button on the Default
will open, displaying a list of apps on the left. Click on any app Programs screen. This may mean that you have to go back
you want to change the defaults for. through your list and change some settings but it can be a
useful fix.

Running Services
Being able to check which Windows Services are running at any particular time is also a useful option, as it can help to
diagnose performance or stability issues.

1 The easiest way to get to the Services panel is by going 2 Click the ‘Services and Applications’ option in the
through the Power User menu. Right-click on the Start left-hand panel of the window that opens. Then click
menu button on the far left of the taskbar and select ‘Computer ‘Services’ to show the full list. The list will be large but not all
Management’ from the menu that pops up; this is the Power User services will be running at any one time. Click on any to see
or Win-X menu. more details, including management option, for that service.

www.bdmpublications.com 91
Windows 10 Apps and Software Guides

OneDrive Files
On-Demand
With Files On-Demand, you can access all your files in the cloud without having to download them and
use storage space on your device. All your files, even online-only files, can be seen in File Explorer and
work just like every other file on your device.

Using Files On-Demand


Files On-Demand allows you to access your storage in a much easier and more efficient way, treating cloud-based files as if
they are on your PC.

1 First, make sure you are signed in to OneDrive on your 3 You can now open your OneDrive folder to begin checking
computer. Right-click the white OneDrive cloud icon in how your files are currently stored, and to change the
the notification area, at the far right of the taskbar. If you don’t status of any you want to move offline or online. You will see
see the OneDrive icon on the taskbar, click the ‘Show hidden the files and folders on OneDrive now have symbols attached to
icons’ arrow, also at the bottom right of the screen. them, showing you their current status.

2 You should see a panel pop-up asking if you want to 4 To mark a file or folder for offline use or as online-only,
turn on Files On-Demand. If so, click the blue button and right-click on it and look in the action menu for ‘Always
wait whilst OneDrive sets this up. If you don’t see this panel, click keep on this device’ or ‘Free up space’ depending on what you
Settings from the OneDrive action menu, click the Settings tab and wish to do. If you mark a folder as ‘Always keep on this device’,
then check ‘Save space and download files…’. new files in that folder are set as always available files.

92 www.bdmpublications.com
OneDrive Files On-Demand

5 Sometimes you might want to make sure a folder doesn’t 6 When you delete an online-only file from your device, you
show up on a device for privacy reasons. In the OneDrive delete it from your OneDrive on all devices and online.
Activity Center, select the Settings gear. Next to the location You can restore deleted files and folders from your OneDrive
where you want to choose folders, click Choose folders. Clear the recycle bin on the web for up to 30 days. If you delete a locally
check box next to the folder you want to keep off this device. available file, it also appears in your device recycle bin.

On-Demand Files
Once the Files On-Demand is set up, you can access everything from within the File Explorer in Windows 10. You can also access
them through the OneDrive taskbar icon.

Viewing Files When you turn on Files On-Demand, you Locally Available Files When you open an online-only
see all your files in File Explorer and get file, it downloads to your
new information about each file. New files created online or on device and becomes a locally available file. You can open a
another device appear as online-only files, which don’t take up locally available file anytime, even without Internet access. If you
space on your device. When you’re connected to the Internet, need more space, you can change the file back to online-only.
you’ll be able to use the files like every other file on your device.

Online-only Files Online-only files don’t take up space Always Available Files Only files that you mark as
on your computer. You see a cloud ‘Always keep on this device’
icon for each online-only file in File Explorer but the file doesn’t have the green circle with the white check mark. These files
download to your device until you open it. You can only open will always be available even when you’re offline. They are
online-only files when your device is connected to the Internet. downloaded to your device and take up space.

www.bdmpublications.com 93
Windows 10 Apps and Software Guides

Installing a Printer
in Windows 10
When you connect a printer to your PC or add a new one to your home network, you can usually start
printing straight away. Windows 10 supports most printers, so you probably won’t have to install
special software. Here’s how to install printers in Windows 10.

Install a Local Printer


A local printer simply means one that is physically connected to your laptop or desktop computer via a USB data cable, rather
than being connected wirelessly.

1 In most cases, all you have to do to set up a printer is to 3 If so, click on it and then click Add Printer. The printer
connect it to your PC and let the plug and play software should then be installed and ready to use. If you don’t
do its work. Plug the USB cable from your printer into an see your device in the list, click ‘Add printer or scanner’ and see
available USB port on your PC and turn the printer on. If nothing if the scan finds it. If it still does not appear, click the link that
happens, try restarting your PC with the printer connected. appears: ‘The printer I want isn’t listed’.

2 If the printer does not set up automatically, you will need 4 This opens a step-by-step tool that will show you how to
to do it yourself. Click the Start menu button and head find and install software for an older printer, or one which
into Settings. Here you need to look for Devices and then is not supported by drivers pre-installed with Windows 10. If that
Printers & Scanners. You should see a list of available devices, still fails, try going to the printer manufacturer’s website and
hopefully with your printer’s name shown. download an installer or drivers.

94 www.bdmpublications.com
Installing a Printer in Windows 10

Install a Wireless Printer


A wireless printer is one that is connected via Wi-Fi, Bluetooth or by means other than a USB data cable. This can also include
a printer connected to another PC on the network.

1 Open the settings and head in to Devices and then Printer 3 If you use wireless access points, extenders or multiple
& Scanners. Look for your printer in the list of available wireless routers with separate SSIDs, you’ll need to ensure
devices and if it is there, click on it and then click ‘Add printer’. If that you’re connected to the same network as the printer for your
your printer is switched on and connected to the network, PC to find and install it. If the printer does not appear in the list you
Windows 10 should find it easily. may need to add it manually.

2 Available printers can include all such devices on a 4 Click on ‘The printer I want isn’t listed’ when it appears. This
network, such as Bluetooth and wireless printers or those opens a tool that will show you, step-by-step, how to find
that are plugged into another computer and shared on the and install software for an older printer, or one which is not
network. You might need permission to install some printers, supported by Windows 10 drivers. If this fails, try looking for the
depending on the type of network you are connected to. software on the manufacturer’s website.

COMMON PRINTER PROBLEMS


Printers are getting easier and easier to install, thanks to plug and play software, but if you are having problems do
these two things first.

Check for Old Drivers Most printers require driver Run the Troubleshooter Head in to settings >
software to work properly. If Update & Security >
you recently upgraded from one version of Windows to Troubleshoot and run the Printer Troubleshooter. You can
another, it’s possible that the current printer driver is for the also type ‘Printing problem’ into the search box, select the
previous version of Windows and may not work (or work well) search result labelled ‘Help from Microsoft’ and then select
with Windows 10. Check Windows Update for new drivers. the troubleshooter to download it.

www.bdmpublications.com 95
Windows 10 Apps and Software Guides

Setting Up
Dual Monitors
With a second monitor and the required connectors on your PC, setting up Windows 10 to display over
two screens is easy. Having a second monitor can really help to increase productivity, and allow you to
stay more organised when you’re at your computer.

Setting Up a Dual Display


Matching up the resolution and size of your two chosen monitors will give the best results but even mismatched monitors can
work really well in dual format.

1 You will obviously need to ensure that your PC has the 3 You will now need to configure the dual monitor setup to
requisite connections for two monitors (two HDMI, VGA or your liking. Windows 10 allows you to easily choose how
DVI ports, or a combination of these). Check the back of your PC the dual monitors display. Press Windows Key + P to see the
tower or the side of your laptop to find out. With your PC turned Project side panel. Here you can choose from PC Screen Only,
off, connect both monitors to the available ports. Duplicate, Extend or Second screen Only options.

2 Boot up the computer and log in. Windows should 4 PC screen Only and Second Screen only are fairly
automatically detect that two displays are connected and self-explanatory, displaying an image on one or the
you should see both of them displaying a desktop. Your main other screens. Duplicate is also fairly easy to understand,
display will have all of your icons on it, whilst the new second showing exactly the same display on both screens. Extend
display will be blank apart from the taskbar along the bottom. turns the two monitors to one long screen that you can
spread out across.

96 www.bdmpublications.com
Setting Up Dual Monitors

5 The Extend option is the one which needs the most 8 If you don’t want to see the taskbar on both displays, go
setting up. On the main display, right-click anywhere on to Settings > Personalisation > Taskbar, and scroll down
the desktop and choose Display settings from the Action menu. to Multiple displays. You can then choose to turn off the taskbar
Scrolling to the bottom of the display settings gives you another on the second display. You can also spread a single wallpaper
way to choose the display mode. across both screen by selecting Span in Background settings.

6 At the top of the display settings are the two displays 9 Spreading out across the two monitors in Extend mode
side-by-side. 1 is your main display and 2 is the secondary is as easy as clicking and dragging a window, be that a
display. Which side of the screen the two monitors “join” at browser window, app or anything else, to the “joined” side of
(which side allows you to move on to the second monitor) is the main screen. Just keep the mouse pointer moving and it will
controlled by dragging the display boxes here to the left or right. continue on to the second screen seamlessly.

7 You can view settings for each display independently, by 10 Depending on the graphics card software you have
clicking on one you want to see, and then scrolling down. installed (Radeon for example), you will usually have
You can change the scaling, orientation and resolution of each further display options for the second monitor in the graphics
display to best suit the specification of the monitor, if it is the adapter settings. This might include Virtual Super Resolution
case that the two monitors have different maximum resolutions. and GPU scaling, helping you match up resolution settings.

www.bdmpublications.com 97
Windows 10 Apps and Software Guides

Windows 10
Update Cache
With regular Windows 10 updates required, issues with applying them can sometimes occur. While
some users can run through the update process without a hitch, others may have some problems.
Clearing the update cache allows your PC to begin the process again from scratch.

Clearing Windows Update Cache


It’s often necessary to clear the update cache – all the files that Windows has downloaded in order to apply the update – and
start re-downloading afresh.

1 Begin by clicking on the Windows Start button and typing 3 Close File Explorer and click back to the Services console
‘services’. Click on the Services (Desktop App) link in window. Make sure the Windows Update service is
the search results. This will launch the Services Management highlighted and click on Start the service. Wait for the service’s
Console. Scroll down until you come to Windows Update. This is status to say Running, then close the Services console window.
the service that controls the entire Windows Update process. Now open the Windows Update and Security window and click
Check for updates.

2 Click the entry and then click on Stop the service, 4 Windows should now start to download a fresh copy of
located in the upper left of the Services console the update and, with luck, it will work for you this time, if
window. Keep the Services console window open, not, then the problem is likely deeper into the system. Make a
click on the File Explorer and navigate to C:\Windows\ note of the error code and check out the Microsoft TechNet Blog
SoftwareDistribution\Download. Highlight all the files and pages (https://blogs.technet.microsoft.com/) to see if there are
folders within this directory, use CTRL+A to select all and hit any solutions available.
the Delete key.

98 www.bdmpublications.com
Windows 10 Update Cache/Installing New Fonts

Installing
New Fonts
Windows 10 now includes a new, easier way to install and manage system fonts. This is part of
Microsoft’s ongoing process of moving all the system options and features to the main Settings
interface, rather than having them split between Settings and the Control panel.

Install and Manage Fonts


To install and manage your fonts through the Settings, you will need to have the April/Spring update installed and up to date.
In older versions of Windows 10, you will need to dig deeper.

1 You can now find the fonts controls in Settings > 3 Click on any font in the list to view the available font faces
Personalisation > Fonts. Here you will see a scrollable list and to see the font as it will display at different sizes,
of your current fonts, each with a visual example of how they using the slider. You can type a word or sentence into the box
look. This is a much more user-friendly way of viewing your at the top to see how it will look in that font. To uninstall a font,
fonts, letting you see exactly what each will look like when used. simply click the Uninstall button on the font preview screen.

2 You can search for fonts using the search field at the top or 4 To find new fonts, click the Store link at the top of the
just look through the alphabetical list. You can also filter main fonts page in the settings. The Store will open with
the list by language. Each font is shown with the number of font all available fonts displayed. To install one, click on it in the
faces it includes. A font face is a different version of the same Store and then click the Get button, or the Buy button if the font
font, i.e. regular, bold, italic, italic bold, etc. is not a free one. Installation is automatic, and now complete.

www.bdmpublications.com 99
Windows 10 Apps and Software Guides

How to Update
Windows 10
Keeping your Windows 10 computer up to date is important for two main reasons. First, major updates,
such as the Anniversary update, will add major new features that you shouldn’t miss out on. Second, all
updates are there for a reason, usually to fix problems, close security holes and add improvements.

Checking for Updates


If you think that your PC needs to be updated, you don’t need to wait for the automatic update process to kick in. You can
quite easily check for updates yourself.

1 You can find the Windows 10 update information in the 3 Any available updates will now display at the top of the
main settings app. Tap the Windows key or click the start window and the Check button will change to an Install
menu button and then select the Settings icon from the side of button. You can install the updates straight away, but you will
the menu. Click the “Updates & Security” heading in the menu to need to restart your PC after the install is complete, or you can
open the relevant settings screen. reschedule to a more convenient time.

2 At the top of the window you should immediately see a 4 If you want to check which updates have been installed,
message telling you whether Windows 10 is up to date or perhaps if you need to confirm a security update for work,
if updates are currently available. Directly below this message is you can easily do so by clicking the “Update History” link directly
a button labelled “Check for updates”. Even if the message says below the check for updates button. Updates are displayed, with
up to date, it is worth clicking this button. more info available by clicking.

100 www.bdmpublications.com
How to Update Windows 10

Windows Update Settings


There are several additional and advanced options available which can make the whole update process quicker, easier and
more efficient, which is always a good thing.

Active Hours By setting your active hours, you can tell Automatic Setup Some updates require you to restart
your computer when you will most likely be your PC and sign in to Windows in
using it. If you have updates set to automatically install and order to finish installing the update. Windows 10 can help
restart, they will only do so outside of your active hours. Useful for prevent this from happening by allowing Windows to use your
ensuring updates don’t lose you school or office work. sign in info to create a special token. Go to Advanced update
options > Use my sign-in info...

Custom Restart Time When a restart is scheduled, this Uninstall Updates If for some reason you need to
option is available to temporarily uninstall a particular update, perhaps
override active hours and schedule a custom time to finish the update is causing some software to not behave properly,
installing the current update. You will still need to make sure your you can do so fairly easily. From the Updates windows, click
device is plugged in at the scheduled time. Update History > Uninstall Updates and use the interface to
remove the update.

Update Delivery You can choose how Windows updates Windows Insider As a beginner, you probably aren’t too
are delivered in the Advanced Options. worried about seeing updates before
Windows Update Delivery Optimisation lets you get Windows they are released to the general public but this is exactly what
updates and Windows Store apps from sources in addition to the Windows Insider program lets you do. By joining the Insider
Microsoft. This can help you get updates and apps more quickly. program, you are potentially helping in the development of
Windows 10 and beyond.

www.bdmpublications.com 101
Windows 10 Apps and Software Guides

What to Keep Updated


in Windows 10
Discussing updates is one thing but how do you go about making sure that you have the latest updates
and that all the necessary components are being updated correctly? Thanks to the improved update
process of Windows 10, this is surprisingly easy.

Keeping Up To Date
Whilst it’s easy to update Windows 10, there are elements that can be missed. We’ve already mentioned that it’s not only
Windows that needs updating but also software and drivers.

1 The first port of call is undoubtedly Windows Update. 3 If you click on the Advanced Options link under the
Click on the Windows Start button followed by Settings, Update Settings section, you can then tick a box that
the cog icon just above the power icon on the strip to the side. enables Windows to automatically check for updates for other
This will open the Windows Settings interface; locate the last Microsoft products, such as Office. It’s recommended to make
entry, Update & Security and click it. sure the box is ticked, for better security and protection.

2 By default, Windows Update will automatically check for, 4 Within the Advanced Options page click the link for
download and install updates for the core Windows 10 Choose how updates are delivered. This page details the
files. You can check for any on the spot by clicking the Check for way Windows updates can be pushed to other computers on
updates button and you can see what’s already been updated your network, or even the Internet. Whilst it’s a grand idea, there
by clicking the Update history link, under the update button. are concerns over privacy from some factors of the community.
It’s your choice but we prefer this option Off.

102 www.bdmpublications.com
What to Keep Updated in Windows 10

5 Hardware drivers are usually automatically updated 8 Third-party programs and applications also require
by Windows Update but whilst signed by Microsoft the regular update checks. Again, this is usually done
drivers themselves aren’t always the latest versions. Therein automatically; when you launch the program in question it
lies a problem: even though signed, the MS drivers won’t often checks for the latest version. If not, look for links such as
utilise the hardware as well as the driver developed by the Check for Updates or similar, usually in the Help, About or even
hardware manufacturer. under the File menus of your favourite app.

6 In such cases it’s often best to use the hardware 9 If you’ve attached some hardware and Windows 10
manufacturer’s driver, as this is more up to date and hasn’t been able to load a driver for it, and there isn’t any
features security patches as well as performance updates. For documentation detailing the driver (this often happens with
example, if you own an Nvidia graphics card right-click the Nvidia hardware purchased from eBay etc.), then you’ll need to hunt
icon in the taskbar and select Open Nvidia GeForce Experience. one down. Start by locating the device’s product name and
number and entering it into a search engine.

7 The Nvidia GeForce Experience allows you to improve 10 You can often force Windows 10 to locate a driver by
in-game graphics and check for the latest drivers. Usually right-clicking the Windows Start button and choosing
this is done automatically and you are notified of any available Device Manager from the menu. In the Device Manager window,
drivers. However, If you want to check manually, click on the select the hardware you want updating, right-click it and select
Drivers tab followed by Check for Updates. Update Driver.

www.bdmpublications.com 103
Windows 10 Apps and Software Guides

Sharing to
Nearby Devices
Nearby Sharing lets you share your videos, photos, documents and websites with people and devices
close by, over Bluetooth or Wi-Fi. Useful if, for example, you’re in a meeting with colleagues and need to
quickly send them a report you’re looking at on your screen.

Nearby Sharing
Share your files quickly with Nearby Sharing: your computer automatically picks the fastest way to share your file or
webpage, either over Bluetooth or Wi-Fi.

1 To enable Nearby Sharing, open Settings and click on 3 If there is a nearby device available, it will be shown in the
System. Now click on Shared experiences and turn on share menu that pops up. You will need to know the name
the Nearby Sharing toggle switch. If you have not yet applied the of the device you want to share to. Once you select the device,
Windows 10 Spring/April update, you will need to do so before the other user will see a notification asking them to accept the
you can view the Nearby Sharing option here. transfer. This will time out in a few seconds if not accepted.

2 You can also activate Nearby Sharing from the quick 4 By default, transfers will be stored in the Downloads
actions menu in the Action Center. You can send any video, folder but you can specify another folder or another
photo, document or webpage viewed on Microsoft Edge to drive very easily. Open settings and click on system > shared
people or devices nearby by clicking on the share icon in the top experiences. Under ‘Nearby Sharing’, look for the ‘Save files I
right corner of the app or right-clicking to view the share menu. receive to’ option and click the Change button.

104 www.bdmpublications.com
Sharing to Nearby Devices/Using the Focus Assist Tool

Using the
Focus Assist Tool
Focus Assist allows you to create distraction-free periods by blocking alerts, notifications and other
sounds. Turn on Focus Assist to stop distractions like social media or alternatively set it to turn on
automatically at certain times during the day.

Blocking Notifications
Choose which notifications you want to see and hear. The remainder of your alerts will go into the Action Center so you can
see them at a more convenient time.

1 You can easily activate Focus Assist using the quick 3 To set an automatic rule by time, click on the option and
actions panel in the Action Center. The default setting then click the slider to On. You will now see menus to set
is Off. Click the Quick action button once to allow priority start time, end time and whether to repeat the rule daily, just on
notifications only, click it a second time to allow alarms only. weekdays or just on weekends. The focus level lets you choose
Click the button a third time to turn Focus Assist off again. if this applies to priority notifications or alarms.

2 You can also turn Focus Assist on or off in the main 4 If setting Focus Assist to priority, you can set a priority
settings (settings > system > focus assist). Once there, you list by clicking ‘Customise your list’. Here you can add or
can also set up your automatic rules and customise your priority remove specific apps, people or Windows 10 features that notify
list. You can set automatic rules based on times, when you are you. When you turn off Focus Assist (manually or automatically),
duplicating your display or when playing a game. a summary of missed notifications can be shown.

www.bdmpublications.com 105
Windows 10 Apps and Software Guides

Windows 10
Power User Tips
Windows 10 can be very simple to use, which is great for many people. However, if you want to get more
from Windows 10, it gives you the option to dig a little deeper and explore the more powerful ways it
can be used. Here are some power user tips that allow you to do exactly that.

Use Shake Gestures Windows 10 has a handy shake Customise Trackpad Gestures If the computer
gesture that allows you to clear you are using has
your screen clutter in no time. If you have a lot of windows a trackpad instead of a mouse, such as a laptop or a 2-in-1
open and you want to focus on one in particular, just grab the device, you can use some useful trackpad gestures to navigate
title bar of that window with your mouse pointer, then shake Windows 10 more easily. There are several to try, including:
back and forth to minimize all other windows. If you want to pinch-to-zoom, two-finger scroll, three-finger multitasking,
bring the other windows back, just shake the first window and more. But more than that, you can even customize some
again and all will be right back to normal. of the gestures. Head to: Settings > Devices > Touchpad. You
can then change the actions of three- and four-finger taps,
adjust scrolling, and more.

Disable Scrollable Background Apps

A simple, but useful, feature, which has been


missing from Windows for some time now,
is the ability to scroll in background apps
without bringing them to the front. This feature,
especially useful whilst multitasking, has
been available in OS X for a while, and now
it is available in Windows 10. The scrollable
background apps feature works like this: If you
have two windows open, you can hover the
pointer over the background window and use
your mouse wheel to scroll the page without
having to bring it to the foreground.

If you’d like to disable this option, head to the


main Settings menu and click ‘Devices’. From
here, select Mouse or Touchpad then use the
slider switch to disable ‘Scroll inactive windows
when I hover over them’.

106 www.bdmpublications.com
Windows 10 Power User Tips

Speed Up Boot Time It is possible for many Windows 10


users to speed up the boot time
of their machine significantly by making a few simple changes
to the power settings. These changes can improve boot time by
more than 50%.

If you bought your PC with Windows 10 already installed, it is


likely that the Fast Boot feature is already enabled, so there
will be no available time-savings to be had, but if you have
upgraded from Windows 7 or 8, it may not be.

In the Windows 10 search box, type Control Panel and click on


the top result: ‘Navigate to Power Options’. You can also open
the Settings > System > Power & Sleep. Click on ‘Additional
Power Settings’ in the right hand column. This will open the
Control Panel at the right place.

Click on ‘Choose what the power buttons do’ and, if the options
are greyed out, click on ‘Change settings that are currently
unavailable’. Check the box next to ‘Turn on fast start-up’
(recommended). Save the changes and close the Control Panel.

Set Time Limits for Any Account In Windows 10, it is The named user will now be locked out of the machine other
possible to set time than during the days and times you entered. You can remove
limits for the Microsoft accounts you create for your kids to use the time limits for an account by typing net user <username> /
by using the Parental Controls. But what if you need to set time time:all and pressing Enter.
limits for a local account? In the settings, there is no built-in time
limit option for local accounts. Luckily, there is a workaround.

In the Windows 10 search box, type Command Prompt and select


‘Run as administrator’. At the command prompt, type net user
[username} /times:[days,times], replacing [username] with the
user account for which you want to set the limits. If you are unsure
of user accounts on the PC, type net user and press Enter.
Replace [days, times] in the command with day letters (M, T, W,
Th, F, Sa or Su) and times. For example, you could limit use to
Friday between 9am and 6pm by typing /times:F,09:00-18:00.
Once you have the command written precisely as you want,
press Enter.

Editing the Power User Menu The Power User Menu f you want to edit the Win+X menu, to contain those more useful
is accessed by right tools, you can do so with a small and simple bit of software
clicking on the Start menu button or by pressing Windows+X. called Win+X Menu Editor (Google it, or download from https://
It contains shortcuts to the useful Windows Powershell, Device winaero.com/download.php?view.21)
Manager and Disk Management tools, as well as some less useful
tools (have you ever used the Event Viewer?) Once installed, you can use the Win+X Menu Editor to customise
exactly what is in the three sections
(or Groups) of the Power User Menu.
Although you can add links to almost
any apps and software, it is worth
limiting it to just the important
administrative tools and Control
Panel items.

You will need to restart after making


the changes before they will be
accessible from the Power User
Menu. If you are unhappy with the
changes, just use the menu editor
software to restore the default menu.

www.bdmpublications.com 107
Windows 10 Apps and Software Guides

Booting into Safe Mode Safe Mode has been a part Clearing Windows Update Cache It’s often necessary
of Windows for a long time to clear the update
and the ability to boot into it, by pressing F8, has always been cache – all the files that Windows has downloaded in order to
a key troubleshooting option. Making the fact that Microsoft apply the update – and start re-downloading afresh.
removed the option in Windows 10, all the more confusing.
You can still access Safe Mode, but you need to boot up Start by clicking on the ‘Windows Start Button’ and typing
normally and then restart while holding Shift, or access it services. Click on the ‘Services’ (Desktop App) link in the search
through Update & Security in the Settings menu. Not very results. This will launch the Services Management Console.
useful if your problem means you can’t boot into Windows 10 Scroll down until you come to Windows Update. This is the
in the first place. service that controls the entire Windows Update process.

While there is no simple setting change you can make to Click the entry, then click ‘Stop the service’, located in the
enable the boot into Safe Mode, you can create a Safe Mode upper left of the Services console window.
boot option with a little bit of work. Press Windows+X to Keep the Services console window open, click on the File
open the Power menu and click on ‘Command Prompt’. If Explorer and navigate to C:\Windows\SoftwareDistribution\
you don’t see the option there, type Command Prompt in the Download. Highlight all the files and folders within this
search box, and select ‘Run as administrator’. directory, use CTRL+A to select all, and hit the Delete key.

At the Command Prompt, type bcdedit /copy {current} /d Close File Explorer, and click back to the Services console
“Windows 10 Safe Mode” and press Enter. Type msconfig window. Make sure the Windows Update service is highlighted
in the Windows search box and press Enter. Navigate to and click on ‘Start the service’. Wait for the service’s status to
the boot tab in the System configuration panel, highlight say Running, then close the Services console window. Now
‘Windows 10 Safe Mode’ (which you just created using open the Windows Update and Security window, and click
Command Prompt), and then check the box next to Safe ‘Check for updates’.
Boot. Select ‘Minimal’ from the four available safe boot
options. You can also reduce the Timeout value (minimum is Windows should now start to download a fresh copy of the
3 seconds) so that normal boot isn’t slowed down too much. update and with luck it will work for you this time. If not, then
Finally, check the ‘Make all boot settings permanent’ box, the problem is probably deeper into the system. Make a note
and then click ‘OK’. of the error code and check out the Microsoft TechNet Blog
pages (https://blogs.technet.microsoft.com/) to see if there
You can repeat the process to create shortcuts to ‘Safe are any solutions available.
Mode with Networking’ (check Network rather than Minimal
in MSConfig) or ‘Safe Mode with Command Prompt’
(select Alternate Shell). Just replace name in quotes at the
Command Prompt, e.g. bcdedit /copy {current} /d “Safe Mode
with Networking”.

Each time your computer boots, you will now see the option
to boot normally or boot into Safe Mode. These options
remain on screen for the set timeout period, after which, if
nothing is clicked, the PC should boot normally.

108 www.bdmpublications.com
Windows 10 Power User Tips

Creating a Restore Point A restore point is like a saved Embed Folders in the Taskbar If there are one or
snapshot of the OS and its two folders that you
configuration, which can be used to roll back from changes constantly have to access, where do you put them? You can
that have caused problems. Strangely, in Windows 10, this pin folders to the Start Menu, and you can pin folders to the
important system protection tool isn’t enabled by default. We File Explorer jump menu, but did you know that you could
suggest you set up a system restore point right now! actually embed folders in the Taskbar?

In the Windows 10 search box, type create a restore point To do this, right click on the unused space on the Taskbar
and then click on it in the results. Highlight the system drive and, from the menu that appears, select Toolbars > New
(almost always the C: drive) and click ‘Configure’. Toolbar. In the window that opens, navigate to a directory
and select the folder you want to embed. The folder name
Select ‘Turn on system protection’ and then use the slider to will now appear to the far right of the empty Taskbar space.
set an appropriate amount of maximum disk space (5-10GB Click on the small arrows next to the folder name to open
should be enough). Click ‘Apply’ and you are all set. the folder in a Taskbar panel.

It is worth checking back after each Windows 10 update; as


they have been known to reset this option, disabling the
system restore setting.

If you want to create a restore point straight away (rather


than waiting for Windows to do it automatically), you can do
so from the previous System Properties panel.

www.bdmpublications.com 109
Windows 10 Apps and Software Guides

Blocking PUPs with Windows Defender

PUPs, or Potentially Unwanted Programs, are bits of software open a window. Type the following command at the prompt
that can sometimes be stealthily installed when you install other Set-MpPreference -PUAProtection 1 and press Enter.
free software, usually by making it a default installation option
with the choice to opt out. Windows Defender has the ability to The PUP blocker is now enabled on your PC. You will not see
block these sneaky software installs, but it isn’t enabled (or even any new options displayed in Windows Defender, but you will
visible) by default. see ‘Potentially unwanted software’ listed once something is
blocked. If you want to disable it in the future, just run the above
You can enable PUA protection with System Center Config command again, replacing the ‘1’ with an ‘0’.
Manager, PowerShell, or Microsoft Intune. For this guide, we’ll
be using the PowerShell, as this is available within Windows 10 PUAs are blocked when a user attempts to download or install
without installing any additional software. As long as you follow a suspicious file, if the file meets one of these conditions: the
the instructions carefully, it isn’t as scary as it sounds. file is being scanned from the browser, it is in a folder with
“downloads” in the path, or it is in a folder with “temp” in the
To access the PowerShell interface, right click the Start button path. The file is placed in the quarantine section.
or press Windows+X and click ‘Windows PowerShell (Admin)’ to

Create a Shutdown Timer This is probably not can create a shutdown timer shortcut that can be placed on
something you will think the desktop. The only real problem with a shortcut is that the
you need, until you need it. A shutdown timer allows you to shutdown time is fixed.
delay the shutdown of your computer in the event that you
need to leave it on whilst it completes a particular function, Right click on the desktop, hover over New and select ‘Shortcut’
software updates for example, but can’t stay around to shut it in the side menu. In the path field type shutdown.exe -s -t XXXX
down manually. (where “XXXX” is the time in seconds) and click ‘Next’. Enter a
name for the shortcut, for example s, and click ‘Finish’.
The first thing you need to do to create a shutdown timer manually,
is open the Command Prompt. In the Command Prompt, type the
command shutdown -s -t XXXX. The “XXXX” should be the time in
seconds you want to elapse before the computer shuts down. For
instance, if you want the computer to shut down in one hour, the
command should look like shutdown -s -t 3600.

Press Enter to complete the command and set the timer going;
you won’t see anything on screen just yet, that part comes in a
moment. If you input the wrong time or entered the command
by mistake, you can cancel the timer by typing shutdown -a in
Command Prompt.

You can do this each time you need to use a shutdown timer,
which is not really a problem if you only rarely use it, or you

110 www.bdmpublications.com
Windows 10 Power User Tips

What is the Registry? The Windows Registry is a


hierarchical database that
stores low-level settings for the Microsoft Windows
operating system and for applications that opt to use
the Registry. The kernel, device drivers, services, Security
Accounts Manager (SAM), and user interface can all use
the Registry. The Registry also allows access to counters
for profiling system performance. Prior to the Windows
Registry, .INI files stored each program’s settings as a text
file, often located in a shared location that did not provide
user-specific settings in a multi-user scenario. By contrast,
the Windows Registry stores all application settings in one
logical repository (but a number of discrete files) and in a
standardized form.

Backing Up Your Registry Before you edit any part


of your system registry, it is
a good idea to make a backup of all the keys that you intend
to edit.

You can back up any of the keys in the registry by


right-clicking on any of them, in the editor, and then selecting
‘Export’. This will save into a .reg file that can be run to
re-apply the old value of that key at a later date. This is the
very minimum you should do as a backup step before editing.

An easier backup method is to make a System Restore point,


which includes a snapshot of the registry. Go to Start, type
restore, select ‘Create a restore point’, select a drive, click
‘Configure…’ then pick ‘Turn on system protection’, set the
‘Max Usage space’, and click ‘OK’.

Disable the Lock Screen Activating The Windows


10 lock screen, when
the screen goes to sleep, is a useful feature on a laptop
or a desktop that isn’t in a private area, but it can be a
bit annoying on a PC, which is in a private room, or only
accessed by you.

You can, of course, change the screen timeout settings


(Settings > System > Power & Sleep) so that the screen and
system stay awake, but doing this can cause screen burn,
along with other problems, if you are away from your PC for
extended periods.

Thankfully, you can use the Registry Editor to disable the


Lock Screen. In the Windows 10 search box, type regedit and
click on the ‘Registry Editor’ in the results. You then need
to navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\
Microsoft\Windows. Look for a key named ‘Personalisation’.
If there isn’t one, right click on the Windows folder (in the
left panel) and choose New > Key. Type Personalisation and
then press Enter.

Right-click on the personalisation key you just created,


click ‘New’ and then click ‘DWORD (32-bit) Value’. Now
type NoLockScreen and press ‘Enter’. Double-click on
the ‘NoLockScreen DWORD’ you have just created in the
right-hand panel and type 1 in the Value Data field. Click ‘OK’
to finish.

www.bdmpublications.com 111
Windows 10 Apps and Software Guides

Increase Taskbar Transparency

Open the Registry editor by typing


Regedit in the Windows 10 search box
and clicking on the top result. In the
Registry Editor, go to the following key:

HKEY_LOCAL_MACHINE\SOFTWARE\
Microsoft\Windows\CurrentVersion\
Explorer\Advanced

In the right-side pane,


create a new DWORD called
UseOLEDTaskbarTransparency and set
its value to 1.

Disable System Tray


Notification Balloon Pop-ups
In the Registry Editor, go to the
following key:

HKEY_CURRENT_USER\Software\
Microsoft\Windows\CurrentVersion\
Explorer\Advanced

Create a new DWORD value, name


it EnableBalloonTips, and set its
value to 0.

Hide Folders from This PC In the Registry Editor, go to


the following key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Explorer\FolderDescriptions\<FOLDER-GUID>\
PropertyBag.

Substitute the <FOLDER-GUID> above with one of these:


Desktop: {B4BFCC3A-DB2C-424C-B029-7FE99A87C641}
Documents: {f42ee2d3-909f-4907-8871-4c22fc0bf756}
Downloads: {7d83ee9b-2244-4e70-b1f5-5393042af1e4}
Music: {a0c69a99-21c8-4671-8703-7934162fcf1d}
Pictures: {0ddd015d-b06c-45d5-8c4c-f59713854639}
Videos: {35286a68-3c57-41a1-bbb1-0eae73d76c95}

If ThisPCPolicy is set to Show, then the folder is visible. If you


change it to Hide, then the folder will be invisible.

112 www.bdmpublications.com
Extra Power User

Extra Power User Tips


Here are a few more tips to make using your Windows 10 PC easier, quicker, safer and less frustrating, including a few tips
about the latest update.

Add Emoji From Your Keyboard Express yourself Paste From Cloud Clipboard Copy images and text
however and from one PC to another
wherever you want. Press Windows logo key + period (.) to open with a cloud-based clipboard. Select Start > Settings > System
an emoji panel. Use kaomojis to create faces with text, and > Clipboard. Sign in with your Microsoft account, and then use
symbols—like punctuation and currency—to make a statement. the toggles to turn on both Clipboard history and Sync across
devices. You can also use the Win + V shortcut to access your
clipboard easily.

Automatically Backup OneDrive Folders Lock Your PC Instantly Help keep your PC safe when
you are using your computer
Keep your Documents, Pictures, and Desktop folders in a public place or when there are others in your home. Press
automatically backed up with OneDrive, so they’re protected Windows logo key + L to instantly lock your PC before you
even if you lose your PC. On the right side of the taskbar, walk away from it, no matter what timed lock options you
select OneDrive > More > Settings. On the AutoSave tab, select have set.
Update folders and specify which folders you’d automatically
like to sync.

Pause System Updates To temporarily delay updates Hear Everything in One Ear If you like to work with
for your device, go to Start one earphone in, you
> Settings > Update & Security > Windows Update, and then can set the audio to a single channel. Select Start > Settings >
select Pause updates. Once you reach the pause limit, you’ll Ease of Access > Audio, then switch on the toggle under Turn
need to get the latest updates before you can pause again. on mono audio. If you’re using one earbud, or something
similar, the audio will be combined into one channel.

www.bdmpublications.com 113
Index

Windows 10 Security,
Maintenance &
Performance
Learn how to keep your Windows 10 PC running smoothly and safe from
malware and viruses. Master Windows 10 security and maintenance
including: privacy settings, ease of access, folder and file manipulation
and online safety. These guides will explain the workings of the OS and
show you how to get started with key features.

124 128 172


Protect Devices on Windows Defender - Tweak and Modify
Public Wi-Fi Is it Good Enough? Windows 10
Keep your mobile Windows Discover the built-in tools for Learn how to personalise
devices secure when using making Windows 10 safer and Windows 10 even more with
public Wi-Fi. more secure. this simple software tool.

114 www.bdmpublications.com
Windows 10 Security, Maintenance & Performance

116 Encrypting Your Windows 10 Laptop 154 Fix Wireless Network


Connection Problems
118 What is Encryption?
156 Windows 10 Registry Tweaks
120 Secure Your Home Network
158 Windows 10 Maintenance Tools
122 Manage Your Privacy in Windows 10
124 Protect Devices on Public Wi-Fi 160 How to Reset or Fresh Start

127 Best Antivirus Software 162 10 Ways to Reuse an Old USB Stick

128 Windows Defender - is it Good Enough? 165 Using Windows 10 Storage Sense

132 Device Performance & Health 166 Easily Sync Files to an External Drive

133 Online Safety Tips 168 Limiting Data Usage when Tethering

134 Blocking PUPs with Windows Defender 170 Check and Manage RAM Usage

135 Using Windows 10 Dynamic Lock 172 Tweak and Modify Windows 10

136 Create a Windows 10 System Image 174 Ten Things to Disable in Windows 10
138 Improving the Windows 10 Firewall 176 Defragment Your Hard Drive
140 How to Remove Malware from 178 Updating Your Device Drivers
Windows 10
180 Windows 10 Touchpad Gestures
142 What is a VPN?
182 Windows 10 Hotkeys
144 How a VPN Can Improve
Windows Security 184 Six Steps to a Faster PC

146 Backup with a Recovery Drive 186 Remove Windows 10 Bloatware

148 Manage Disk Partitions in Windows 10 188 How to Free Up Space in Windows 10

150 Using the Task Manager 190 Troubleshooting Windows 10


152 Monitor Tasks with the Task Manager 192 Diagnosing Windows Problems

www.bdmpublications.com 115
Windows 10 Security, Maintenance & Performance

Encrypting Your
Windows 10 Laptop
Windows 10 Pro comes with Microsoft’s BitLocker program to encrypt the file system; however,
Windows 10 Home versions do not have this feature. Thankfully, there are many encryption programs
available for download; we’re using DiskCryptor in this tutorial.

Windows 10, Under Lock and Key


We’re going to encrypt a 2GB USB flash in this example, purely for ease of use and to demonstrate how you can encrypt your
entire laptop hard drive(s).

1 Encryption doesn’t affect the core data, other than making 3 It’s always best to save data before commencing with
it impossible to read without the decryption key. Still, it’s anything like this. It’s also always worth doing (as we are) a
always worth making sure you have a backup of all your data test of the software first, on a disk that you don’t mind messing up
prior to any system related changes. If you store your work or should you get the process wrong. Let’s start by navigating to the
data in the Documents folder, then start by opening it in DiskCryptor homepage, at www.diskcryptor.net/wiki/Main_Page.
Windows Explorer.

2 Press Ctrl+A to highlight all the files, then press Ctrl+C to 4 Using the menu to the top left, click on the Downloads
copy them to the clipboard. Next, choose a suitable link. Look for the latest version in the Download section
backup location – such as an external or network drive – and and click the link for the Installer. This opens a confirmation
when ready, press Ctrl+V to paste the copied data into the new box; click the Save File button to download the DiskCryptor
location. Then, should something go wrong, you have a recent executable file.
backup of your most used data.

116 www.bdmpublications.com
Encrypting Your Windows 10 Laptop

5 The dcrypt_setup.exe file should now be in your 8 You’re now offered a selection of available algorithms
Downloads folder. Double-click it and select Yes to accept from which to choose. Click the drop-down box to view
the Windows confirmation. With the DiskCryptor setup window them all, however, we recommend staying with the default AES
open, click the Next button and accept the license agreement algorithm for the time being. Leave the Wipe Mode box as None
on the following page. For the remainder of the options, choose and when you’re ready, click the Next button.
the defaults by clicking Next. When done, click the Install button
and reboot the computer.

6 After a reboot, click the Windows Start button and locate the 9 In the next section, choose a unique password for
newly installed DiskCryptor program. You need to click Yes accessing the encrypted disk; you’re notified how strong
to authorise its administrative access. With DiskCryptor open you the password is. When you’re ready, enter it again in the
can see the list of currently installed hard drives in your system. You Confirm box. Click the OK box to start the encryption process.
can click each in turn and view its information at the bottom of the
DiskCryptor window.

7 Start by selecting the disk you want to encrypt. As 10 Depending on the size of the drive, and how much data
mentioned before, in our example we’re going to test this is on it, the encryption process could take some time.
out on a USB stick. We recommend you also do this until you’re When it’s complete, you’re notified and the selected drive will
comfortable with the process. With the correct drive selected, be fully encrypted, with you able to access and decrypt it using
either click the Encrypt button to the right or right-click and the password you set up in the previous step.
choose Encrypt from the menu.

www.bdmpublications.com 117
Windows 10 Security, Maintenance & Performance

What is
Encryption?
To better understand encryption, it’s worth taking a moment to learn about its origins, how it has
developed over the years and how it applies to our modern communications.

Encryption is the act of protecting your data from prying eyes

The word encryption comes from the ancient Greek word Kryptos, which means hidden or secret. Interestingly, the
practise of hiding messages from others can be traced back to early Egyptian scribes who inserted non-standard
hieroglyphs within other communications in order to hide the message from casual viewers. According to historians, the
Spartans used strips of leather engraved with messages. When the strips were read, they were meaningless, but when
wrapped around a staff of a certain diameter, the characters would be decipherable.

Of course, the modern forms of encryption are far more advanced, algorithms and standards to protect the communication on the
but the overall core concept has remained the same: to be able to battlefield and from one government agency to the next. These
send a message to others without anyone else being able to decipher algorithms grew in complexity as technology advanced and it wasn’t
it. However, modern encryption now requires more than merely long before the military-based forms of encryption were being used in
sending coded messages. Not only is confidentiality required, commercial modes of communications. Within a few short years,
encryption must perform a level of authentication, so the origin of the bank transfers, cash withdrawals and data sent to and from modems
communication can be verified; integrity of the communications, began utilising these new protocols to protect sensitive information.
where both the sender and those who receive the communication
can be sure that the message hasn’t been altered in between; and Today we’re regularly seeing and using devices that boast
some form of nonrepudiation, where the sender cannot deny having ‘military-grade 256-bit AES’ forms of encryption, a standard that is
sent the communication in the first place. regarded as nearly impossible to break without spending billions on
specialist hardware and software. In plain English, the modern form of
During the early digital age, the only users of encryption were the encryption takes data and passes it through an algorithm
government and military. As such, between them they created a set of

118 www.bdmpublications.com
What is Encryption?

together with a key. This creates a garbled file of


characters that can only be read if the correct key is
applied to decrypt the data. Algorithms today are
divided into two categories: symmetric and asymmetric.

Symmetric key cyphers use the same key to both


encrypt and decrypt data. The most popular
symmetric cypher is AES (Advanced Encryption
Standard), developed by the military and government
to protect communications and data. This is a quick
form of decryption that requires the sender to
exchange the key used to encrypt the data with the
recipient before they’re able to read it.

Asymmetric key cyphers are also known as public-key


cryptography and utilise two mathematically linked
keys, public and private. The public key can be shared
with everyone and is usually generated by software or
Forms of encryption can be traced as far back as
ancient Egypt, using non-standard hieroglyphs

provided by a designated authority. The private key is


something that’s usually only known by the individual
user. Interestingly both types of keys can be applied,
where one user has a public key and another a private
key, which can be combined to form a shared
encryption level.

These keys are many characters in length, making it nigh


impossible for someone to Brute Force hack them. The
Brute Force method involves using a program on a
computer to try every possible combination of a key until
the correct one is found. In the case of the 256-bit
encryption, it would take 2256 different combinations to
break the key. If you were able to force one trillion keys
per second, it would still take you somewhere in the
region of 1057 years in order to crack 256-bit encryption.
However, a powerful computer can probably manage
Making data impossible to read is just one step; you also need the key to
around two billion calculations per second, so in theory,
decrypt that data
it would take 9.250 years for your standard desktop to
crack it. Keep in mind that the universe has theoretically
only been in existence for 1.410 years.

Numbers this big are generally far too mind-boggling to


comprehend. Suffice to say that if you’re able to use
256-bit encryption for your communications or to protect
your data, then you’re going to be protected for at least
seven times the current age of the universe.

The universe is 14 billion years old, but it would take


seven times that time to crack 256-bit encryption

www.bdmpublications.com 119
Windows 10 Security, Maintenance & Performance

Secure Your
Home Network
We’ve mentioned previously that an attack doesn’t always come from the other side of the globe but
can indeed be a little too close to home at times. Home network hacking is possible with the simplest of
tools; easily found on the Internet.

Network Protection
Without being too paranoid, it’s remarkably easy to get into a neighbour’s home network. If you live in a block of flats or you
use powerline adapters, you may need to consider these ten steps for better network protection.

1 The most common entry point to gain access to your 3 It can be a pain but try disabling DHCP on your router and
network is via the router. The router from your ISP may opting for static IP addresses. Every device that connects to
well be offering the latest forms of encryption but it doesn’t take a DHCP router will receive an IP address. By eliminating that you
a genius to trawl the less reputable sections of the Internet to get to specify the address range available. It’s not fool proof but
obtain a list of passwords. Therefore, change the default it’s worth considering.
username and password needed to access it.

2 Most routers these days come with a form of 4 According to Trustwave’s 2013 Global Security Report,
authentication called MAC (Media Access Code) address many home network hacks are conducted when the
filtering. Every networkable device, computers, tablets, games household is away or asleep. This leaves the hacker with
consoles, come with a unique MAC address. The filtering allows ample opportunity to steal bandwidth and view files you may
you to enter the MAC addresses of your devices, so only they can have on a NAS drive. The short, simple solution is to power off
be used on your router. Consult your router documentation for the router at night or if you go out for the day.
more details.

120 www.bdmpublications.com
Secure Your Home Network

5 Powerline adapters are an excellent resource for 8 Sharing resources and files from one computer to
connecting wired network devices, without trailing another is perfectly fine but consider sharing less if you
lengths of cable around the home. However, depending on the live in close proximity to others. Once a hacker has gained
adapter, it is possible to use another adapter to gain access to access to your network, getting to any shared folders you have
yours. In newer homes it’s an easy enough task to pick up will be a doddle. In extreme cases don’t share anything, but
another user’s network, so use the Encryption button if the generally tighten password control.
adapter has one.

6 Networking a home with Ethernet cables isn’t a difficult 9 Remote administration on both the router and computer
project and it offers faster connection speeds than that of certainly can help you out when you’re not at the
wireless. However, if you’re living in shared accommodation or a keyboard. Perhaps you connect to your home network from
block of flats, make sure that any unseen cable lengths can’t be work? Whatever the reasons, it does leave a potential gap in
accessed by a neighbour. It’s easy enough to splice into an your home network security. Consider closing it completely or
Ethernet cable and steal bandwidth. double-checking the authentication is top notch.

7 Consider using a network mapping program, such as 10 If you run a small office make sure that all your wall
Open-AudIT, to gain a better understanding of what ports are located in areas where they are secure. Behind
devices are attached to your network. Become familiar with the desks and generally away from where the public or any visitors
addresses, manufacturer, model IDs and so on of every may be able sneakily plug a laptop in.
connected object. That way, should anything new appear, you’ll
know it’s not something you allowed.

www.bdmpublications.com 121
Windows 10 Security, Maintenance & Performance

Manage Your Privacy


in Windows 10
Being in control of security on your computer is important but almost as important is being able to
control your privacy settings. Microsoft recently launched a web-based privacy dashboard tool and this
has now become available to everyone in the Creators update.

The Privacy Dashboard


The privacy dashboard is web-based rather than in the settings and it allows you to manage multiple devices from a single
interface, as long as you are logged in to a single account.

1 Open your browser and navigate to www.account. 3 Click on one of the main categories, Search, Browsing,
microsoft.com/privacy. If prompted, use your Microsoft Location or Cortana, and you will see more information.
account details to log in. You will be logged in to the privacy This could include a list of searches you have made or websites
overview page that lets you quickly see what privacy settings visited (in Edge only, not other browsers), interests Cortana has
the dashboard contains and controls. saved for you or locations you have been.

2 Along with the main Search, Browsing and Location 4 Each section has a Clear button, whether that is
privacy categories, if you scroll down to the bottom of the clearing browsing history, search history and so on. It is
page you will see entries for everything from Apps to Xbox, with next to a warning that states clearing data will stop Windows
simple links to take you to the settings and options for those being able to provide you with accurate and relevant
privacy areas. information. You need to decide what is more important,
privacy or recommendations.

122 www.bdmpublications.com
Manage Your Privacy in Windows 10

5 Another useful privacy section in the dashboard is the 6 There is also a browser tool that lets you choose if
Advertising Preferences. This lets you control whether the adverts you see come from companies other than
personalised adverts are shown to you in the Edge browser. Microsoft. Click the option under More Choices and wait for the
Some of the ads you may receive on Microsoft websites and Digital Advertising Alliance scan to finish. You can then choose
apps are tailored to your previous activities and searches. from the list to see adverts from different advert providers.

Privacy Settings
There are, of course, still privacy options in the main Settings app in Windows 10. This is generally added to and improved
with each OS update.

General Privacy Privacy has its own section within the Account Info Apps are able to access very basic
settings; here there are many different personal settings such as your name and
categories covering everything from Location to Background account information. This is so they can sign you in
Apps. Click on each of the privacy categories to see the options automatically to your Windows account for things like Xbox Live
within that category. Use the slider switches to allow or block or the Windows Store. You can turn this off wholesale or on an
privacy actions. app by app basis.

Messaging Apps We’re using Windows 10 on a laptop Background Apps You can control which apps you
here but if we had a tablet with a SIM allow to run in the background. If
card we would be able to get control over which apps were able you’re on a laptop or desktop this probably won’t be that big an
to send messages over SMS and MMS. You probably want this to issue, but you may want to turn these off on tablet devices to
be restricted to just your Messaging app; most apps really conserve power. Some apps you may not use, like Get Office,
shouldn’t have access to your texts. really don’t need to run in the background.

www.bdmpublications.com 123
Windows 10 Security, Maintenance & Performance

Protect Devices
on Public Wi-Fi
There are few places where you can’t now find a wireless connection for your laptop. And while this is
great for those of us that want to stay connected day and night, accessing Wi-Fi in a public place does
bring with it some dangers not found on your home network.

What Makes Public Wi-Fi Unsafe?


The very same features that make publicly accessible Wi-Fi hotspots desirable for you and us, such as the lack of
authentication needed to connect, also makes them desirable for hackers.

Let us start by saying that not all public Wi-Fi is equally unsafe. A file-sharing across a network then public Wi-Fi connections can be
coffee shop that has a new Wi-Fi password chalked up on the board used to distribute malware. This malware could hide itself on your
every day is probably safer to use than one where the password has device and cause all sorts of problems, from logging keystrokes to
been the same for five years, but not by much. As a rule of thumb, sending spam emails to contacts as if they are
you should assume that any network connection you do not control from you.
will have fewer defences against interception and should be treated
as unsafe. As the use of public Wi-Fi increases, you can expect the number of
different ways hackers can find to attack those using it to increase, as
Hackers are able to insert themselves (virtually) between your device well. That doesn’t mean you need to stop using Wi-Fi Hotspots, you
and the network connection point, so all of the information sent to just need to ensure that you are not the easy target most hackers are
and from the network passes through the hacker, who then passes it looking for.
on. As this information passes, it can be collected without you even
knowing it has passed through a third party device. If you want to stay connected, but also want to keep yourself and your
device safe, there are a few simple things you can do to tighten up
Even if a hacker doesn’t want to farm your data directly, if you allow security without compromising your Internet access.

124 www.bdmpublications.com
Protect Devices on Public Wi-Fi

Five Ways to Make Public Wi-Fi Safer to Use


Following any one of these steps will increase your security when using public Wi-Fi. Using all of them will make your PC
many, many times safer and more secure.

1 Keep Your Device Updated Software updates, as well


as providing new features,
will often include security updates, so it is important to make sure
all of your device software is the most recent version. This includes
apps and programs, as well as OS updates.
Almost all modern devices, from your laptop to the smartphones
and tablets you use, make it very easy to keep things updated,
often alerting you to the availability of an update or processing
updates automatically.

If you have turned off automatic updating on your device (and


don’t want to turn it back on in the settings), make a point to
regularly check for them yourself and of course apply them, as
soon as possible, especially on devices that may be used to
connect to public Wi-Fi.

In Windows 10, you can find update information in Settings >


Update & Security > Windows Update. If updates are available to
download, they will be displayed here (along with any previous
failed updates, etc.).

2 Turn Off Sharing Your PCs, phones and tablets are


designed to interact easily with other
devices you own, using a system known as Sharing. Sharing, as the
name suggests, allows data or files to be shared or accessed from
devices on the same network. This is normally perfectly fine when
all of your devices are connected to your home network, but not so
fine when you are connected to a public Wi-Fi hotspot.

When using your devices online in public, you should always turn
Sharing off. This can be done in System Preferences (on a Mac), in
Network and Sharing (on a Windows PC). In Windows, you can also
just select “Public” when asked about a new network connection.

Many mobile devices also allow you to turn off Network Discovery
or Device Visibility, meaning it is hidden from other devices
connected to the same network. You can normally find this option
in the Connections or Wi-Fi settings.
In Windows 10, you can find further sharing options in Settings >
System > Shared Experiences.

www.bdmpublications.com 125
Windows 10 Security, Maintenance & Performance

3 Use a VPN A VPN, or Virtual Private Network, is a great 4 Install and Maintain Antivirus Software
way of protecting yourself and your device
from hackers. They are becoming increasingly popular and Having a good Antivirus package installed is extremely
therefore increasingly cheap and easy to use. important, even if you only ever use your device in your own
home and even more important if you regularly use public
A VPN provides you with a secure, private and encrypted Wi-Fi hotspots.
network to log in to, from your device. Any data sent to and from
your device is then encrypted by the VPN at both ends (known Many modern antivirus packages offer browser protection,
as end-to-end encryption). Anyone trying to access your data helping you to identify malicious websites before you click a
would need the encryption key to decode it. single link on them. They also make it very hard for hackers to
install malicious software on your device remotely, by offering
There are hundreds, if not thousands, of VPN services available, improved firewalls and malware scanning.
for computers, smartphones and tablets. Some of these are free
and others charge a small monthly fee, depending on the level Notably, it is not enough simply to have antivirus software
of security offered. Even a basic, free VPN is better to have than installed. You also need to make sure that it is regularly updated
no VPN at all! with the latest malware definitions, so that it knows about the
latest threats and is able to counter them effectively.
Once the VPN is set up, all you need to do is log in to it from the
device you want to protect before using the public Wi-Fi Some of the biggest names in Antivirus software include:
connection as you normally would to browse the Internet, send Norton, McAfee, Symantec, Bitdefender and Kaspersky, all of
emails, etc. whom offer a range of packages for home and business. You
can also find very good, free software from the likes of AVG,
Panda Security and Avast.

5 Use Only SSL Connections Many of


the biggest,
frequently used websites, now use SSL connections
(particularly since Google suggested that websites
not using the HTTPS protocol would be flagged
as unsafe and potentially appear lower in the
search results).

As a general rule, even when not browsing through


public Wi-Fi, any websites you use regularly and
that require you to log in or enter your credentials,
should be set to “Always use HTTPS”. Most websites
that ask for details about you have an HTTPS
option somewhere in their account settings (if they
don’t already force HTTPS across the site).

This might not seem as important on a videogame


forum as it does on a banking website, but hackers
are aware that people use the same passwords
over and over again, so seemingly “safe” websites
can be a goldmine of information about you for
those clever enough to realise it.

126 www.bdmpublications.com
Protect Devices on Public Wi-Fi /Best Antivirus Software

Best Antivirus
Software
While the built-in Windows Defender is a great antivirus and security tool, it’s nowhere near as capable
as one of the many third-party security suites. The likes of Bitdefender, McAfee and Symantec have
years of security specialism behind their products.

Better Protection
A third-party security suite offers much more than virus scanning. With one of these, you’re covered against most, if not all,
digital threats. Here are four security suites worth considering if you’re serious about your digital protection.

Bitdefender Bitdefender Total Security 2020 is the Symantec Norton Security Premium is the top choice
latest security suite from one the world’s for the home user from Symantec. With it you
leading security specialists. This version offers unrivalled levels of can protect up to ten PCs, Macs, smartphones or tablets and
protection and performance for Windows, macOS and Android it will keep you safe when shopping online, general surfing or
platforms. There’s even an advanced ransomware protection conducting transactions.
element to help protect your folders.

McAfee McAfee Total Protection offers a 100 per cent Webroot Out of the three possible solutions available
guarantee of virus removal, or you get your money from Webroot, Webroot Internet Security
back. There are three main versions available: Antivirus Plus, Complete is the one for home users to consider. With it you’re
Total Protection and Livesafe; each has its own particular twist protected from virtually any threat, as well as getting 25GB of
but all offer excellent security features and benefits. secure online cloud storage.

www.bdmpublications.com 127
Windows 10 Security, Maintenance & Performance

SCANNING FOR VIRUSES


The basic option is to perform a Quick Scan. If you click “Scan
options”, you will see additional ways to scan your PC.

Quick Scan This checks folders in your system files


where threats are most commonly found
and should only take a few minutes to complete.

Full Scan This will check ALL files and programs on


your system hard disk, however as it’s a much
longer process, it can take an hour or more to complete.

Custom Scan A custom scan allows you to choose


(once you click “Scan now”) exactly
which files or folders you want to check for threats. The time
this takes varies depending on how many locations you scan.

Virus Definition Updates Windows Defender should


Offline Scan Some malicious software is very difficult automatically check for
to shift, reinstalling itself as soon as it is and download new virus definitions (how it knows what to
removed. To combat this, Defender can perform an Offline look for when scanning) as long as you have an active
scan, using up-to-date virus definitions. This can take 15 Internet connection, although you can check for updates
minutes or more and will automatically restart your PC. manually if you need to.

Scheduling Scans
Even though Windows Security is regularly scanning your device to keep it safe, you can set what time and how frequently the
scans occur.

1 In the Taskbar 2 In the top centre pane, select Windows Defender


search box, type, Scheduled Scan. Select the Triggers tab and then select
“schedule tasks” and in New. Set your time and frequency and then select OK. Windows
the list of results, select Defender will now scan your PC regularly at that time until you
Schedule tasks. In the left come back here and disable the schedule.
pane of the window that
opens, expand Task
Scheduler Library >
Microsoft > Windows and
then scroll down and
select the Windows
Defender folder.

130 www.bdmpublications.com
Windows Defender - is it Good Enough?

RANSOMWARE PROTECTION
Defender now includes Ransomware protection. It does this by
allowing you to set up controlled folder access, protecting files,
folders and memory areas on your PC from unauthorised
changes by malicious or unfriendly apps or software.

Enabling this is very straightforward, first access Windows


Defender > Manage ransomware protection and click the slider
to turn on Controlled folder access. Once switched on, you can
view the Protected folders (and add new ones) before choosing
the apps that are allowed through the controlled access.

You can also set a OneDrive account to act as a data recovery


drive in the event of a ransomware attack. Files backed up to
this cloud drive should then be accessible and recoverable. You
can click “View files” to open your OneDrive folder and see
which files and folders are currently backed up.

NETWORK FIREWALLS
As with the Antivirus, the standard firewall for Windows 10 will be
active, unless you choose to enable a third-party firewall (such as
the one included in McAfee Total Protection). Head in to the
Firewall section in Windows Defender and you will be able to see
which type of firewall is active (usually Private Network on a
home PC). Click on this and you can see which network is being
secured along with the slider to turn off the firewall.

Back on the main screen of the Firewall information, click


“Manage providers” to see exactly which firewall software and
antivirus software, is in use. You will also see a link to “Find
security apps in Microsoft Store”.

Even if you decide to install a third-party firewall, you can and


should, choose to keep Windows Firewall running as well. There
is usually no problem running two firewalls on any network.

APP, BROWSER AND EXPLOIT PROTECTION


In Windows Defender, SmartScreen handles the protection of both the apps
and the browser. SmartScreen analyses webpages as you visit them and looks
for suspicious behaviour, it also compares the site against a dynamic list of
reported phishing (or other malicious) websites. If it notices anything
suspicious, it will warn you in the browser.

SmartScreen does a similar thing when you are downloading or installing


apps, checking the files against a list of reported malicious software and a list
of well-known downloaded (and safe) software. If the software isn’t on the list,
you may also see a warning.

Exploit protection is also built-in to Windows 10, helping to protect your PC


against attacks. Exploit Protection is on by default, but you can turn it off (or
different parts of it) by going to Windows Defender > App & Browser Control >
Exploit Protection settings. You can then turn off things like Control flow guard,
etc. However, we advise leaving all exploit protection on and untouched.

www.bdmpublications.com 131
Windows 10 Security, Maintenance & Performance

Device Performance
& Health
Device performance & health in Windows Security helps
you keep your devices refreshed and up to date with the
latest version of Windows 10. In Device performance &
health, you’ll have the following features available:

Health report Tells you if there are any issues impacting the
device health, such as: storage capacity, devices,
battery, or ability to update to the most recent version of Windows. It
also provides recommendations to help resolve these issues.

Windows Update Tells you whether you’re up to date with your


version of Windows and if you aren’t, alerts
you with details about specific issues that could be causing your device
to not install updates.

Storage capacity Checks if your device has enough space to


update Windows and alerts you if there’s a
recommended action.

Device driver Checks the drivers on your device to see if they’re


functioning properly and alerts you if there’s a
recommended action.

Battery life Checks the impact of the brightness level and sleep
settings on the battery life and alerts you if there is a
recommended action to maximise your battery life.

Fresh start Lets you perform a clean reinstallation and update


of Windows while keeping your personal data and
most Windows settings intact. In some cases, a clean installation may
improve your device’s startup and shutdown experience, memory
usage, Microsoft Store apps performance, browsing experience and
battery life. Bear in mind Fresh start will remove most of your apps
from your device.

132 www.bdmpublications.com
Device Performance & Health/Online Safety Tips

Online Safety Tips


Keeping yourself safe online is about more than setting and forgetting Windows Defender. Here are
some simple and easy-to-follow online safety tips, which will help you keep your information and your
computer safe from the more common online security threats.

Do Your Homework Before Buying Online While Password Managers For most people, keeping a
the written list of their passwords is
majority of online retailers are perfectly reputable, there are a perfectly okay as long as you make sure that it is not left in plain
few that are less than honest. If you’re not sure you can check sight on your desk, etc. Even keeping a text document on your
out the company’s reputation on shopper comparison sites computer with you passwords listed is not usually a risk; just
such as Pricerunner or Kelkoo or simply type the name into don’t call the file ‘Passwords’ and leave in on the desktop. A
Google along with terms such as “fraud”, “rip off” or “complaint”. much safer way is to use a good Password Manager. These
See what others have been saying about them and if they have simple bits of software let you store your passwords in a locked
a lot of negative feedback then take your money elsewhere. file on your computer. As long as you have a very good password
to get into the manager, your other passwords will be safe. You
then only need to remember one password, instead of 10 or 20.
Lastpass is a very good and free example of a password manager.
Read Your Bank Statements Whether you have
printed statements or
you do all of your banking online, it’s a good idea to check your
bank and credit card account regularly. If you see any suspicious What are Cookies? Cookies (or HTML Cookies) are small
payments that you don’t recognise, contact your bank and get files used by websites to recognise
them to look into it. Most credit cards offer protection against individual users; or rather, recognise their computer. When you
online fraud but they can only act on it if you report it. visit a website, a cookie is stored in a temporary folder on your
computer. When you next visit that site, the cookie will be checked
for. Different sites use cookies to store different information but a
good example is information in a form being automatically filled
If it Sounds too Good to be True... If you receive an
when visiting a site you have used recently to order something.
email, text or
chat message telling you that you’ve won millions on a lottery Almost all modern browsers, including Internet Explorer and
you’ve never entered, that a deceased relative you’ve never Chrome, allow you to block cookies from being downloaded.
heard of has left you a fortune or that some foreign businessman However it is worth remembering that many websites now
wants to move a huge sum of money and needs your help to do need cookies to work properly and so blocking them could
so, don’t bother replying; simply delete the message at once. mean your browsing experience is a frustrating one. Cookies are
This type of scam is known as an “advance fee fraud” or 419 nothing to be afraid of; they are simply used to make the Internet
scam, after the Nigerian penal code law that it contravenes. work better.

ONLINE PASSWORD TIPS


It can be tempting to use the same or similar passwords for things someone will try to get into your accounts. Also avoid, if
several different websites or apps. This can be a bad idea, possible, using real words or sequential strings of numbers (e.g.
particularly if your chosen password is something easy to guess 123456789).
such as your name or date of birth. Here are a few tips to
consider when creating passwords. 3. The Longer, the Better
Short passwords are much easier to crack than long ones, so be
1. Keep them Unique sure to avoid anything less than eight characters and, if
Having a unique password for each website or app you are possible, go for something at least ten characters long. There
required to log in to is a very good idea, particularly for things are 4000 times more possible combinations of ten letters and
like email and online banking. Although security on a banking numbers than there are for eight letters and numbers.
website is likely to be very good, if you use the same password
on a website with less stringent security, you risk it being 4. Use a Mixture
compromised on one and used to gain access to the other. Once you start adding in symbols and mixed case letters, along
with numbers, into your passwords, the possible variations rise
2. Keep them Random to over 6 quadrillion (for an eight character password). The
Try to avoid using anything that is easy to guess, including password A1z7yDbP is many thousands of times more secure
personal information like your name, date of birth or address. than a1z7ydbp.
These things are all very easy to discover and often the first

www.bdmpublications.com 133
Windows 10 Security, Maintenance & Performance

Blocking PUPs with


Windows Defender
PUPs, Potentially Unwanted Programs, are bits of software that can sometimes be stealthily installed
when you install other free software, usually by making it a default installation option with the choice
to opt-out. You can block these unwanted programs automatically using Windows Defender.

Enable PUP blocking


PUPs can include toolbars, browser extensions, adware and other unwanted software. In almost all cases, this software
should be called DUPs (Definitely Unwanted Programs).

1 You can enable PUP protection with System Centre Config 3 The PUP blocker is now enabled on your PC. You will not
Manager, PowerShell or Microsoft Intune. For this guide, see any new options displayed in Windows Defender
we’ll be using the PowerShell, as this is available within Windows but you will see “Potentially unwanted software” listed once
10 without installing any additional software; as long as you something is blocked. If you want to disable it in the future, just
follow the instructions carefully, it isn’t as scary as it sounds. run the above command again, replacing the 1 with a 0.

2 To access the PowerShell interface, right-click the 4 PUPs are blocked when a user attempts to download or
Start button or press Windows+X and click Windows install a suspicious file or if the file meets one of these
PowerShell (Admin) to open a window. Type the following conditions: the file is being scanned from the browser, it is in
command at the prompt (without the quotation marks) a folder with “downloads” in the path; or it is in a folder with
“Set-MpPreference -PUPProtection 1” and press Enter. “temp” in the path. The file is placed in the quarantine section.

134 www.bdmpublications.com
Blocking PUPs with Windows Defender/Using Windows 10 Dynamic Lock

Using Windows 10
Dynamic Lock
One of the earlier Windows 10 updates introduced Dynamic Lock. This allows you to have more control
over the security of your Windows device, with even less effort. It is designed to detect a trusted device
nearby and then lock or unlock the computer as it either moves away or comes close.

Setting Up Dynamic Lock


Dynamic Lock works by sensing the proximity of a paired device, such as the smartphone you have in your pocket. In this
example, the first thing we need to do is pair with our phone. Pairing with other Bluetooth devices will be almost exactly the
same as shown here.

1 Dynamic Lock will only work if your PC has Bluetooth 3 Go to Settings > Accounts > Sign-in Options and scroll
connectivity. This usually means a laptop, which makes down to see the Dynamic Lock section. Check the box
sense as these more portable devices are more in need of that says ‘Allow Windows to detect when you are away and
security measures. Open Settings > Devices > Bluetooth & Other automatically lock the device’. Hopefully, assuming Bluetooth is
devices. Turn Bluetooth on using the slider switch and do this working, that is all you need to do to start using the feature.
on your phone as well.

2 Once you see the phone listed under available devices, 4 Dynamic Lock does have some limitations at the moment,
select it and pair to it. If you can’t see your device listed, although these might be ironed out. The lock will not
you may need to update your USB drivers for your PC: look kick in until 30 seconds after it detects the Bluetooth signal has
for Bluetooth USB Module in Device Manager. Once paired moved away, and if someone jumps on your computer within
successfully, you are ready to begin setting up and using that time and starts to use it, it doesn’t activate at all.
Dynamic lock.

www.bdmpublications.com 135
Windows 10 Security, Maintenance & Performance

Create a Windows 10
System Image
Backing up your files is perfectly fine, but in the event of having to wipe your hard drive and start again,
getting everything back in order can be time-consuming. However, creating a system image means you
can almost instantly restore the entire system.

System Imaging
A system image is essentially a snapshot of your entire system. This can then be quickly restored and conveniently saves you
from having to reinstall Windows 10, all your programs and your data.

1 To begin, click on the Windows Start button and navigate 3 Windows now scans your system for a drive capable of
to Settings > Update & Security > Backup. From within the housing the system image files. You may need to make
Backup console window, where you were in the previous tutorial, some changes to any drives according to what messages you get
click on the Go to Backup and Restore (Windows 7) link under the back from the scan. In this example, the drive we’re using needs
Looking for an older backup section. to be formatted as NTFS before Windows 10 can use it.

2 This launches a new window, the Backup and Restore 4 Providing you’ve met the requirements, you’re offered a
(Windows 7) console. Microsoft has kept this feature intact choice of to where the system image can be written. A
through Windows 8.1 and 10 purely due to compatibility support drive is the quickest solution when it comes to restoring the
for backups created under older versions of the OS. To the left, image, but you can opt for DVDs; it depends on the size of the
there are two links, click on the Create a system image link. image as to how many DVDs you need. You can even select a
network location.

136 www.bdmpublications.com
Create a Windows 10 System Image

5 For this example, let’s use an internal second hard drive. 8 Once the process is complete, Windows will ask you to
Make sure that the correct drive (it could be a high create a System Repair Disc. This disc allows you to boot
capacity USB stick or even a portable USB hard drive) is selected, into the environment where you are able to launch the system
and then click the Next button to continue. image restore.

6 The next window displays the drives included in the 9 If you click Yes to creating the System Repair Disc, you
system imaging process. In this example, the C:\ drive, the need to make sure you have a blank DVD to hand. Follow
System drive and the System Reserved partition are all to be the on-screen instructions and click on the Create Disc button
backed up. When it comes to restoring the system, you’ll need to burn the repair files to the disc.
both partitions for Windows 10 to be able to boot up correctly.

7 When you’re ready to continue, click the Start Backup 10 Should you need to restore Windows 10 from the
button. This begins the imaging process, which can take system image, you can boot into the System Repair Disc
some time depending on the amount of space used on the C:\ and select the System Image Recovery option from within the
drive and the speed of the drive to which you’re writing. Allocate Advanced Options of the Trouble Shoot menu. Follow the
ample time if you’re writing to DVDs. instructions, and within minutes, Windows 10 is back as it was
when the system image was taken.

www.bdmpublications.com 137
Windows 10 Security, Maintenance & Performance

Improving the
Windows 10 Firewall
The built-in Windows 10 firewall is a surprisingly good security application. While it may not be as
efficient as something offered by one of the third-party security suites, it’s certainly more than
adequate for the average user and should be seen as the first line of defence against harmful attacks.

Getting to Know Your Firewall


Generally, there’s little need to ever configure the Windows 10 firewall. However, getting to know how it works and improving
it is part of being more security-conscious. Here’s some tips on how to manage it better.

1 You can open the 3 Down the left-hand side are some links that will help you
main Windows 10 configure and improve the firewall, as well as turning it on
firewall console window by or off (which isn’t recommended under any circumstance other
clicking on the Windows than the installation of an improved third-party firewall). To
Start button and entering begin with, start by clicking on the Advanced Settings link.
firewall into the search box.
Click the returned link,
Windows Firewall Control
Panel, to launch it.

2 The Windows 10 firewall console window starts by 4 The Advanced Settings link launches a new console
detailing the basic status of the firewall. It should be On window. This new console defines the inbound and
by default, unless you’ve installed a third-party security suite outbound rules for the entire system and its installed programs
which contains its own firewall. There are two kinds of network and applications. You can set authentication rules between
listed, Private and Public. Private is for home or work, whereas computers, view and create new firewall rules, view the
Public is for cafés and the like. current firewall policies and even monitor what’s being blocked
in realtime.

138 www.bdmpublications.com
Improving the Windows 10 Firewall

5 Click on Inbound Rules to the right-hand side of the main 8 Sometimes, uninstalling a program doesn’t automatically
console window. This will list the current rules that allow remove it from the Windows firewall. The exact reasons
traffic into your computer and to the applications that require it. why are varied but to help improve the efficiency of the Windows
For example, in this screenshot there are rules for various games firewall, whenever you remove a program from your system, it’s
that allow multiplayer interaction and the ability to ‘talk’ to the worth checking the firewall to see if its entry has been deleted. To
game server as well as install updates. delete an entry, right-click then select Delete from the menu.

6 These rules are automatically entered into the firewall 9 You may not
when you install the program, game or app. When you want to
install a program you’re required to accept and authenticate the delete a rule as it
process, clicking on Yes to start the installation. This level of could be used later
administrative access also allows entry of the program into the or if you reinstall
firewall. Pick one of the entries and double-click it. the program and it
fails to recreate the
firewall entry. The
recommended
process then is to
block the rule from
communicating
with the outside
world. To do this,
double-click the
rule and from the
General tab click
the Block the
connection button.

7 The properties 10 Similarly, the Outbound Rules link will detail the various
of each firewall programs that are allowed to communicate from your
entry allow a greater computer to an external destination. It’s good practise to
degree of control for familiarise yourself with the rules of the firewall, as a rogue
that particular program will need to set a rule to communicate. You can then
program. You can block that rule and stop the threat from reporting back.
change the name of
the entry, allow or
block the connection,
define the physical
location of the program
on your computer,
allow access to the
program from remote
computers, set the
protocol and port
number it uses and
even which network
controller to use.

www.bdmpublications.com 139
Windows 10 Security, Maintenance & Performance

How to Remove Malware


from Windows 10
Previously we have looked at ways to prevent being scammed or indeed getting malware on your
system but what if you’re unlucky enough to already have some form of digital infection? Thankfully
there’s a way to remove malware and viruses from your computer.

Malware Busters
For this tutorial let’s use a preconfigured rescue disk from Bitdefender. You need to transfer or burn the disk contents to a CD
or a USB stick and boot into the safe environment through one of those mediums.

1 Make sure you have a blank CD or a USB stick that’s at 3 Click the Next button and using the drop-down menu
least 1GB in size. The Bitdefender Rescue Disk is next to Removable Drive choose the drive letter of your
downloaded as an ISO, which is an image file containing all the USB stick. Click Next to start the transfer of the image. Once the
disk information, and can be downloaded from www.download. image is transferred, click the Finish button, remove the USB
bitdefender.com/rescue_cd/latest/bitdefender-rescue-cd.iso. stick and power off your computer.

2 To transfer the ISO to USB, download Stickifier, which is an 4 If you’re using a CD, start by inserting the CD into the
executable that doesn’t require any installation. Insert your drive. Locate the downloaded Bitdefender Rescue ISO,
USB stick and double-click Stickifier. Click the Select an Existing right-click it and choose Burn Disc Image from the context
ISO Image option followed by the three full-stops and using menu. Tick the Verify disc after burning option and click the
Windows Explorer, locate the downloaded Bitdefender Rescue Burn button to start the process. Once the ISO is burnt to the
ISO. Click the Open button to select the image and continue with disc, you can power off your computer.
the process.

140 www.bdmpublications.com
How to Remove Malware from Windows 10

5 You now need to allow your PC to boot up into the 8 You need to accept the license agreement notification
Bitdefender Rescue CD environment. Power up your PC first, so tick the ‘I agree’ box, followed by the Continue
and open the Boot Option Menu; this could be accessed by button. The virus scanning software will then start to
pressing F12, depending on the make and manufacturer of your automatically update itself with the latest virus definitions from
PC motherboard. With the boot options available, select either the Bitdefender servers. The process won’t take too long, so let
the CD or USB stick and press Enter. it run through the update.

6 The PC will now boot into the Bitdefender Rescue Disc 9 Once the update is complete you’re taken to the main
environment. This is a custom Linux operating system Bitdefender Rescue CD antivirus interface. The three main
with all the necessary Bitdefender security tools preinstalled. options: Scan Now, Update Now and Settings are fairly
First, you need to choose which language to load the self-explanatory; the Settings allows you to set a few more
environment. Use the arrow keys and press Enter for your options regarding the scan but the defaults will suffice.
language choice.

7 Ideally you should use a wired Internet connection but if 10 To remove a virus on your PC, click on the Scan Now
you’re on wireless, click on the network icon in the button. Select the drive you wish to scan and click the
bottom right of the desktop to establish a connection with your Open button to commence scanning the system. Any viruses
router. Once you’re connected to the Internet, double-click the found will be detailed along with options for removal. The
red Bitdefender icon on the desktop, labelled Antivirus Scanner. process may take some time, so be prepared for a lengthy wait.

www.bdmpublications.com 141
Windows 10 Security, Maintenance & Performance

What is a VPN?
Your system may be secure to any online threats, but it doesn’t always mean your privacy is assured,
especially when using an unfamiliar network (e.g. public Wi-Fi). This is where a VPN comes in, as it
offers the user a heightened level of anonymity when online and therefore another level of security
and protection.

Virtual Private Network


Using a VPN can help hide your online presence. Whilst this may seem like an ideal way to get to illegal content, it’s actually
designed to help fight for your basic right to Internet and digital privacy.

Essentially, a VPN (Virtual Private Network) is a server or group of Most operating systems come with the ability to connect to a
servers in a remote location that you can connect to through a VPN through their network settings. If you have the network and
client. The VPN servers then hide your Internet-bound IP address connection details of the VPN in question, then you’re able to
with their own, so if you connected to a VPN that’s located in connect to it using the built-in Windows 10, Linux or macOS options.
Australia then your IP address would be as if you were actually sat However, the more common, and in some respects, easier method,
at a desktop down under. is to use the client which most VPNs now offer as standard. The
client is often simply a connection window that will ask you your
The benefits of this are many but mainly a VPN will allow you to
login details, then provide a method of allowing you to connect to
access region restricted websites, protect you from tracking and
any of provider’s geo-location servers, listed by country. Once the
shield your browsing activities from those who want to find out
choice is made, you simply click the connect box and within a few
where you are personally based. Obviously there comes a negative
seconds your IP address will be located within the chosen country.
side, in the form of being able to access content that your country
has deemed illegal for some reason but on the positive, VPNs have There are plenty of VPN providers to choose from and we’ll look at
allowed people in countries with extraordinarily tight restrictions ten of the most popular in a while. Some offer a free connection
to get access to the outside world; often enabling them to report on service that’s handy for quick browsing but isn’t very fast. To gain
what’s going on in their own country to the world. access to faster servers, with better security and protection features
you need to pay a monthly or annual subscription fee. Thankfully it’s
However, for most users having a VPN means they’re able to gain
not a lot, for the most part: you’ll be expected to pay in the region
access to TV channels in the U.S., Canada, Europe and other parts
of £5 to £15 per month. This grants you better coverage and the
of the world. It’s not always about being able to moderately ‘cheat
ability to use up to five or more different devices, including tablets
the system’ by forcing the Internet to think you’re somewhere else
and phones.
other than where you actually are though. Remote workers and
employees who live in other countries can connect to company Over the coming pages we dig a little deeper into VPNs, as you
VPNs and be able to use the company’s network resources as if they can imagine, using one will significantly improve your protection
were physically sat in the building. when online. In terms of Windows 10 security, the use of a VPN
is quickly becoming vital, so by the end of this chapter you’ll be
The connection from your computer to the VPN server, via the
knowledgeable and helpfully utilising one to your own advantage.
client, is usually secure to the tune of 256-bit encryption levels,
depending on the VPN company
who is hosting the service.
All your Internet traffic will “A VPN isn’t just used to get access to foreign online
filter through the VPN server’s services, it can be used by remote workers to access
systems, offering multiple layers head office as if they were in the building”
of protection from viruses,
malware and privacy. Beyond
the other possible scenarios,
using a VPN whilst you’re
abroad, working in a hotel for
example, will enable you to
access your home country’s
services and work resources.
One more element that’s worth
mentioning is that using Wi-Fi
hotspots is one of the biggest
security risk for travellers; using
a VPN can effectively improve
your security whilst using a
café’s free Wi-Fi.

142 www.bdmpublications.com
What is a VPN?

“You’re able to access


web pages and Internet
services from all over the
world, even if you can’t
from your own country.”

“A VPN greatly improves


security for devices and
when you’re using free
Wi-Fi at cafés and other
such locations.”

“Using a VPN will


protect your access
online and filter
all your Internet
traffic through its
secure service.”

www.bdmpublications.com 143
Windows 10 Security, Maintenance & Performance

How a VPN Can Improve


Windows Security
We’ve emphasised the enhanced privacy that a VPN offers when you’re connected to its services, and
the heightened levels of anonymity, but what security benefits does a VPN bring to a Windows 10
computer with an antivirus program already installed?

Security Beyond Anonymity


It’s a good question: how can a VPN improve Windows security? While the privacy side is well catered for, there are some good
security enhancements and features a VPN brings to the table.

Hide Browsing Activity This doesn’t happen often, Webpage Filtering To expand the previous feature,
but an ISP can become VPNs filter web pages that are
compromised and details of user activities leaked or stolen. dangerous or contain threats. Even with a good antivirus client
Using a VPN can hide your browsing activity from trackers and installed, you can still access a dangerous site. Using a VPN
even your ISP, enabling you to browse without the fear of prevents the site from even being loaded.
having your details leaked or accessed by others.

Anti-malware Protection Many VPN providers utilise a Connection Encryption The connection between you
level of antimalware into and the VPN server is
their security layers. This enhances your security by filtering any encrypted to the highest possible standards. This makes it near
downloads through the VPN first. Should there be a virus present, impossible for some external element to gain access to the data
then it can be removed or stopped at the VPN before it even you’re transmitting. Online banking and shopping are extremely
reaches you. secure with a VPN.

144 www.bdmpublications.com
How a VPN Can Improve Windows Security

Public Wi-Fi Protection Public and free Wi-Fi hotspots Advert Blocking Most VPNs also add an extra layer of
are notorious when it comes to security whereby they actively block
mobile security. Anyone with a little knowledge and some free any advertising from websites. Internet ads are a necessary evil
tools via the Internet can intercept public Wi-Fi networks and in some ways, as they provide much-needed funds for your
hijack your connection, revealing all your data. A VPN encrypts favourite freely available websites. However, some contain
the data and protects you. malicious content and need to be blocked.

Secure Communication If you’re working abroad, or Force HTTPS Using HTTPS instead of HTTP utilises the
you’re a remote worker, a VPN secure side of the Internet protocol. Sadly,
connection to the company’s servers ensures that all the it’s not always implemented either in browsers or by users.
sensitive business data remains secure. It’s difficult for a Many VPNs force all websites to use the secure connection that
company to ensure 100 per cent security with mobile and off-site a HTTPS site offers, thereby enhancing your browsing security.
workers, but a VPN provides a secure tunnel straight to the
company itself.

Mobile Protection Private Browsing Logs In some countries, data


retention laws are quite
The availability of iOS and archaic, meaning governments and other bodies are able to
Android VPN clients means access your data log for as long as you’ve been able to access
that your call data and data the Internet. A good VPN won’t detail any logs of your browsing
stored on your device is and in most cases won’t even hand over any personal
also secure. Mobile VPN information relating to you to other agencies.
apps use the same levels of
protection and security, so
your data can’t be stolen
when you’re not even
aware of it.

www.bdmpublications.com 145
Windows 10 Security, Maintenance & Performance

Backup with a
Recovery Drive
A recovery drive is a useful way to ensure that you don’t lose everything on your PC in the event of a
critical malfunction. It can help you both troubleshoot and fix problems, even if the PC won’t start as it
normally would. All you need is a blank, formatted USB flash drive.

Protecting Your PC and Files


Creating a recovery drive is a relatively simple process. It does however take a bit of time to create but it’s worth the effort as
it could save you a lot of frustration in the future.

1 The first thing you need to do is find a USB drive that is 3 Your USB drive needs to be wiped of everything currently
large enough and then make sure it is ready to be used. on it before the recovery drive is created. You can do this
The USB drive you decide to use won’t be able to be used for during the set up process later or you can format it yourself right
anything else like storing other files, etc. so make sure it is a now: a useful thing to know how to do. Insert your USB drive
spare, or bought specifically for the task. into a free USB slot on in your computer.

2 A basic Windows 10 recovery file will be less than 500MB 4 Open the File Explorer on your computer and you should
but if you choose to include system files in the backup see the USB flash drive listed in the sidebar. It will
(recommended), so you can use it to reinstall Windows, you will probably be labelled as the (E:) or (F:) drive. Right-click on the
need much more space. A basic recovery drive can be as small as drive label and select Format from the action menu. Leave the
1GB but a full recovery drive needs to be at least 8GB. settings as default (should be FAT32) and then click Start.

146 www.bdmpublications.com
Backup with a Recovery Drive

5 You should now be ready to create your recovery drive. 8 Click Create on the next screen and the process will
In the search field, type “Recovery Drive” and select the begin. This may take a while to complete,
Create a Recovery Drive result. In newer versions of Windows 10, so go make a coffee and leave it to run. A progress bar
you might also be able to find the Recovery Drive in the main shows how far along it is, should you need to check. Do not
apps list, opened by clicking the Start menu button. remove the USB drive, or turn off your computer, before the
process finishes.

6 Allow the software to “make changes to this PC” and 9 When the process is complete, you should be prompted
the setup wizard will open. This first screen is where to delete the recovery partition on your PC, to save some
you choose whether you want to back up system files with the space; as long as you plan to keep your recovery drive, this is safe
recovery drive, so you can use it to reinstall Windows 10. If you to do. If you are not sure, you can leave the recovery partition in
do, tick the checkbox and then click Next. place; it can be deleted at a later date if you wish.

7 After a few moments, you will be asked to select the USB 10 If you did not already have a recovery partition on your
flash drive you wish to use. If you only have one USB drive computer, you won’t see this step. You will simply be
inserted, it will be the only one shown and will be automatically informed that the recovery drive is ready, and to click Finish.
selected. You are reminded again how much storage space the Remove the USB drive from your computer and put it somewhere
drive needs, and that all existing data will be wiped. safe. It is a good idea to label the drive so it is not reused.

www.bdmpublications.com 147
Windows 10 Security, Maintenance & Performance

Manage Disk Partitions


in Windows 10
Disk partitioning is the creation of one or more separate regions on a PC hard disk (hard drive) and all
modern drives need at least one partition to begin storing files. A partition could be the size of the
whole drive or just a tiny part of it.

The Disk Management Tool


There are several free programs available for creating partitions but the Disk Management tool is just as good and built right
in to Windows 10.

1 The first thing you need to do is find the Disk 3 You can use the seemingly simple Disk Management
Management tool. The easiest way to open the tool is tool to resize, create, delete and format partitions and
to use the hidden Start button menu. Right-click on the Start volumes, as well as change their drive letters and all without
menu button and select Disk Management from the menu that downloading or paying for any other software. You can also
appears. There are several system tools here, so it is a useful simply use it to check the health of your disks.
trick to know.

2 The Disk Management tool shows all of your internal 4 The tool shows partitions and volumes, which are similar
and removable drives (even USB flash drives, etc.) along but different. A partition is space that’s set aside on a
with details of the capacity and current amount of space being disk separate from the other space on that disk. A volume is a
used. Depending how your hard drive was initially configured, partition that’s been formatted with a file system. We will mainly
you will see one or more partitions in place. be talking about volumes in this guide.

148 www.bdmpublications.com
Manage Disk Partitions in Windows 10

Resizing a Volume
If your disk is set up as one big volume and you want to create an extra partition for a second volume, you will need to know
how to resize the existing one.

1 You will need to make sure that there is enough free space 4 To create a new volume in that unallocated space,
on the drive before you can shrink a volume. For example, if right-click on it and select New Simple Volume from the
you have a 500GB volume which has 200GB of data already stored Action menu. In the New Simple Volume Wizard window, click
on it, you will only be able to shrink it by a maximum of 300GB, the Next to get started. Specify the volume size you want to create
amount of remaining space. and then assign it a drive letter on the next screen.

2 Right click on the volume you want to shrink in either the 5 You will then need to decide whether to format the
top panel or the bottom one and click ‘Shrink volume’ from partition. You will need to format it before you can begin
the Action menu. You will then need to enter the amount you using it but if you are planning on installing a second operating
want to shrink the volume by in MB. So if you wanted to shrink it system, in order to dual-boot, you will need to let the new OS
by approximately 500GB, you enter ‘500000MB’. format the partition during its installation.

3 When you have clicked the Shrink button, you should 6 Otherwise, go ahead and format the disk; pick a file
see that the disk now contains the shrunken volume system to use and assign a volume label. Click Next when
and some new, unallocated space. If desired, you could now you’re ready and then click the Finish button; Windows will now
extend the volume back into that space, by right-clicking and start to create the volume and, if you chose to, format it. When
selecting ‘Extend volume’ from the Action menu. finished, you will see your new volume listed.

www.bdmpublications.com 149
Windows 10 Security, Maintenance & Performance

Monitor Tasks with


the Task Manager
If you have a program that isn’t working, want to control what starts up when your PC does or you want
to see what’s running on your PC, then Task Manager is the place to go. Access it via the Power Menu
(right-click on Start) or by pressing Ctrl+Alt+Delete and selecting it from the Security Options menu.

Manage Your PC
Task Manager is a lot more complex than it used to be and it’s now a useful insight into your PC and app performance,
allowing you to check anything from Wi-Fi usage to app crashes and much more.

1 Task Manager starts life as this fairly unassuming little 3 You can see what system resources each app is using in
window. If you have an app that is unresponsive, select it each column. Here Excel is using around 74MB of
and click End Task. Beware that if you do this to an app with memory, for example. Memory use is almost at its maximum, as
unsaved work in it, you will lose your work. Clicking the More you can see at the top of the column. Maxed out resources are
Details button will expand the Task Manager window. no bad thing – after all your PC is there to be used – but when
apps crash, they are usually using resources and not
relinquishing them.

2 This window is a little more complex, but the ‘Apps’ part of 4 If an app crashes, then you need to select it and click End
the window is essentially what we were looking at in Step Task as before. You should always try and give it time to
1. Now the apps have been joined by background processes. recover (especially if you will lose work). Now we’ve clicked the
Your PC will most likely be running tens of these unless it’s Performance tab at the top of the window and we can see the
box-fresh. Here we’ve got 41. These are things such as Cortana, usage of important elements of our PC.
which runs in the background, and our trackpad software.

152 www.bdmpublications.com
Monitor Tasks with the Task Manager

5 Here’s our disk usage – as you can see it’s pretty active! 8 Although it’s of limited general use, the Users tab details
You will also have this if you have several big apps open what apps and processes are running on a per-user basis.
(we’ve got Edge, Spotify, Word and Excel open in this example). This might be useful if your PC is running slowly and you want to
In the previous step you could see our processor usage, and as see what resources someone else who is logged into the PC is
you may have noticed, we’ve only been using around 40 per hogging. They might have something wasteful running in the
cent of its capability during the last minute. background, for example.

6 Wi-Fi usage (you can also see wired network usage if you 9 The Details tab is really for pro users only and has full
use that to connect) is more sporadic as the network information on each running process and which user is
connection tends to be used intermittently – unless you’re responsible for it. You can also see how much resource the
copying files or similar. Here we’re streaming music, which process is taking up as well as what is called a Process ID, or PID,
appears to download in chunks. Notice there’s no data being that identifies the process on your machine.
received or sent right at this moment.

7 The Start-up tab is one of the most important in Task 10 Services are programs that run in the background. The
Manager. While you can configure an app such as Skype chances are your PC is running lots of them. For
to start-up when Windows does and disable the same within the example Windows Defender, the built-in security software, runs
app, some applications are sneaky and enable themselves to in the background as a service. As well as viewing the active
start when Windows does. Here you can select the app and services in Task Manager, you can click the Open Services link to
either enable or stop this from happening. manage services on your PC.

www.bdmpublications.com 153
Windows 10 Security, Maintenance & Performance

Fix Wireless Network


Connection Problems
It’s certainly frustrating when you’ve just sat down at your computer to browse YouTube videos or play
some online games, only to find that you have no Internet connection. If the same problem occurs
when you need to start work or finish that important essay, it can cause a ripple of panic to spread
through your body. Try to stay calm by focusing on fixing it and initially try these solutions.

1 MAKE SURE WI-FI IS ON


If you are trying to connect wirelessly, check that Wi-Fi hasn’t
somehow been switched off: click the Start button, select
Settings > Network & Internet > Wi-Fi. Next, select “Show
available networks” and if your network appears in the list,
select it, then select Connect.

If using a laptop, make sure the physical Wi-Fi switch (if there is
one) is turned on. An indicator light usually shows when it’s on
or off.

Again, if using a laptop (or Windows 10 tablet), check to see


that Airplane mode is turned off: select the Start button, then
select Settings > Network & Internet > Airplane mode and if it’s
on, turn it off.

2 RESTART YOUR MODEM AND/OR WIRELESS ROUTER


If you’ve never experienced network problems before, you may never have touched your modem or wireless router, however,
occasionally problems arise with its configuration and it needs to be reset to establish a new connection to your Internet
service provider (ISP). When you do this, take into consideration that everyone connected to your Wi-Fi network will be
temporarily disconnected.
Step 1
Unplug the power cable for the router and/or
wireless modem from the power source.

Step 2
Some modems have a backup battery, if so, remove
this and wait around 30 seconds.

Step 3
Replace the battery and plug the modem/router
back into the power socket. The lights on the
modem will blink for a few minutes as it reconnects.

Step 4
Wait until the status lights on the box stop blinking
(if any fail to come on or light up red, there is
another problem) and then try again to connect
your PC to the network.

154 www.bdmpublications.com
Fix Wireless Network Connection Problems

3 CREATE A WIRELESS NETWORK REPORT


With the simplest attempts at a fix out of the way, it is time to dig The report will contain a lot of information that will most likely
a little deeper by generating a Wireless Network Report. This be hard to decipher, but the main thing you need to look out for
takes a bit of work with the Command Prompt, but is actually are the Connection Successes/Failures, where information
nothing to be scared of and quite simple if you follow these about network connection attempts will be shown.
steps. Generating the report creates a HTML file that you can
open in your web browser (even with no Internet connection). Step 1
Click in the Search box on the taskbar
and type “Command Prompt”,
right-click on the Command Prompt
listing in the search results and then
select “Run as administrator” from the
action menu.

Step 2
In the Command Prompt window, type
netsh wlan show wlanreport.

Step 3
At the bottom of the Command
Prompt it shows where you can find
the generated report on your PC (e.g.
C:\programdata\Microsoft\Windows\
WlanReport.html).

4 PERFORM A PING TRACE


To check if the problem is with your ISP or router, rather than
your PC or software, you can perform a ping test. This tests to
see if data can be sent and received over the network. If the
ping test is successful, but you cannot connect to the Internet
on your PC, it means there is more likely a problem at the ISP
end and you will need to contact them for help.

Step 1
In the Search box on the taskbar, type “Command Prompt”,
select it in the results and then select “Run as administrator”.

Step 2
At the Command Prompt, type ipconfig and look for the IP
address listed next to Default Gateway (something like
192.168.1.2).

Step 3
Now type: “ping <Default Gateway IP>” and press Enter. It
should look something like “ping 192.168.1.2”.

A successful result should be something like this:

Reply from 192.168.1.1: bytes=32 time=5ms TTL=64


Reply from 192.168.1.1: bytes=32 time=5ms TTL=64
Reply from 192.168.1.1: bytes=32 time=5ms TTL=64
Reply from 192.168.1.1: bytes=32 time=5ms TTL=64

Ping statistics for 192.168.1.1: Packets: Sent = 4, Received = 4,


Lost = 0 (0% loss), Approximate round trip times in milli-
seconds: Minimum = 4ms, Maximum = 5ms, Average = 4ms

www.bdmpublications.com 155
Windows 10 Security, Maintenance & Performance

Windows 10
Registry Tweaks
The Windows Registry can be a scary place if you don’t understand how things work. There are often
simpler ways to action some of the changes shown below but understanding the inner workings of
your Windows 10 PC is key to understanding how to accomplish more with your screen time.

WHAT IS THE REGISTRY?


The Windows Registry is a hierarchical database that Registry .INI files stored each program’s settings as a text
stores low-level settings for the Microsoft Windows file, often located in a shared location that did not provide
operating system and for applications that opt to use user specific settings in a multi-user scenario. By contrast
the Registry. The kernel, device drivers, services, Security the Windows Registry stores all application settings in
Accounts Manager (SAM) and user interface can all use one logical repository, a number of discrete files, and in a
the Registry. The Registry also allows access to counters standardised form.
for profiling system performance. Prior to the Windows

Backing Up Your Registry


Before you edit any part of your system registry, it is always a good idea to make a backup of all keys that you intend to edit.
Here we will look at the simple and quick method of backing up Windows Registry keys.

1 You can back up any of the keys in the registry by 2 An easier backup method is to make a System Restore
right-clicking on any of them in the editor and then point that includes a snapshot of the registry. Go to Start,
selecting Export. This will save into a .reg file that can be run to type restore, select Create a restore point, select a drive and click
reapply the old value of that key at a later date. This is the Configure…; then pick Turn on system protection, set the Max
minimum backup step you should take before editing. Usage space and click OK.

156 www.bdmpublications.com
Windows 10 Registry Tweaks

Registry Tweaks
So let’s get down to tweaking some registry keys. Registry keys always start with HKEY, followed by the location in the file
system. Once you find and select the HKEY you want, you will see that further options are available.

1. Access the Editor To open the registry editor, all you 4. Disable System Tray Notification Balloon Pop-ups
have to do is open the Run prompt
with Windows Key + R, then type in regedit and hit Enter. If In Registry Editor, go to following key:
you know a certain value you want to change, you can navigate HKEY_CURRENT_USER\Software\Microsoft\Windows\
through the registry to find it by clicking the + sign next to each CurrentVersion\Explorer\Advanced
registry key.
Create a new DWORD value, name it EnableBalloonTips and
set its value to 0.disable Wi-Fi Sense and Application Telemetry.

2. Increase Taskbar Transparency In Registry Editor, 5. Hide Folders from This PC In Registry Editor, go to
go to following following key:
key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
Windows\CurrentVersion\Explorer\Advanced CurrentVersion\Explorer\
FolderDescriptions\<FOLDER-GUID>\PropertyBag.
In the right side pane, create new DWORD
UseOLEDTaskbarTransparency and set its value to 1. Substitute the <FOLDER-GUID> above with one of these:
Desktop: {B4BFCC3A-DB2C-424C-B029-7FE99A87C641}
Documents: {f42ee2d3-909f-4907-8871-4c22fc0bf756}
Downloads: {7d83ee9b-2244-4e70-b1f5-5393042af1e4}
Music: {a0c69a99-21c8-4671-8703-7934162fcf1d}
Pictures: {0ddd015d-b06c-45d5-8c4c-f59713854639}
Videos: {35286a68-3c57-41a1-bbb1-0eae73d76c95}

If ThisPCPolicy is set to Show, then the folder is visible. If you


change it to Hide, then the folder will be invisible.

3. Prevent Windows Update from In Registry Editor,


Automatically Restarting go to following key:
HKEY_LOCAL_
MACHINE\SOFTWARE\Policies\Microsoft\Windows\
WindowsUpdate\AUkey

Right-click in the right pane and create a new 32-bit DWORD value
named: NoAutoRebootWithLoggedOnUsers. Set its value to 1.

www.bdmpublications.com 157
Windows 10 Security, Maintenance & Performance

Windows 10
Maintenance Tools
Before you start to add software to help with maintenance, it is worth checking out the numerous tools
included with the OS. These are spread out over several menus but once you find them you will see that
they can really help with security and performance.

Maintaining Windows 10
Windows 10 is a lot better at keeping you informed of problems than previous versions were. It is, however, up to you to keep
on top of maintaining the OS if you want the best experience.

Storage Sense Activating Storage Sense lets the system Background Apps One of the easiest ways to conserve
software automatically free up storage power (for laptop users) and reduce
space by getting rid of files you no longer need. These can processor strain, is to take control of Background Apps. These
include temporary files such as cookies and the contents of your are apps that are, by default, allowed to receive info, send
Recycle Bin. notifications and update in the background.

You can choose when files are deleted, e.g. after 30 days in the You can either stop all background apps with a single slider click
Recycle Bin or if apps don’t use them for a certain amount of or you can prevent individual apps from running in the
time. Alternatively you can simply click a button to Clean Now background. Go to Settings > Privacy > Background Apps and
rather than setting automatic cleaning. You can find the Storage look through the apps listed. If you see apps that you don’t
Sense option in Settings > System > Storage. need notifications or updates from, click the slider to disable its
background activity.

158 www.bdmpublications.com
Windows 10 Maintenance Tools

Troubleshooters Windows 10 includes a number of Disk Tools There are several tools built in to Windows 10
troubleshooting tools, aimed (and also in older versions of the OS) that
specifically at certain problems such as audio loss or patchy allow you to clean, fix and manage your hard disk. Open the File
Internet connection. This is often the best place to start when Explorer and look in the left-hand column for ‘This PC’. Select it
trying to solve problems with your PC and Windows 10, as the OS and then right-click on Local Disk (C:). In the General tab, you
contains many drivers for common devices and may just need a will see a button for Disk Clean-up that lets you get rid of
small software update. temporary Internet files, old program files and so on.

If you click the Tools tab, you can use the Error Checking tool
You simply look through the list of troubleshooters and click on
and the Disk Defragment tool. Both of these tools can help your
the one which applies. Choose Run the Troubleshooter and then
hard disk run more efficiently. Click on either button and follow
follow the instructions to try and solve the problem. You can find
the instructions for each.
the troubleshooters in Settings > Update & Security >
Troubleshoot.

Disk Management The Disk Management tool is more Each column contains information about capacity, free space in
about diagnostics than actual MB, percentage of free space and health status. There are some
maintenance but it is a useful way of checking whether your hard further options, such as the ability to change drive letters and mark
disk has space available and is healthy. The panel will show all of partitions as active but they are probably not worth playing around
your disks, as well as all of the partitions. with unless you know what you are doing.

www.bdmpublications.com 159
Windows 10 Security, Maintenance & Performance

How to Reset
or Fresh Start
Resetting a PC reinstalls Windows, with a choice to deletes your files, settings and apps, and main
system files. Restoring will undo recent system changes, without deleting files. A Fresh Start completely
removes all apps and reinstalls Windows.

Fresh or Reset?
Refreshing and resetting your Windows 10 PC are two very different things and you should always make sure you know which
is the best choice to solve your current problem.

1 If your PC isn’t performing as well as it once did, and you 3 In Settings > Recovery, click on ‘Get started’ to begin the
don’t know why, you can reset your PC without deleting process. You will now need to choose whether to keep
any of your personal files or changing your settings. Apps or your files (just remove apps and settings) or remove everything.
software not installed through the Store will be removed but If you choose Remove everything, you will then need to choose
Windows store apps will be reinstalled. whether to ‘Remove and clean the drive’.

2 Open the main Settings app and head in to the Update 4 You will be warned that you won’t be able to roll back
& Security section. Click on Recovery and you will see to a previous version of Windows after the reset (old
several options, including Reset this PC. If you can’t get into Windows files will be deleted). Click Next and then Reset when
settings, you can access reset by restarting your computer while prompted. Windows will restart and take several minutes to
holding the Shift key; then select Troubleshoot > Reset. reset itself. Click Continue when promoted.

160 www.bdmpublications.com
How to Reset or Fresh Start

Perform a Fresh Start


Performing a Fresh Start allows you to do a clean reinstallation and update of Windows, while keeping your personal data
and most Windows settings intact; an easier option than a full wipe and reinstall.

1 Be aware that Fresh Start will remove most of your apps 4 Click Get Started and you will see a UAC (User Account
from your device, so you will have some reinstalling to do. Control) dialog. Click Yes and the Fresh Start screen will
In some cases, a clean installation may improve your device’s appear. This screen provides a brief overview of what the Fresh
start-up and shutdown experience, memory usage, Microsoft Start procedure will do. You’ll also get a general idea of how long
Store apps performance, browsing experience and battery life. Fresh Start will take to complete
the procedure.

2 To find the Fresh Start tool, open the Windows Defender 5 The software will analyse your system and then tell you
tool (click on the shield icon in the taskbar) and then which apps will be removed. There is no need to make a
click on the Performance & Health section. You will need to click note of these apps, as Fresh Start will save this list and create a
on Additional Info and then click Get Started. If Fresh Start has file on the desktop of your new, clean Windows 10 installation.
previously been performed, the date will be displayed here. Read through the list if you wish, and then click Next.

3 Microsoft recommends that you back up your files before 6 A Fresh Start will wipe any previous versions of Windows,
making changes like a clean installation of Windows to so you won’t be able to roll back. Click the Start button
your device. Make sure that you have access to all reinstallation and wait for the process to complete. Once complete, your PC will
media (such as CDs), product keys, license or login information restart and the initial setup screens will appear. Removed apps
and other materials needed to manually reinstall apps. are displayed in an Edge document on the desktop.

www.bdmpublications.com 161
Windows 10 Security, Maintenance & Performance

10 Ways to Reuse
an Old USB Stick
It is possible to buy USB flash drives with a 1TB or 2TB capacity quite cheaply these days, making those
4GB or 8GB drives you have probably forgotten about in a drawer somewhere pretty obsolete. However,
don’t throw them out just yet, there are lots of uses for old flash drives aside from just storage.

Use a Flash Drive to Create an Emergency


Unlock Your PC Antivirus Tool
If you care about your digital security, you probably have a PIN Most antivirus software will
or password lock on your laptop or desktop PC, but there is allow users to create a USB
another way to lock and unlock your computer: Using a USB (or CD/DVD) recovery tool.
flash drive. This can be a
lifesaver if
Software such as Predator allows you to create a key on your
you have a
old USB drive which, when plugged into your computer, will
virus-infected
automatically unlock it. When the “Key” is removed, the
computer
computer will lock again.
that you
There are several different USB lock software options available, cannot access.
and almost all of the best ones cost money (although usually
Open your antivirus software and check for the recovery or
not very much. Predator is just $10 for the home version). If you
scanning tool option. The exact process (and size of drive
want to try out a freeware USB locker, you can search for “USB
needed) will vary between different antivirus software, but it is
System Lock” and “WinLockr USB Lock Key”.
usually a relatively simple step-by-step process to follow.
With most, if not all, of these USB locks, you can continue to use
Once created, label the drive, so you know what it is and not to
the flash drive as a storage drive at the
format it, and keep it safe. In the event of a virus preventing
same time. And most only require
access to your computer, insert the USB drive and boot the
a small amount of space, so
computer (it should automatically boot from the USB, but you
even tiny capacity
may need to change the boot sequence in the BIOS).
drives will work.

Use it as a Mini Network Drive


If you have an unused USB drive with a decent firmware dashboard, as this is where you set up the
capacity (we suggest at least 32GB to be of any real drive as a network drive. You can find many guides to
use), you can use it as a network drive. Many modern setting up a network drive on the Internet.
routers have a USB port, to which a storage drive can
Once complete, anyone using the network can utilise
be attached, including a USB flash drive.
the drive as storage, or you can use it for things like
You will need to know how to log in to your router’s media streaming.

162 www.bdmpublications.com
10 Ways to Reuse an Old USB Stick

Store Your Most Boost PC Performance


Sensitive Data with ReadyBoost
If you have sensitive data that you need to keep safe, in an Back in the days of Windows Vista, Microsoft introduced a tool
offline location, you can encrypt and use an old USB flash drive. called ReadyBoost. It was designed to increase performance
by acting as a memory cache management system and
Again, the size of the old drive needed will depend on how
mainly used to speed up data retrieval in systems incorporating
much data you need to store. If it is just documents and a few
a mechanical hard drive (solid-state memory is usually
images, then even an 8GB drive should give you plenty of space.
faster) working alongside SuperFetch, which is part of the
To encrypt your drive, you will need some software such as operating system.
TrueCrypt, SecurStick or VeraCrypt. Download your chosen
There is some debate about whether ReadyBoost will make any
encryption software
difference to the performance of a modern, high-performance PC,
and carefully
particularly if it has a SSD installed (unlikely that it will). However,
follow the
if you have a slightly older computer, which has a mechanical
instructions
hard drive, it might still provide a helping hand.
to create the
encrypted To give ReadyBoost a try, insert a USB flash drive and access the
drive. In all cases drive properties (right-click on the Drive icon and select
you will need to create an properties). You should see a ReadyBoost tab. Click this and then
access password for the drive, so make click Apply.
sure you don’t forget it (write it down and store it
The drive will need to be at least 256MB in size, have an access
separately to the USB drive) as it is the only way to recover the
time of 1ms or less and a throughput of 2.5MB/sec.
data on that drive!

Create a Portable
Music Library
If you travel a lot, or just want to take some music on your
annual vacation, you can throw together a collection of your
favourite songs/albums on even a fairly small USB drive to take
with you.
Many hotel rooms will have a small stereo system into which
it can be plugged, or, failing that, you can usually find a
spare USB port on the TV in the room and play your music
through that.
It can also be useful if you have a car stereo with a USB port, as it
means you don’t need to have your phone connected to the
ICE system for music, and you can just leave it in place when
you leave the car.

www.bdmpublications.com 163
Windows 10 Security, Maintenance & Performance

External Create a Windows 10


Storage for a Recovery Drive
Smartphone The easiest way to be able to get your computer up and running

or Tablet
after a significant hardware failure is to create and regularly
update a recovery drive. Windows 10 includes all of the tools you
need to create a recovery drive, which does not protect personal
files and applications but will allow you to quickly reinstall
Many, if not all, modern smartphones
Windows 10 in the state it was when the drive was created.
and tablets support USB OTG (On-The-Go),
meaning you can use an old USB flash drive as You will need a USB drive that doesn’t contain any other data (as
external storage for your mobile files and photos. everything will be erased during the creation process), and one
that has a capacity of at least 16GB.
You will need a mobile device that supports USB OTG (the
alternative is to root your non-OTG device so you can install an To create a recovery drive, search in Windows 10 for “Create a
app which allows you to mount external drives; probably more recovery drive” and select the matching result that appears. Make
trouble than it’s worth). You will also need a short USB OTG cable sure that “Back up system files to the recovery drive” is selected,
unless your flash drive has a micro USB/USB C plug on it. then connect the drive to your PC and click create.

Use it as a Portable Automatically Sync Files


Password Manager to USB
As our world gets more and more digital, password manager There are lots of cloud storage solutions which allow automatic
software has become more and more popular as we rack up syncing, but it is also possible to automatically sync files locally,
double-digit (or even triple-digit) password collections. giving you a portable backup that will be accessible even when
cloud storage isn’t.
Many of the most popular password managers, including
LastPass, allow you to download a portable version of the software, Tools like Microsoft’s SyncToy and others allow you to create a
along with a web browser, so it can be used from a USB stick. folder that is automatically synced with an external drive,
including a USB flash drive. Every time you plug in the
connected USB drive, files from that folder will be synced/copied
onto the drive, and anything new on the drive will be copied
into the local folder.

164 www.bdmpublications.com
10 Ways to Reuse an Old USB Stick/Using Windows 10 Storage Sense

Using Windows 10
Storage Sense
When your Windows 10 computer begins to run out of space, typically you manually empty the recycle
bin and delete temporary files to free up storage space; then use different tools, such as the built-in Disk
Cleanup utility. You can now use Storage Sense to automatically get rid of junk files.

Updated Storage Sense


Storage Sense has been a part of Windows 10 for some time but it has been updated and added to in the Creators update. If
you don’t see the options mentioned here, make sure your OS is up to date.

1 To enable Storage Sense on Windows 10, open Settings > 3 You can, within certain limitations, select which items
System > Storage. Click on the Storage Sense toggle Storage Sense should remove automatically. In Settings >
switch. Once you enable the option, Windows 10 will System > Storage, click on the ‘Change how we free up space’ link
automatically delete junk files from your PC, including some below the Storage Sense slider. You can see that there are three
temporary files and items in the recycle bin older than 30 days. different options, which can be combined in any way you like.

2 Storage Sense isn’t a manual storage wipe. If you need to 4 You can also see the option to ‘Delete previous versions
clear out space right now, and you have large files in the of Windows’. These are deleted anyway, but not for
recycle bin that aren’t 30 days old, you will need to delete them several days after an update. If you really need to clear some
manually. Things like old versions of Windows, installation files space, select the option and then just click the Clean Now button
and update logs will also need to be removed manually. and wait for the process to complete.

www.bdmpublications.com 165
Windows 10 Security, Maintenance & Performance

Easily Sync Files to


an External Drive
SyncToy is a Microsoft tool which allows you to synchronise files easily between two folders, either two
local folders, or one local and one on an external drive (including a USB flash drive). It is entirely free
and is great for making easy file backups.

Installing SyncToy
Installing the SyncToy software is relatively simple. It can be downloaded for free from the Microsoft Download Center for
both 32 and 64-bit systems.

1 Download SyncToy 2.1 from the Microsoft Download 3 When you reach the point of choosing the install
Center (search for it on Microsoft.com). You will need to destination folder, you will have the option to install
choose either the 32 or 64-bit version, so make sure you know SyncToy for everyone who uses the computer (all users) or just to
what system you are running in Settings > System > About. install it for the account currently being used.

2 Once the download is complete, double-click on the 4 After a few more clicks the installation is complete. You
SyncToy setup package and follow the instructions to can then close the setup wizard, and you should see the
begin the installation. You will need to agree to some standard SyncToy 2.1 icon on the desktop (or whichever folder you chose
software license terms to continue through the setup. to download it to). Double-click the icon to begin using it.

166 www.bdmpublications.com
Easily Sync Files to an External Drive

Set Up and Use SyncToy 2.1


You are now ready to begin choosing the folders you want to synchronise with SyncToy 2.1. These can be two local folders, or
to a folder on an external drive.

1 With the application open, you will be asked to choose a 4 The Echo option works in almost the same way except
create a new folder pair (these are the two folders between that changes are only applied from the left folder to the
which the app will sync). If you want to sync to an external drive, right and not the other way around. If you make changes to
make sure it is plugged in and there is a folder created on it. files in the right folder, those changes will not be synced to the
left folder.

2 Click on Browse on each of the left and right folders in turn 5 The final option is Contribute and is probably the safest
and navigate to the folder you want to sync. The folder option for important files that just need a backup. You can
path will be shown in the text field for each. You can then click rename (but not delete) files in the left folder to update the right
Next to continue with the setup process. folder. Changes to the right folder won’t affect the left folder at all.

3 Next, you need to choose the method of synchronisation. 6 Click Next, then give your folder pair a name (e.g.
The Synchronize option will sync all new, deleted, or “Backup”) and click Finish. You can now start syncing files
renamed files. What this means is that if you alter any file in either between the folders. You can create multiple folder pairs simply
folder, the changes will be synced to the second folder. by following the process again. You can schedule a sync in the
app options.

www.bdmpublications.com 167
Windows 10 Security, Maintenance & Performance

Limiting Data Usage


when Tethering
Tethering means connecting your phone to the mobile data network and then connecting a second
device via Wi-Fi to the phone to make use of that connection. Windows 10 can be data-heavy; a problem
if your phone has limited mobile data allowance.

Set Your Tethered Connection to Metered


Windows 10 can be quite data-heavy, as mentioned, especially if an update happens to become available when tethered.
Luckily, you can tell Windows to automatically limit data use.

1 Cellular data connections are set as metered by default. 2 To set a Wi-Fi network connection as metered, click Start
Wi-Fi and Ethernet network connections can be set to > Settings > Network & Internet > Wi-Fi > Manage known
metered but aren’t by default. Some apps might work differently networks. Select the Wi-Fi network > Properties > turn on Set
on a metered connection to help reduce your data usage. Some as metered connection. Unfortunately, many Windows apps
updates for Windows won’t be installed automatically either. completely ignore the metered connection setting.

CHECK
NETWORK
USAGE DETAILS
You can also view a log of
how much data applications
on your PC have used in the
last 30 days. This can help
you identify applications that
might be using data in the
background. To check this,
head to Settings > Network &
MANAGE BROWSING DATA
Internet > Data usage and click
the graph to see more details. You should now have reduced background data use, including
updates and cloud syncing, so data use will be in the apps
you use; for example, Google Chrome. You can install a handy
extension for Chrome which limits data. Go to www.chrome.
google.com/webstore/ and search for Data Saver.

168 www.bdmpublications.com
Limiting Data Usage when Tethering

Pause or Disable OneDrive


If you use OneDrive to backup images etc., pausing it while you are tethering can help to reduce data use. If you never use
OneDrive, you can even completely disable it.

1 Stopping OneDrive just for the duration of your tethering 3 Press the Windows key + R to open the Run box.
is easy. Click the Hidden Icons arrow in the taskbar, Type gpedit.msc and click OK. In the Local Group
bottom right of the screen, and right-click on the OneDrive Policy Editor, in the folder list under Local Computer Policy,
icon (the cloud). From the Action menu, either click on Pause navigate the folders to Local Computer Policy > Computer
Syncing” (you can choose a duration) or click Exit. Configuration > Administrative Templates > Windows
Components > OneDrive.

2 OneDrive in Windows 10 can be disabled through your 4 On the OneDrive screen, under Settings, click Prevent the
computer’s Local Group Policy Editor. This doesn’t usage of OneDrive for file storage. In the Prevent the usage
remove OneDrive from your PC but it stops it from syncing with of OneDrive for file storage box, select Enabled, then click OK. Be
the cloud or connecting with other apps, and removes it from aware that disabling OneDrive like this will disable it for all users of
the navigation pane in File Explorer. the PC, not just you.

REDUCE
STREAMING
VIDEO QUALITY
Streaming or downloading
videos is a surefire way to
burn through your data
CHECK TASK MANAGER quickly and is best avoided
when tethering. However, if
you need to view video over a
The Task Manager is a great tool for checking to see which tethered connection, you can
apps or services are using a lot of data at any time. To open tell Windows to reduce quality
the Task Manager, press Ctrl+Shift+Esc or search for it in the in Settings > Apps > Video
Start menu search field. Click at the top of the Network tab to Playback. Click ‘Allow video to
display high usage services at the top. play at low res’.

www.bdmpublications.com 169
Windows 10 Security, Maintenance & Performance

Check and Manage


RAM Usage
Adding RAM, or Random Access Memory, is a good way to give your PC an instant boost but before you
go to the expense and trouble of installing new RAM modules, it is worth checking what is using your
existing RAM and whether it can be optimised.

Checking Memory and Memory Usage


When trying to optimise RAM usage and performance in your computer, the very first thing you need to do is use the Task and
Resource Managers to check how much you have and how it is being used.

1 To check up on your RAM, you need to open the Task 3 If it seems like most of your available RAM is regularly
Manager. Press Ctrl + Alt + Delete on the keyboard and being used, and if less than 4GB is installed, consider
then select Task Manager from the list that appears. If Task adding more RAM. You can find out what kind of RAM your PC
Manager opens showing just a simple list of tasks, click the More model uses by looking at the memory info in Task Manager.
details button to see a more advanced view. Then visit the PC manufacturer’s website for more specific info.

2 Click the Performance tab at the top and then the 4 In theory, Windows 10 (64-bit) can run on a PC with just 2
Memory tab on the left side. You can now see how much GB of RAM but in reality you will want at least 4 GB if you
you have in total and then check the graph to see how much plan regular use. If you can afford to double this to 8 GB, you will
RAM is being used. Try opening a few different apps while Task not only instantly improve performance but also add some time
Manager is open, to see RAM usage increase or change. to the long term lifespan of your computer.

170 www.bdmpublications.com
Check and Manage RAM Usage

Using Windows ReadyBoost


If you don’t want to spend out on more RAM right now, there are ways you can attempt to optimise your existing memory
performance. One way is to use ReadyBoost.

1 ReadyBoost is a way to boost memory performance by 3 Select the ReadyBoost tab, then select ‘Use this device’.
creating an extra memory cache on an external Windows 10 determines if the device can use ReadyBoost. If
USB-connected drive, such as a flash drive. You will need a USB it is not able to use the feature, it will let you know. Windows will
drive with at least 500MB of free space and a high data transfer then determine how much free space to assign to memory. Click
rate. A USB 3.0 drive can peak at a data rate of 600MB/s. Ok to reserve this space on the connected drive.

2 Insert the drive into a 4 If you look at the contents of the drive in
free USB port on your File Explorer, you will see a file called ReadyBoost.
PC and then open the File sfcache. This file shows how much space is reserved for
Explorer. Right-click on the ReadyBoost. If you don’t have a USB flash drive handy, you can
name of the drive in the sometimes use a smartphone, connected via USB, as a
left-hand sidebar and select temporary ReadyBoost drive
Properties from the action
menu. Be aware that
computers with a solid-state
drive (SSD) installed, will not
be able to take advantage of
ReadyBoost.

CHANGE PAGING FILE SIZE


The paging file is an area on your hard disk that Windows uses like memory. Increasing the paging file size can help
improve your PC’s performance.

1 In the search box on the taskbar, type ‘advanced 2 In Performance Options, Clear the ‘Automatically
system’ and then select ‘View advanced system manage paging file size for all drives’ check box.
settings’. In System Properties, on the Advanced tab, select  Select Custom size, then enter an initial size (in MB) and
Settings in the Performance area, and then select the  maximum size in the corresponding boxes. Select Set > OK
Advanced tab > Change in the Virtual memory area. and then restart your PC by selecting the Start  button
> Power  > Restart.

www.bdmpublications.com 171
Windows 10 Security, Maintenance & Performance

Tweak and Modify


Windows 10
There are plenty of ways to customise Windows 10 built right in to the operating system. However, if
you really want to tweak and modify the system, you will need to resort to external software. Ultimate
Windows Tweaker 4.1 allows you to modify the appearance, security and performance of Windows 10.

Set Up Windows Tweaker


The Ultimate Windows Tweaker software is not available as an app, so you will need to download the file from http://www.
thewindowsclub.com/ultimate-windows-tweaker-4-windows-10.

1 Once you have downloaded the zip file, extract its 3 These tweaks are not really meant for beginners. It is
contents and move the program folder to your desired recommended that you do not over tweak your system in
location. Pin its executable file to your Start menu for easy one go. We suggest you apply tweaks for only 1 category every
access. Do not separate out the contents of the download as it is day, see how your system performs, before moving on to apply
important that the contents stay in the same folder. more tweaks if you don’t see problems.

2 As when making any large system changes to your 4 To apply a particular tweak, check or uncheck the boxes or
computer, you should create a system restore point first. use the sliders provided. Once you have selected one or
You can use the Create Restore Point button that UWT offers. The more tweaks, click on the Apply button. Some tweaks may apply
software prompts you to create one, before using the tweaks, so instantaneously. If a system restart is required, you will be
that you can revert back should you feel the need to. reminded to restart your computer when you exit.

172 www.bdmpublications.com
Tweak and Modify Windows 10

Tweak and Mod Menus


Each of the menus in UWT4 contains lots of different settings and options, from simple appearance tweaks to more
complicated performance mods.

Customisation Menu Under this category you will be Security & Privacy Menu If you want to restrict access
able to tweak the settings of your to some Control Panel
taskbar, Thumbnails, File Explorer and the Modern UI. You can applets like Windows Updates you can do so easily. You can
opt to use Light or dark theme for OS or apps, disable Start disable Telemetry, Biometrics, Advertising ID, Cortana, Windows
animations, use default or change Battery Date & Time flyouts or Update sharing, Feedback requests, password Reveal button,
change the Volume Control. Steps Recorder, disable Wi-Fi Sense and Application Telemetry.

User Accounts Menu Under the User Accounts tab, you Context Menu Add Windows Store apps, features and useful
will be able to change your User functions to the right-click context menu and
Account settings, Logon information and sign in options. You Scan with Windows Defender, Clear Clipboard, all built-in default
can also change the User Account Control settings here. Windows Store apps and more to the context menu.

Performance Menu The Performance tab offers tweaks Additional Tweaks Menu Under this category, you will
to optimise Windows 10 to best see some additional system
suit your requirements. While most of these settings are best and Network tweaks. You can also set UWT to behave the way
left at their default values, this panel gives you quick access to you want it too. By default, when you apply a tweak and click
change them, should you wish to. Tweak these settings VERY Apply, UWT4 will automatically restart explorer.exe to apply the
carefully at first. tweak. Change its behaviour if you wish.

www.bdmpublications.com 173
Windows 10 Security, Maintenance & Performance

Ten Things to Disable


in Windows 10
When you install Windows 10 you will possibly activate several features that you won’t use or need.
Some of these cause no real problems but some can mean a reduction in computing speed and a
reduction in security, especially if you’re not really aware of what is going on in the background.

Applying Changes
You may not need to apply all of these tips to see an improvement in system speed, and it is actually a good idea to apply one
at a time and test the results before trying the next.

File Sharing Updates Windows 10 features an Start Menu Adverts Part of Microsoft’s business model
improved way to receive updates. for Windows 10 seems to be selling
More specifically, it allows you to get updates from sources its apps through the OS. Suggestions for apps you might like will
other than Microsoft in a sort of file-sharing network. The catch appear in the Start menu and although you can just ignore
is that your computer is also sharing files. Turn this off in them, you can also turn them off. Settings > Personalisation >
Settings > Update & Security > Advanced options > Choose how Start > Occasionally show suggestions in Start.
updates are delivered.

Unwanted Notifications Notifications are generally, Targeted Adverts Every Microsoft account now has an
but not always, a good thing. advertiser ID tied to it, allowing
Windows 10 does a good job of letting you know what is going Microsoft and third-party partners to deliver targeted adverts.
on with your PC but sometimes you can get notification You can turn this information sharing off by going to Settings >
overload. You can turn some of the less useful ones off in Privacy > General > Let my apps use my advertising ID for
Settings > System > Notifications & actions. Turn off things like: experiences across apps (turning this off will reset your ID).
Show me tips about Windows.

174 www.bdmpublications.com
Ten Things to Disable in Windows 10

Getting to Know You To better answer your queries, The Lock Screen The lock screen in Windows 10 can be
Cortana is constantly learning a useful feature but it also has the
about you in a process called Getting to Know You. This includes potential of getting in the way and slowing you down. You can
typing history and speech patterns. If you find this invasion of disable the lock screen but it does mean delving into the
privacy a little creepy, you can turn it off in Settings > Privacy > Windows Registry. To access the registry, press the Windows key
Speech, inking & typing, and clicking Stop getting to know me. + R and enter ‘regedit’.

Background Apps In Windows 10 many apps will run in The Visual Interface The visual effects in Windows 10
the background. These apps can go a long way towards making
receive information, send notifications, download and install the OS look modern and smooth. However, every pretty visual
updates and otherwise eat up your bandwidth and your battery element has an effect on the running of your computer.
life. You can, however, disable this feature in Settings > Privacy > Right-click the Start button and go in to System > Advanced
Background apps. You can turn off each app individually. system settings. Under the Advanced tab, go to Performance
and click Settings.

Windows 10 Syncing Windows 10, upon the default Automatic Updates Windows 10 will download and
install, does a lot of syncing with install updates automatically and
your other Windows devices. If you use several different Microsoft you can’t really turn them off; but you can choose to stop the
devices and don’t want everything shared between them, you updates happening whilst you are using your computer. Head into
can disable syncing in Settings > Accounts > Sync your settings. Settings > Update & Security and click on Change Active Hours.
You can selectively turn off specific sync settings. You can then set a time frame in which updates won’t happen.

www.bdmpublications.com 175
Windows 10 Security, Maintenance & Performance

Defragment
Your Hard Drive
Over time the data stored on your hard drive may get fragmented and become slower for your system
to access. Windows has always included tools to clean up these fragments and Windows 10 is no
different. Using the built-in Windows utility to tidy up can greatly improve performance.

HARD DRIVE HEALTH


While hard disk drives provide cheap, fast and reliable bulk struggles to access the scattered chunks of data. This is one of
storage for digital data, they do suffer from one major the reasons why solid state drives (SSDs) are becoming more
problem. Using protocols that date back to the days when popular. Since they don’t have any moving parts their data
computer data was stored on big reels of magnetic tape, data retrieval speeds should remain consistently high regardless of
is written onto the hard drive sequentially, so that it’s faster to how much data is stored or how often it is changed. See the
read off again. This is fine at first since the data is stored in previous sections of this publication if you’d like to upgrade
neat blocks or sectors that it’s easy for the system to find. A your system to use an SSD.
brand new hard drive will use its storage space efficiently for
optimum performance, saving files in a neat orderly sequence. Fortunately Windows includes an option to “defragment” your
However over time you’ll inevitably delete some files, or drive. This is an automatic process that reorganises the data
replace others with larger ones, and the hard drive tries to on your HDD back into easily accessible contiguous sectors,
cope with these changes by splitting data files up to fit into making the most of the available space and greatly speeding
available empty space on the drive. This can mean that your up access times. In earlier versions of Windows this was a
files are broken up into pieces scattered all over the drive, manually selected process that you had to remember to
which can radically slow down access times both when saving perform on a regular basis, but Windows 10 includes an
data and when you come to read the data from the drive. The option to automatically perform an optimisation and
system doesn’t lose the data but a hard drive is a mechanical defragmentation procedure on all attached drives on a
device with moving parts, and the physical process of moving regular basis. If your system uses a hard disk, as most do, it’s
the read-write head to and fro over the drive platter from one worth performing at least the first five steps of this guide, just
sector to another takes a finite amount of time, and the more to see if your system would benefit from defragmentation. If
the head has to move the slower the access time will be. After you’re using an SSD it won’t need to be defragmented, since
a few years of heavy use a hard disk drive can become so SSDs store data in a different way to HDDs but it can still
fragmented that it slows to a near crawl as the system benefit from optimisation.

1 Log on to your PC as Administrator. You’ll need to be 2 Click on the Start button and open File Explorer. Expand
using an Administrator account in order to perform the the This PC file tree so that you can see the list of drives on
disk defragmentation process. your system.

176 www.bdmpublications.com
Defragment Your Hard Drive

3 Right-click on any drive in the list and select Properties. 6 If any of your hard disk drives are fragmented, click on it
You’ll see in a moment that it doesn’t matter which drive and then click on the Optimise button. If it’s a large drive
you select at this stage. and very fragmented the process could take a long time, so only
do it if you’re not going to be using your PC for a couple of hours.

4 In the Properties window, click on the Tools tab. You’ll see 7 In the lower part of the Optimise Drives window you’ll see
that there are two options available. Click on the button Scheduled Optimisation. This should be set to On by
for the second one, “Optimise”. default but if it isn’t click on the Change settings button.

5 This will open the Optimise Drives window. Here you’ll see 8 You can set your drives to be automatically optimised
another list of all the drives attached to your system, when by ticking the Run on a schedule check box and select
the optimisation routine was last performed on each one, and the interval; for systems used every day a weekly check
how fragmented it currently is. If your system is operating at peak is recommended.
efficiency they should all be at 0%.

www.bdmpublications.com 177
Windows 10 Security, Maintenance & Performance

Updating Your
Device Drivers
Keeping your device drivers up to date ensures that your computer delivers optimum performance
under Windows 10 and makes your whole system more stable and reliable. Once you have updated the
drivers for one device, doing the same for any others is relatively easy and quick.

Finding Device Drivers


Windows 10 comes with default generic drivers that will let it talk to most common peripherals but for optimum performance
it’s a good idea to download and install the latest custom made drivers for your hardware.

1 Go to the website of your peripheral manufacturer. In this 3 Once you’ve entered the model name and told the site
case we’re looking at the website for Epson printers, to that you’re looking for Windows 10 drivers, you should be
install an update for an R2400 photo printer. Click on the link for offered a link to download the latest driver. Click on the link and
product support and enter the model name and/or number. download the driver file to your desktop.

2 Some websites (such as Epson’s) can automatically detect 4 If you’re installing a driver for a device that has to be
the operating system you’re using and immediately offer plugged in and switched on in order to work, such as a
you the latest recommended driver. In other cases you will have printer, make sure that the device is connected and powered up
to tell the site that you’re using Windows 10. before proceeding.

178 www.bdmpublications.com
Updating Your Device Drivers

5 Once the driver download is complete, go to your 8 The driver installation should only take a few seconds.
desktop and locate the newly downloaded file. When it’s complete you’ll receive a notification telling you
Double-click on it to begin installation. that the installation was successful.

6 You’ll see a message from Windows asking if you want to 9 Repeat this process for any other peripherals that are
proceed with software installation. Click OK to proceed. connected to your system. You don’t need to restart
between installations for different types of devices.

7 From here on the process is mostly just clicking OK on a 10 Once you’ve finished updating your drivers, it’s a good
series of windows. Do check that the device driver you’re idea to restart your machine, since this should clear out
installing matches the device connected to your PC. any temporary files created during the installation process, as
well as finalising the deletion of any old drivers.

www.bdmpublications.com 179
Windows 10 Security, Maintenance & Performance

Windows 10
Touchpad Gestures
If you are familiar with using a laptop, you will no doubt also be familiar with using a touchpad or
trackpad to control it. However even if you are used to controlling your laptop with the touchpad, it can
be some time before it feels as familiar as using a traditional mouse. Luckily Windows 10 allows for
several very useful touchpad gestures which, when combined with hotkeys, make using a laptop much
quicker and easier.

Horizontal Scroll Place two fingers on the touchpad


TOUCHPAD SETTINGS and slide horizontally. This gesture
will work in any app that allows horizontal scrolling, such as the
Windows 10 contains some basic touchpad settings when Internet browser.
used on a laptop but you may also need to get into the
hardware settings for your particular laptop. You can usually
find this in the taskbar menu. If not, use the universal search
to find “Touch Pad Settings” and click on “Additional Settings”.

Select Item Tap the touch pad with one finger when over Vertical Scroll Place two fingers on the touchpad and
the item you want to select. You can also tap slide vertically. This gesture is useful for
twice to select items that need a double-click. scrolling down through web pages or when reading long text
documents such as Word docs.

180 www.bdmpublications.com
Windows 10 Touchpad Gestures

Zoom In Place two fingers on the touchpad and pinch in Task View Place three fingers on the touchpad and swipe
diagonally. This gesture will be familiar to anyone them away from you. This is one of the new
who uses a smartphone or tablet. Can be used in several core gestures that may not work on your device if it does not have a
apps, including Photos. precision touchpad.

Zoom Out Place two fingers on the touchpad and spread Show Desktop Place three fingers on the touchpad and
out diagonally. When you change zoom in a swipe them towards yourself. Again, this
browser, a pop-up will usually appear as you zoom, showing requires a precision touchpad to work. This can also be achieved
you the change from the default 100%. by pressing Windows Key + D.

Context Menu Tap the touchpad with two fingers or Switch Windows Place three fingers on the touchpad
press in the bottom right corner. This and swipe right or left. Requires
gesture results in the same as right-clicking with a traditional precision touchpad. You can also switch between open windows
mouse, usually opening a contextual menu. easily by holding Alt and tapping Tab.

www.bdmpublications.com 181
Windows 10 Security, Maintenance & Performance

Windows 10 Hotkeys
Hotkeys, or keyboard shortcuts, are a useful way to speed up navigating your way around Windows 10,
especially if you are using a laptop and touch pad. Many users know basic Hotkey combinations, such
as Ctrl + C and Alt + Tab, but there are literally hundreds more to learn. These let you do everything from
Snap windows left or right, to switching between Virtual Desktops. Here are some of the most useful
Hotkeys for everyday use.

Basic Hotkeys
NEW WINDOWS HOTKEYS
Ctrl+C : Copy the selected item
Ctrl+X : Cut the selected item Windows key + A : Open Action Center
Ctrl+V : Paste the selected item Windows key‌+ S : Open search
Ctrl+Z : Undo an action Windows key‌+ C : Open Cortana in listening mode
Alt+Tab : Switch between open apps Windows key + I : Opens the new Windows 10 Settings menu.
Alt+F4 : Close an active item, or exit an app Windows key + X : Opens a system context menu.
Windows key + L : Lock your PC or switch accounts Windows key + H : Open the Share charm
Windows key + D : Display and hide the desktop Windows key + T : Cycle through apps on the taskbar
Shift+Delete : Delete item without moving to Recycle Bin Windows logo key + comma : Peek at the desktop
Windows key‌+ Tab : Open Task View
Snap Hotkeys Windows key + Ctrl + D : Add a virtual desktop
Windows key + Ctrl + Right Arrow : Switch to virtual desktop
on the right
Windows key + Up Arrow : Maximise current window Windows key + Ctrl + Left Arrow : Switch to virtual desktop on
Windows key + Down Arrow : Restores window size the left
Windows key + Left Arrow : Snaps current window to the left Windows key + Ctrl + F4 : Close the virtual desktop you’re using
Windows key + Right Arrow : Snaps current window to the right
Windows key + 2 Arrow Keys : Snaps current window into one corner

Typing Hotkeys
Ctrl + C : Copy the selected item
Ctrl + D : Delete the selected item and move it to the Recycle Bin
Ctrl + R : Refresh the active window
Ctrl + V : Paste the selected item
Ctrl + Y : Redo an action
Ctrl + Z : Undo an action
Ctrl + Right arrow : Move the cursor to the beginning of the
next word
Ctrl + Left arrow : Move the cursor to the beginning of the
previous word
Ctrl + Down arrow : Move the cursor to the beginning of the
next paragraph
Ctrl + Up arrow : Move the cursor to the beginning of the
previous paragraph
Ctrl + Shift with an arrow key : Select a block of text

Taskbar Hotkeys
Shift + click a taskbar button : Open an app or quickly open another
instance of an app
Ctrl + Shift + click a taskbar button : Open an app as an administrator
Shift + right-click a taskbar button : Show the window menu for
the app
Shift + right-click a grouped taskbar button : Show the window
menu for the group
Ctrl + click a grouped taskbar button : Cycle through the windows
of the group

182 www.bdmpublications.com
Windows 10 Hotkeys

DESKTOP HOTKEYS
Windows key + Home : Minimise all but the active desktop
window
Windows key + Shift+Up arrow : Stretch the desktop window
to the top and bottom of the screen
Windows key + Shift+Down arrow : Restore desktop windows
vertically, maintaining width
Windows key + Shift + L arrow or R arrow : Move window from
one monitor to another
Windows key + Spacebar : Switch input language and
File Explorer Shortcuts keyboard layout
Windows key + Ctrl + Spacebar : Change to a previously
selected input
File Explorer is your main interface for organising the files Windows key + Enter : Open Narrator
you store on your PC. Here are some useful shortcuts to Windows key + forward slash : Initiate IME reconversion
speed up operations. Windows key + plus or minus : Zoom in or out using Magnifier
Windows key + Esc : Exit Magnifier
Alt + D : Selects the address bar
Ctrl + E and Ctrl + F : Select the search box
Ctrl + N : Open a new window
Ctrl + W : Close the current window Dialog Box Shortcuts
Ctrl + mouse scroll wheel : Toggles through folder size and
layout options
Sometimes you may need to open and use a Windows dialog
Ctrl + Shift + E : Display all the folders above the selected folder
box when you don’t have access to the mouse or trackpad.
Ctrl + Shift + N : Create a new folder
For these times there are keyboard shortcuts to help.
Num Lock + asterisk (*) : Display all sub-folders under the
selected folder
Ctrl + Tab : Move to the right through tabs
Num Lock + plus (+) : Display the contents of the selected folder
Ctrl + Shift + Tab : Move to the left through tabs
Num Lock + minus (-) : Collapse the selected folder
Ctrl + number (1-9) : Move to the corresponding tab
Alt + P : Display the preview pane
Tab : Move forward through the dialogue options
Alt + Enter : Opens the Properties dialogue box
Shift + Tab : Move backwards through the options
Alt + Right arrow : View the next folder
Alt + underlined letter : Perform the command corresponding to
Alt + Up arrow : View the folder in which the current folder is
that letter
contained
Spacebar : Select or clear a checkbox Arrow keys: Select a button
Alt + Left arrow or Backspace : View the previous folder
Right arrow : Display the current or select the first sub-folder
Left arrow : Collapse the current selection or select the folder it was in Cortana Hotkeys
End key : Display the bottom of the active window
Home key : Display the top of the active window
Windows Key + Q: Open up Cortana ready for voice input.
F11 : Maximise or minimise the active window
Windows Key + S: Open up Cortana ready for typed input.
Windows Key + I: Open up the Windows 10 settings pane.
Windows Key + A: Open up Windows 10 notifications (Action Center).
Windows Key + X: Open the Start button context menu (the one with
easy access to Command Prompt, etc.)

Display Hotkeys
Windows Key + PrtScr: Take a screenshot saved to your Pictures folder.
Windows Key + G: Open the Game DVR recorder (if supported by
your graphics card).
Windows Key + Alt+G: Start recording activity in the current window.
Windows Key + Alt+R: Stop recording in the Game DVR.
Windows Key + P: Switch between display modes (with a secondary
display connected).
Windows Key + plus: Zoom in using the Magnifier utility.
Windows Key + minus: Zoom out using the Magnifier utility.

www.bdmpublications.com 183
Windows 10 Security, Maintenance & Performance

Six Steps to a Faster PC


A slow computer is both inconvenient and frustrating. When everything you try to do takes twice as
long as it should, you might be tempted to think about buying a new PC; before you do, there are
several things you can try to make your Windows 10 PC run faster and smoother.

1 UPDATE WINDOWS 10 AND DRIVERS


The first step along your path to a faster computer is making sure that the
Windows OS and all of the various drivers installed are up to date. Simply
updating drivers to the latest versions can have a noticeable effect on the
overall loading speed of any PC and fortunately, this is very easy to do.
Open Settings > Update & Security > Windows Update and click “Check for
updates”. Windows 10 will scan for available updates (to both the OS and
drivers), before displaying all those available as a list.
If no updates are available, it will say “Your device is up to date” and you can
move on to the next tip.
If updates are available, select those you want to download and install, then
click “Install”. When installation is complete, restart your PC.

2 CHECK PROGRAM COMPATIBILITY


Software that is designed to run on older versions of Windows
can sometimes cause Windows 10 to slow down as it struggles to
manage this incompatibility issue. To find out if this is a potential
problem, run the Program Compatibility Troubleshooter.
In the taskbar search field, type “program compatibility
troubleshooter” and click the first result in the search panel.
Run the troubleshooter; testing any software you think is
causing problems.
The troubleshooter will offer you various ways to test and fix
software compatibility issues.

3 CHECK AND CLEAR DISK SPACE


If your hard drive is very full, it can affect performance. To check: open Settings > System >
Storage and see how much space you have left. If your storage is looking full, try the following
options to make some space:
Delete Temporary Files – Click the “This PC” bar and then click the “Temporary files” bar.
Select everything you want to delete, click the “Remove Files” button and then restart your PC.
Remove Unwanted Apps – Open Settings > Apps > Apps & Features, click on any app you
want to remove and then click “uninstall”. Repeat this for all unwanted or unused apps
before restarting.
Move Files to an External Drive – Connect a removable hard drive to your PC (a small USB flash
drive for example) and open the File Explorer. Select the files you want to move, click “Move to”
in the Home tab at the top and select the external drive. Files will still be instantly accessible as
long as the drive is still connected.

184 www.bdmpublications.com
Six Steps to a Faster PC

4 DISABLE UNNEEDED
STARTUP PROGRAMS
Now that you have removed any unwanted apps and software, it is time to
check if any remaining apps are running unnecessarily at startup. Many
software manufacturers will set their programs to start-up in the
background when Windows 10 starts up. This helps the programs to open
more quickly and makes sense for software you frequently use, but not for
software you only use occasionally.
A quick way to see what software is running in the background is to look at
the icons on the right side of the taskbar and open the hidden icons panel
by clicking the small arrow. You can hover the mouse over icons to see
what they are.
If you want to have a deeper look at which software initiates during
startup, open Settings > Apps > Start-up. Here you will see a list of all
startup apps, along with an estimation of their performance/speed impact
and a slider to prevent each one from starting automatically.

5 SCAN FOR VIRUSES AND MALWARE


Viruses, malware and other malicious software
could cause your computer to run slowly or
behave strangely. Things to look out for include:
unexpected pop-up messages, programs that
suddenly start or stop, or the sound of your hard
disk constantly working.
To scan for and remove viruses, open Settings >
Update & Security > Windows Security (previously
Windows Defender) > Open Windows Security,
click on “Virus Threats & Protection” and then
click the “Quick Scan” button.
You can do a more advanced scan by clicking
“Scan options” and choosing which you want to
perform. If viruses or malware are found, you will
be given options to quarantine and remove them.

6 CHECK FOR CORRUPTED SYSTEM FILES


Occasionally, the core system files in Windows can become corrupted
(for a variety of reasons) and cause performance problems. Windows
10 includes a tool: the Deployment Image Service and Management
Tool, that will check for such files and automatically replace them,
either with a cached version or by downloading a new version.
Use the DISM Tool – In the Search box in the taskbar, type
“powershell”. Right-click on “Windows Powershell” in the results and
choose “Run as Administrator” from the menu.
At the Command prompt, that opens in the blue Powershell window,
type “dism.exe /Online /Cleanup-image /Restorehealth” without the
quotation marks (note the space between “dism.exe” and “/” and
each switch (/)).
If the tool finds and replaces any corrupted files, restart your
computer and see if it has helped with your performance issues.

www.bdmpublications.com 185
Windows 10 Security, Maintenance & Performance

Remove Windows 10
Bloatware
The choice to enable free upgrades to Windows 10 for existing Windows users was an almost inevitable
step by Microsoft. Almost as inevitable was an increase in bloatware, similar to that seen on Android
devices. Thankfully there are ways to remove or disable most of it.

Working with 10Apps Manager


Adding software to remove other software may seem counterintuitive but this is a safer way to clean up bloatware than trying
to remove it manually.

1 You can download the 10Apps Manager software from a 3 As when making any large system changes to your
variety of file download sites or you can get it directly from computer, you should create a system restore point first.
the creators at The Windows Club (www.thewindowsclub.com). It You can do this via Start menu > Control Panel > System
should be free wherever you download it from, so don’t be Properties > System Protection. Configure the restore settings
fooled into paying for this software. and click “Create”.

2 Extract the contents of the downloaded 10Apps Manager 4 You can now double-click the 10Apps Manager .exe file to
zip file and place the folder in your Program Folder and pin open the software on your computer. The extremely
the shortcut of its .exe file to your Start menu. Do not separate simple main interface will now open. Each of the tiles represents
out the contents of the Program folder. You don’t need to install a piece of preinstalled software that you can uninstall if you have
the software. no use for it.

186 www.bdmpublications.com
Remove Windows 10 Bloatware

5 Click on any of the tiles and then confirm that you want to 6 You can reinstall any of the apps you uninstall through
uninstall the app. You may need to wait a few seconds for 10Apps Manager. The only slight annoyance is that the
the process to complete. You can delete as many preinstalled software doesn’t remove or alter the tile once the app is
apps as you wish but if an app does not appear as a tile on the uninstalled, so it is a good idea to make a note of which apps you
screen, you won’t be able to add it. remove from your system.

Disabling Other Features


There are several other features that, although not technically bloatware, might not be doing your computer performance
any favours. Let’s take a look at some of the worst offenders.

Targeted Ads Windows 10 assigns every user a unique App Location Access Windows 10 third-party apps can
advertising ID to make it easier to provide access your location, webcam,
you with targeted adverts. While this cannot be removed, it can microphone and more by default. Not all apps require these
be disabled. Head to the “General” tab in Windows 10’s Privacy permissions. Go to Start menu > Settings > Privacy > Location
menu. Disable the topmost toggle switch labelled “Let apps use and remove those permissions that seem unnecessary. Repeat
my advertising ID ...” for things like camera and microphone.

Getting to Know You Meant to streamline the new Background Apps This last option seems simple but it
Windows 10 user experience, the can make a big impact in terms of
Getting to Know You feature records logs of your typing history, battery life and performance. From the Privacy menu, scroll
saves recordings of your voice, collects information from your down to the bottom of the menu, then select the “Background
contacts etc. Go to Start menu > Settings > Privacy > Speech, apps” option. From here, simply use the toggle switches to
linking & typing > Stop Getting to Know Me. prevent these apps from running on start-up.

www.bdmpublications.com 187
Windows 10 Security, Maintenance & Performance

How to Free Up
Space in Windows 10
Disk Clean-up is one of the best ways to free up space on your PC quickly and safely. It will clear up
redundant files accumulating on your hard drive, including temporary files and Downloaded Program
files. However, that’s not the only way you can free up space, as we will show you here.

Clearing Space on Your PC


It’s worth giving your machine a little spring clean every so often to keep it lean. And that doesn’t just mean removing
unwanted files and folders from the desktop. Disk Clean-up should be an essential part of your PC maintenance.

Clean Up Disk Clean-up is a utility included with every Scan Results If you’re scanning a second hard drive, it’s
copy of Windows. When you launch it (here unlikely Disk Clean-up will find a lot on it
we’ve searched for it using the search box on the taskbar), you’ll as it is mostly concerned with Windows files. And that’s what
get this small window appear. It will help you rid your PC of we’re looking at here in the results window. As you can see, you
detritus that builds up over time as you download files from the can check which items you want to remove from your PC. Click
Internet or install and uninstall apps. OK to remove.

Which Drive? You’ll be asked to select the drive you want System Files We actually didn’t click OK in the last step;
to clean up. Most of the time there’ll only instead clicking the Clean Up System Files
be one drive you wish to clean up (your C: drive), but it could option. This won’t harm your Windows installation, but will
well be that you’ve got more than one storage drive on your PC. clean up extraneous files that some people prefer to keep. If
Disk Clean-up will then begin to scan your drive for things it can you upgraded from an old copy of Windows, this includes your
sweep up. Windows.old folder on your hard drive.

188 www.bdmpublications.com
How to Free Up Space in Windows 10

More Options If you click the More Options tab, you’ll Uninstaller Each desktop app has a different type of
see this window, taking you straight to installer (or, in this case, uninstaller). Many
the Add/Remove Programs area of the Control Panel. It also are very similar, but you do get ones that differ, and one such is
gives you the option to remove old restore points that take up this app from Microsoft. Often you will be asked if you want to
space inside Windows. The latest restore point will always be repair the application. You don’t – you want to uninstall.
kept in case of a problem with your PC.

Programs and Features This area of the Control Windows Features This is for advanced users only.
Panel is one of the most Also from this screen you can
used, although it’s not designed to be utilised quite as much in select Turn Windows Features On or Off. You’re able to uninstall
Windows 10 – the idea is that you’d uninstall using the method elements of Windows that you don’t use – perhaps the old
in the final step on this page. Still, it’s the only way to see how Internet Explorer, for example, or Microsoft’s Print to PDF
much space your desktop applications are taking up. You can plug-in if you have an alternative solution that you use.
also access it via Control Panel > Programs.

Other Users If you try and uninstall a program with other Uninstall from Start You’re also able to easily uninstall
users logged onto the PC, you’ll always get apps from the Start menu –
a warning that other people may be using the application and simply right-click on the app in question and select Uninstall
so it may not uninstall properly. Get other users to log off before from the menu that appears. It’s the best way to uninstall any
uninstalling programs if this is an issue. app, whether it’s come from the Windows Store or not.

www.bdmpublications.com 189
Windows 10 Security, Maintenance & Performance

Troubleshooting
Windows 10
If you have a problem with your Windows 10 machine, your PC will need to go to the Advanced Start-up
Options menu, sometimes called the Boot Options menu. You may also need to boot into what’s called
Safe Mode. Hopefully this isn’t something you will need regularly but we’ll run you through it anyway.

How to Use Advanced Start-up Options


Modern computers are complicated things and there’s a lot that can go wrong. If your PC really isn’t working correctly or
seems slow, these helpful options will help you get it back on track.

1 You may be taken to the Advanced Start-up Options 3 You’ll then see this menu, which is a little transitional for
menu. It will appear automatically if you have two our liking – we’re not sure why these options aren’t on the
consecutive start-up errors on your PC. But you can get to it screen you get after this in Step 4 (by clicking Troubleshoot).
manually from inside Windows 10 by going to the Settings app > From here, you can also continue to boot up Windows 10 or you
Update & Security, clicking on Recovery and selecting Restart can decide to turn off your PC if you are going to take it to a
Now underneath Advanced Start-up. repair shop, for example.

2 If your PC didn’t start correctly, you’ll see this screen. It 4 If you selected Troubleshoot, you get the option to Reset
gives you the option of restarting and trying again, or this PC. This is a little confusing in name, because it
clicking on Advanced Options. We’re going to run you through doesn’t mean restart! It means resetting Windows to its factory
what happens if you click on this second button – various settings (it reinstalls Windows, effectively). You can choose
options are available to you. whether or not to keep your files, but we think this is a risky
option. You have got your files backed up, haven’t you?

190 www.bdmpublications.com
Troubleshooting Windows 10

5 Advanced Options is actually the menu that we want, 8 If you need to boot from a particular drive, such as USB,
and you probably will do, too, if there’s something you can do so by starting from it using the boot options
seriously wrong with your PC. It’s almost like the previous steps in the Advanced Options menu. You can also access the
were tests to see if you really did want to get here. You can try command prompt should you need to do any diagnostic checks
and repair the start-up, or roll back using System Restore. of your files, though this isn’t a common thing to have to do.

6 If you select Start-up Settings, you’ll be shown this screen 9 When your PC boots after going to Start-up Settings in
to ensure it is actually what you want (you can always go Step 6, you’ll see this menu. You need to press a number
back using the Back button of course). From this you can to boot your PC in a particular way. We’d always recommend
instigate Safe Mode with or without networking access, as well seeing if your PC will boot into Safe Mode with Networking. If it
as a low resolution video mode if you’re having display problems. starts up there without issue, it’s probably a third-party software
or driver problem rather than something with Windows itself.

7 If you have a system image handy (a complete backup of 10 This is what Safe Mode looks like. As you can see, it’s very
your PC in a system image file) you can also restore it at much like the standard version of Windows 10, but it is
this point. Anything you’ve created since the system image was lacking a little in its graphical finish. It’s designed for you to
made will be lost, so again it’s a reason why you should back up troubleshoot what is wrong with your system – perhaps you
your files. need to roll back to an earlier System Restore point, for example.

www.bdmpublications.com 191
Windows 10 Security, Maintenance & Performance

Diagnosing
Windows Problems
Windows 10 includes some useful tools for checking on and solving problems but sometimes you need
to look a bit further and deeper. Occasionally you just need to go back to basics. These tips will help you
solve some common problems encountered in Windows 10.

First Things to Check


If you’re having problems with Windows Update, the Windows Update Troubleshooter might be able to automatically fix the
problem. Go to Microsoft.com and search for Update Troubleshooter.

Windows Update Troubleshooter Microsoft knows Checking System Spec If you’re having trouble
that things don’t installing or running a particular
always go smoothly when updating and have provided a dedicated app or game, it may be that your PC hardware is not up to
troubleshooting tool for use during this key task. If you’re having scratch. All commercial software will provide details of required
problems with Windows Update, the Windows Update and (sometimes) recommended specification needed to run it.
Troubleshooter might be able to automatically fix the problem. You can check system spec at any time, just go to Control Panel
Go to Microsoft.com and search for Update Troubleshooter. and select System and Security, then System.

Check for Updates Keeping your copy of Windows 10 App Updates If an app or program isn’t working with
up-to-date with the latest releases Windows 10, particularly after the
can really help to avoid problems before they happen. Press the Anniversary update, try looking in the Windows Store for an
Windows logo key and click Settings. Then choose Update & update and if that doesn’t work, delete and reinstall it. To check
security > Windows Update and then select Check for updates. for available app updates on the store, click the user icon next to
Install any available updates and restart your PC if required. the search bar and select Downloads and Updates.

192 www.bdmpublications.com
Diagnosing Windows Problems

Slow Boot Fix Like Windows 8 before it, Windows 10 Non-responsive PC Windows 10 has a completely
uses a hybrid boot to enable fast boot different shell than previous
times. It sounds great but can actually slow down boot for some versions. The Explorer.exe process is still at its core but there are
users. Disable it by searching for Power Options in the Start a few additional components as well. If you click the Start
menu and running the matching Control Panel applet, then in button and nothing happens or if the entire taskbar refuses to
the left-hand pane click Choose what the power buttons do. respond to an interaction, open Task Manager (press
Ctrl+Shift+Esc), find Windows Explorer in the task list and click
the Restart button.

Fresh Installation Tool


If Windows 10 is really giving you problems and you have tried everything else to fix the issue, you can try using the Fresh
Install tool. You will lose any installed apps but will keep your files.

1 First make sure you have the following: an Internet 3 BACK UP EVERYTHING you want to keep! Launch the tool
connection to download the tool and the Windows 10 and review and accept the licence terms. Choose what
image and sufficient available data storage on the computer you want to keep. If you want to keep your personal files,
you are installing on. You need at least 3GB free for the choose the Keep personal files only option. Select the OK
download and the clean Windows 10 image file. button to start the installation.

2 Download the tool https://www.microsoft.com/en-gb/ 4 By using the tool, you may lose your digital licences,
software-download/windows10startfresh. There is some digital content associated with applications or other
advice on the download page about retrieving and reinstalling digital entitlements. Drivers may also be missing. If you
Microsoft software such as Office. It is worth checking this out if experience any missing drivers after the clean installation has
you are heavily reliant on that software. finished, go to Settings > Update & security >Windows Update.

www.bdmpublications.com 193
Protect Your PC
Contents

240 What are Wireless Security Standards?


196 Modern Day Security
242 How to Secure Your Wireless Network
198 Digital Security in Numbers 244 What is Encryption?
200 Types of Security Risk 246 Encrypting Your Windows 10 Laptop
202 Hackers and You 248 Top Ten Encryption Tools for Windows 10
204 Social Engineering 250 What is a VPN?
206 Ransomware: How it Works 252 How Can a VPN Improve Windows Security?
208 The Virus Top Ten 254 Top Ten VPNs
210 Phishing, Vishing and Smishing 256 Using a VPN for Added Security and Privacy
212 Pharming
214 Windows 10 Security
258 Online Protection & Disaster Recovery
216 Digital Security FAQ
260 How Does Information Move Around the Internet?
262 How Can Internet Data be Intercepted?
218 Protecting Yourself 264 10 Tips to Protect Yourself Against Interception
220 Be Smart 266 How to Secure Your Devices
222 Top Ten Antivirus and Security Packages 268 How to Secure Yourself on Facebook
224 Bitdefender Total Security Review 270 How to Secure Yourself on Twitter
226 Kaspersky Total Security Review 272 How to Secure Yourself on WhatsApp
228 McAfee Total Protection Review 274 What to Avoid when Creating a Password
230 Setting Up Windows 10 Security 276 Password Generators and Tools
232 Why Updating is Important 278 Top Ten Password Managers
234 What to Keep Updated and How 280 Shopping Online and Security
236 How to Secure Your Web Browser 282 Remove a Virus or Malware from a Windows PC
238 How to Secure Your Home Network 284 Glossary of Terms

194 www.bdmpublications.com
Contents

“…we’ll help you secure your


computer, network and devices
against such threats and with easy to
follow tutorials, help arm you against
potential threats and attacks…”

www.bdmpublications.com 195
Modern Day Security

196 www.bdmpublications.com
INDEX

Modern Day
Security
The start of the digital age brought with it many advances in the way we
work and interact with each other. It’s estimated there’s 1.2 Zettabytes
(1.3 trillion gigabytes) of data available to someone with access to the
Internet and whilst most of it may be irrelevant, what’s important to you
is somewhere within that mass of raw information.
Sadly, the cold hard light of day reveals that with the growth of this
voluminous data comes the nefarious acts of those who wish to cause
mayhem, panic, theft and other such negative elements. Therefore, as
a user you need to make sure that you’re protected against the ever
increasing digital world of threats, viruses and everything else the
Internet has to offer.
This chapter will help you to recognise some of the threats, what they all
mean and how they work. We can help you to identify and know what to
look out for when online.

198 Digital Security in Numbers 208 The Virus Top Ten


200 Types of Security Risk 210 Phishing, Vishing and Smishing
202 Hackers and You 212 Pharming
204 Social Engineering 214 Windows 10 Security
206 Ransomware: How it Works 216 Digital Security FAQ

www.bdmpublications.com 197
Modern Day Security

I
nformation regarding cyber security doesn’t always have
to be technically heavy. In fact, to make it easier to digest,
and to just show you how virulent and bitterly hostile
computer-borne security threats are, here’s a collection of
statistics to give you the heebie-jeebies; all the more reason
then to keep this manual close to hand.

80% of all cyber crime attacks originate from Russia, China


and North Korea

77% of small businesses don’t regularly back up


important data

75% of the health care industry has been infected with


malware in 2017

73% of US citizens have fallen victim to some


form of cyber crime

64% of companies have experienced


web-based attacks

61% of malicious websites are genuine


sites that have been compromised

Social Media Users

50 20
***** *****
Haven’t changed Have never changed
their password in the their password
last year
◆ ◆ ◆ ◆ ◆ ◆ ◆
Sources: Symantec Corporation Threat Report CSO Cybersecurity Business Report UK National Cyber Security Centre Security Intelligence Hackmageddon.com UK Office for National Statistics Bitdefender Labs Report Herjavec Group ◆

198 www.bdmpublications.com
Digital Security in Numbers

A member of Devices hacked in RANSOMWARE


the public is LESS THAN: ATTACKS on
BUSINESS every:
HACKED every:

39
SECONDS MINUTES
2 40
SECONDS

GLOBALLY: 2017

$ 123 $ 441 $ 271


250,000
NEW VIRUS FIXING LOST PAYING
threats Malware RANSOMS
to Cyber
EVERY DAY ATTACKS
CRIME
to remove malware

3000000
OVER

, ,
REPORTED INSTANCES OF FRAUD
through cybercrime against UK banks last year
◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆ ◆
Statista.com iQuda.co.uk Tektonika Securityaffairs.com Ic3.gov Marblesecurity.com Infosec Institute IBM The Linux Foundation Microsoft ITworld.com Javelin Strategy US Government NSA.gov CIA.gov Whitehouse.gov

www.bdmpublications.com 199
Modern Day Security

Types of Security Risk


There are more security risks for your computer than just the common, run-of-the-mill virus. The
amount of digital use the average person has over the course of a week has increased significantly
in just a few years, and with it comes a legion of security related issues.

Here Be Dragons
This isn’t a definitive list of the possible threats available for the Windows
user but here are ten modern risks that you face every time you power up
your PC.

Viruses Trojans
Viruses have been around for as long as computers. The Trojan horse, as the name suggests, is a program that

01 04
They’ve moved on from simply displaying the name of masquerades as a legitimate application but in actual
the coder on the monitor, a kind of virtual vandalism, fact contains code that allows a hacker remote access
and now can disable and wipe the data off a hard drive to your computer. Like the legend of the wooden horse
in mere seconds. the Greeks used to gain access to Troy, once inside your
computer it opens and creates an opening for the hacker.

Ransomware
Earlier in the year the UK was gripped in the clutches

02
of the WannaCry ransomware infection. This particular
infection exploited a vulnerability in Windows,
and quickly spread throughout the NHS and other
organisations, locking and encrypting the data on
a computer until money was sent to those who
unleashed it to the world.

Worms Spyware
Although a worm is a type of virus, it behaves Spyware invades computers usually through freeware

03 05
differently in that it’s goal isn’t to alter or destroy or shareware downloads, which is why you should
system files. Rather, it’s designed to replicate itself always download a program from a reputable source.
continuously until all the resources and space on the The intent of spyware is to collect information about
system are consumed. A bit of a nightmare for the the user and report it back to those who wrote it.
system administrator.

200 www.bdmpublications.com
Types of Security Risks

Adware
Adware is very similar to spyware, in that one of its goals

06
is to monitor the user. However, adware usually goes one
step further and bombards the user with Internet pop-up
advertising, usually when they open their browser or a
new tab. The advertising can be tame, such as gardening
equipment, or it can be extremely offensive.

Hacking
While Hollywood would have you visualise the lifestyle

07
of a hacker as something that’s quite alluring, in truth it’s
quite the opposite. The average user is generally under
the radar where a hacker is concerned. They’re mostly
after the corporations, or famous people, but you can
have your computer hacked by a neighbour, for example.

Social Engineering
A relatively modern term in the history of computer

08
security, social engineering will have the user deceived
into giving away personal information or allowing a
scammer into their systems. The recent spate of calls
from people claiming to be from the likes of Microsoft
or a security firm are a prime example.

Phishing
Much in the same vein as social engineering, phishing

09
is the act of obtaining sensitive information (bank
details usually) about a user by being disguised as a
trustworthy source. Phishing on social media sites
such as Facebook, Twitter, etc. is on the rise.

Rootkits
Rootkits are virus-like programs that are activated

10
before the computer’s anti-virus and security suites
are started when booting Windows. They can change
the way a security suite looks at files, allowing a virus
to hide in plain sight and not be detected by the
system’s security measures.

www.bdmpublications.com 201
Modern Day Security

and You
We’re probably all familiar with the term
‘hacker’, and what it suggests, but do we
really know what a hacker wants from
us? More to the point, how are we
perceived in the eyes of a hacker?
Let’s have a look at what the
modern hacker wants from the
average user.

Being on the end of


a successful hack
has been likened to
having your house
robbed. There’s a

You’ve
been
hacked!

feeling of invasion,
that someone
has rifled through
your personal
belongings and
stolen what’s yours.

202 www.bdmpublications.com
Hackers and You

Monetary Motivation Access to Your Webcam


As with most hacks the world over, money is the driving force Webcam hacking has become more popular in recent years. What
behind an attack. A hacker will want to enter your system through happens here is, a hacker manages to gain access to your computer
various means and obtain your bank or credit card details in order and activates the webcam in order to view what you’re doing; and
to get access to your money. It’s plain and simple theft. as long as the computer is up and running, they can see everything
the webcam can, and they can do so without you even knowing.
Personal Information
Personal information can be extremely valuable to a hacker. Those Access to Your Microphone
who manage to obtain information about you, from date of birth, To expand on the previous hack, along with a webcam hack an
address, social security number and countless other trivial details, attacker can also activate a computer or device’s microphone. Doing
can then use your identity to open bank accounts, start a loan and so will allow them to listen in on anything that’s being said, so perhaps
so on. In the end, it is your name that’s linked to the fraud. it’s worth covering up your microphone during any future meetings.

Parasitic Infection Zombie Apocalypse


Sometimes a hacker will use you to get some other target. There are instances whereby you become the target of a larger
Perhaps you work at a bank, or something similar, the hacker scale hack. In this case the hacker isn’t targeting you specifically,
will then identify you as a target that can be used to transfer a they’re simply using your computer as a zombie, a collection of
program from your laptop to the work’s server. You unwittingly machines connected to the Internet that runs malicious programs
become the carrier of malware, allowing a hacker to gain access against a target. Zombies are often used to conduct DDoS attacks.
to your work.
Cyber Vandalism
Exploitation Often you can be the target of an attack that doesn’t seem to
Exploitation is becoming a common theme among modern make any sense. The hacker doesn’t want money, they don’t
hackers. In this scenario a hacker will gain access to your personal want your personal information either. It’s just a case of cyber
information and hold it to ransom. They can then demand vandalism. Perhaps the hacker wants their name known in the
anything from money, to more personal acts. wider world, or just likes to see chaos reign. Who knows why they
do it?
Stealing Bandwidth
Rather than targeting a user purely for financial gain, or something Distributing Illegal Material
else, a hacker can also want to use your home bandwidth. Finally, a hacker can use your computer as a source or a node for
Generally speaking, the hacker doesn’t need to be on the other the distribution of illegal material. You won’t even be aware of the
side of the world, they could be a neighbour who’s using your fact but your computer is successfully trafficking illegal material
Internet connection to download copyright material. together with others on the Internet.

www.bdmpublications.com 203
Modern Day Security

Social
Engineering
With the rise of wider forms of communication, through social media
and so on, comes a new wave of threats called social engineering.
There are many forms of social engineering, so let’s have a look at
what you’re up against, and how to combat it.

S
ocial engineering is the new modern way of
manipulating people to give up their personal and
confidential information. It comes in many guises
and under different sub-headings, such as Phishing
and the like, but it’s essentially all a form of social engineering.
Essentially, the scammer will take your human nature and
responses and turn it against you for their own gain. You may think you’re
The kind of information the scammer is after does vary, depending not the sort of person
on the type of scam being used, but for the most part they’re to be fooled by a
usually after your passwords, bank and credit card details, or login scam but often the
information in order to gain any sort of financial data. Foreign offers are fake
You’re probably more familiar with social engineering that If you’ve received an email or a pop-up
you suspect, even if you’re new to the term. Recall the emails on a website offering you some financial
from someone, usually based in Nigeria, who has come into a reward, then it’s more than likely to be
fortune in the billions and for some inexplicable reason wants
to put the money in your bank account. Needless to say, the Scam, fake. Likewise, lottery funds from other
countries are fake too, as is money from
money was never there in the first place and should you go
through the process you will eventually be persuaded to hand scam, so called Uncle Charlie who lives in

and
Outer Mongolia.
over some banking information which the scammer can then
use to steal from you.
There aren’t too many Nigerian scams these days, mostly you more
get a phone call from someone claiming to be from Microsoft
or some other well-known company, who insists that they scam
are tracking a virus or other harmful malware that’s currently
residing on your computer. They ask you to visit a webpage
and download a piece of software that will allow them remote
Slow down
access to your computer. When in, they run a script that
Many scammers want you to react quickly, as
displays a wealth of useless information on the screen whilst scammers have
in the background they run keylogging and hacking software a matter of urgency. Take a moment to figure
employed subtle
to obtain your online banking details. They can even ask you out what’s going on and don’t fall for any high-
to log into your bank while connected to make sure everything
ways and means in pressure tactics. Ask for half an hour to call a friend
is working. which to bait you. for advice.
Other common social engineering tactics include emails
from a friend, who has been hacked, with the scammer
masquerading as them. It could be an email claiming to be
from your bank, an urgent request for help or someone asking
for a donation to a charitable organisation. Be wary, and
question everything.

204 www.bdmpublications.com
Social Engineering

Research everything
Locate your bank or credit card company’s webpage and follow
any links to known social engineering scams. Read all the
information you can gather about the techniques and tricks
Don’t engage used and arm yourself with that knowledge prior to any contact
from a scammer. The more you know, the less likely you are to
Whilst it’s fun to lead a scammer on the other end of the
being hoodwinked.
telephone, telling them that the only computer you own is
a Commodore 64, it’s really not worth it. They know they’re
scamming, you know they’re scamming, so just put the phone
down and ignore them.

Never give your password


Beware of attachments A bank never asks you for your password, they never call you up
or send a text message requesting to enter your password, nor
Email attachments are an excellent way of distributing malware,
will they ask you for other personal information relating to your
viruses and hacking scripts to your computer. If you receive
account. Treat all requests as suspect and don’t give out any of
an email claiming to be offering you a deal of a lifetime, and
your passwords.
requesting you open the attached file, then it’s likely a virus.
Research the sender, and best to delete the email.

www.bdmpublications.com 205
Modern Day Security

Ransomware:
How it Works
The first instance of an extortion attack is credited
to Joseph Popp back in 1989. Since then the
frequency, delivery and scale of ransomware
attacks has increased significantly; so what is
ransomware and how does it work?

R
ansomware is a particularly nasty form of malware and How do you
digital threat. There’s usually some kind of ransomware avoid getting
headlining in the news around the world and those who are
ransomware on
the victims are often at a loss as to what to do next.
your computer
Essentially, ransomware will infect an individual computer and one and what happens
of two things can happen: first, it locks the computer, stopping all
if you’re unlucky
access to it from the keyboard, then it starts to search for data and
encrypt the contents of the hard drive. Lastly it infects the boot
sector of the computer and displays a message detailing the type
of ransomware and how the individual will pay for the release of
the data; the message can even have fake FBI warnings included
with it. Alternatively, and the second thing that may happen once What
to do
a system is infected, the ransomware will lay in wait until a set time
and date, then do all of the above and lock the computer. Waiting
for a set time will ensure that numerous machines are infected
before any fix can be discovered; also if all the infected machines
are activated at the same time then there’s more of a chance of the
attacker getting their ransom paid.
You normally have a set time in which to pay the ransom, usually enough to be the
72-hours. If the victim doesn’t pay in time, the attacker can target of such an
introduce a second phase into the ransomware code that will attack? Here are
either increase the amount demanded or completely destroy the
some hints and
files that are being held at ransom.
tips for you.
Ransomware can be spread in a number of ways. The more
Enha
popular choice of delivery is via an infected web page, some form n ce yo
of Flash script that has been hijacked and now contains a link to Whils
t us ur se
Defen ing curit
a remote server where the browser will unwittingly download the
accep
der a
nti-m
the
built- y
ransomware code. More recently there are instances of Drive-by table alwar in W
it’s n unde e age indow
attacks, where the ransomware code locates any USB sticks a user ot as r nt s
dedic good normal cir is perfect
may have in their system and transfer itself in the knowledge that ated at de cums ly
look Intern fendin tance
the stick will be inserted into a work’s computer. at so et se g you s,
for a m c
highe e later on urity suit as a
to pro r end A ). e (we’ll
The WannaCry ransomware attack earlier in the year was by far one tect y V and Consider
our c secur payin
of the most prevalent in recent years. It’s estimated that more than ompu ity so g
ter. ftwar
250,000 computers across 200 countries were infected, rendering e
the likes of big companies such as FedEx, Nissan Motor Co and
Telefonica SA under siege from its demands. The National Health
Service in the UK was hit too, resulting in weeks of chaos and
disorder for the staff and patients alike.

206 www.bdmpublications.com
Ransomware

Upda
The tes Neve
single r inser
preve
n most If you
’v t a ra
make ting a ran importan temp e found a ndom
t fac tation USB
latest sure that y omware
s t
attac or of your is stro stick USB
code upda
te
our c
o m k is t sorts
comp
uter.
ng to
see w
some
wher stick
u s a p ut o of m N e, alth
weak sually look pplied. R er has the confid alwar o t only co h at’s on
it, do
ough
the
nesse s for v ansom entia e, uld it
if the
y’r
s in th
e
ulner
abilit ware secur l data it could a be in
fecte
n’t st
ick in
ity ex . Eith lso co
it’s diff e up to d operating ies an
d pert a er de ntain d wit
h all
icult f ate a sy t wor stroy
or it t n stem k. it or h sensitive
o activ d patched but and it and
ate. , then over
to a

Neve
Your
r pay
data
be d is lo
on cked
recom e by an , and
the
mend yone
ten, t ed to to sa re’s noth
he at pay t ve it, ing t
the d tacke he ra so it hat c
ata a r will nso ’s an
ta ke m . N really
malw nyway the m ine tim not
are b . The oney es ou
eing re’s a and n t of
activ lso t ever
ated h e unloc
after
paym threat of k
ent. more

Back
Set
u p
yo
cloud urself a
or ne daily
com twor back
pute k resou up s
get a r. If y rc ched
ranso o ur dat e tha ule,
your mwa a is s t’s se to a
com re at ecure para USB,
p ta ly back te from y
the s uter, ck, th ed u
aved re-in e n p, an our
data stall you
back Wind can h d you
over. ows appil
again y wip
, the e
n co
py

www.bdmpublications.com 207
Modern Day Security

The
Virus
Top Ten
Viruses are constantly evolving thanks to more ingenious
methods of delivery and due to the developers and
hackers tweaking their code to sniff out operating system
vulnerabilities. It’s difficult to say what the next big virus
will be but some scary ones have already appeared on
the Internet.

Just to give you an idea of


what the future could hold
for the computing world,

Digital
Destruction

here are the top ten most


destructive viruses unleashed
over the last decade into the
digital domain.

208 www.bdmpublications.com
The Virus Top Ten

1 Storm Worm 2 Conficker


Storm Worm was released in 2007 and was rumoured to Conficker was a 2008 worm that infected an estimated 15 million
have hailed from Russia. It came in the form of an email Windows computers worldwide. The French Navy, UK Ministry of
link, usually with an important headline to grab the victim’s Defence, hospitals and local police forces were affected. It was spread
attention. When the victim clicks the link the code is inserted and payload via Facebook, Skype and mail services, and infected networked computers with a
keylogger that the hacker could use to record your keyboard strokes.
with a backdoor into the system is opened. It infected over 10 million

5 Duqu
computers worldwide.

3 Daprosy Worm Duqu was released in 2011 and shared many


2009 saw the release of the Daprosy Worm characteristics with Stuxnet. However, Duqu had
whereby an estimated 20 million computers different roles: it would work as a keylogger, to
were infected with a keylogger. What made steal digital certificates, gather information about an infected
this such a dangerous virus was that it remained active PC, or completely wipe the contents of any connected hard
in Windows Safe Mode, so it was very difficult to remove. drives. Interestingly, parts of the Duqu code were written in an
unknown high level programming language.

4 Stuxnet
Stuxnet was rumoured to have been a US Intelligence
6 Shamoon
created virus that was designed to infect Iranian nuclear Shamoon was discovered in 2012 and
power plants, thus stopping them from potentially developed to infect the Windows kernel,
creating weapons grade material. Whether you believe that or not, it the core code of the operating system. It
was one of the worst viruses to appear in modern times. successfully managed to wipe the contents of millions
of hard drives and was rumoured to be used in cyber
espionage in the energy industry.

7 CryptoLocker
CryptoLocker is a ransomware infection
that first appeared in 2013. As with most
ransomware code it locks and encrypts
your entire hard drive and offers to unlock them if
the victim pays up to $300. Remarkably, the code
was able to delete itself whilst still keeping the files
encrypted and locked.

8 Regin
2014’s Regin virus was spread via fake websites and infected tens of
millions of computers. Rumour has it that it was a joint US and UK
intelligence created virus for global digital surveillance but we’ll leave
that for the conspiracy theorists to argue over. Nevertheless, it managed to send
information of the victim’s computer back to an unknown location.

9 Rombertik’s Endless Loop


Rombertik’s Endless Loop is an interesting, if somewhat deadly,
virus to have sprung up in 2015. When infected, the virus will alter
10 Tiny Banker and delete key boot files for Windows computers then force them to
reboot. With the boot files missing or altered the Windows PC will continually boot
Tiny Banker is an information and and reboot itself until you re-install the OS.
packet sniffer virus that will record
any online banking details the victim
enters in their computer. That information is then
sent back to several servers which the hackers
can then use to access your bank accounts. It’s
estimated that hundreds of millions were stolen
in 2016 thanks to Tiny Banker.

www.bdmpublications.com 209
Modern Day Security

Phishing,
It’s tempting to think we’ve made up the words
Phishing, Vishing and Smishing but in actual fact they’re
all forms of social engineering scams. Whilst we’ve
covered social engineering already, it’s worth looking at
these three modern day threats individually.

S
ocial engineering, the act Social engineering Phishing is the attempt to obtain Clone and Whaling. Spear phishing
of getting information fraud comes in information from a potential victim is designed to specifically target an
from a person based through emails, messaging, social individual, gathering information
many guises, with
on their human instinct media and auction sites. They can such as the above Facebook
to react, help or be entrapped
oddly sounding come in the form of an email, for ‘game’ whereby the scammer can
into some form of false promise, names and example, claiming to have some personalise their attack on the victim.
isn’t as modern as the name methods. In the money available for you or pretending
Clone phishing is an attack type that
suggests. Although the term ‘social to be from your bank or credit card
uses a previously delivered, legitimate
engineering’ is in fact relatively new, company. Social media phishing
email containing an attachment but
the process of obtaining sensitive includes individuals befriending
with the details changed and the
information from a victim has been you, or pretending to be someone
attachment swapped for a virus or
around for a very long time.
Gone you may know, then asking for
information. Similarly a phishing
keylogger. To the victim the email

Phishing
The digital age, of course, has looks real, since it’s cloned from a real
attack can come in the form of a
increased the attacks and how email, and when the attachment is
Facebook seemingly friendly test,
they’re delivered. No longer is a opened it infects the computer.
such as ‘name the top five things
victim beguiled by post, now they’re
about yourself and tag ten friends…’. Whaling is when a phishing attack
bombarded by false websites,
The unwitting victim will happily targets senior executives of a
emails and a string of other cleverly
reveal their date of birth, where they company or a high-profile individual
disguised mediums.
end, the scammers were born, pets names, names of any or business. The attack is a finely
Let’s break down the three main, are after your data, children and so on. The attackers will crafted email or web address that’s
modern methods of how a scammer but what do these gather all that information and use it created to look business-like and
will attempt to obtain your personal to their advantage. containing information specific to the
three in particular
and sensitive information: Phishing, company or individual.
Vishing and Smishing. mean? Interestingly there are also three
different phishing types: Spear,

210 www.bdmpublications.com
Phishing, Vishing & Smishing

Vishing
Vishing is voice phishing, using a meantime, they’re secretly running a
Smishing
Smishing is an SMS form of phishing. One way or another, each of these
telephone call to commit some keylogger in the background. In these cases you receive a text from scams are designed to bait the
form of social engineering attack. a seemingly legitimate source, usually victim, hence the phishing element,
In some circumstances they can then
The victim will, as we’ve explained your bank or credit card company a homophone of the word fishing.
claim to have fixed the so called issue
previously, receive a call from a but also in the form of a competition The best defence is to ignore, delete
but ask you to log into your bank
legitimate sounding call centre with winner or something free, asking or hang up on anything that’s even
to double-check all is well. With a
the person on the line claiming to be you to confirm your details. There’s remotely suspicious. Microsoft
keylogger in place, they can then see
from a well-known computer related often a link for you to follow, which doesn’t know if you have a virus, and
your username and password on
company. Usually the caller will be leads to a false website that logs your nor will it telephone you. Your bank
their screen; after which they log in
led to believe that there’s a virus on keystrokes and records your data. won’t email you for your account
and steal from your account.
their computer or that some form details and don’t be tempted to
Some smishing attacks will ask you
of security vulnerability has been Alternatively an automated call can fill in any Facebook games with
to send a return SMS to approve
detected. The victim will then be ask you to enter your credit card personal information. In short, be
an action, such as a delivery of
guided to a website where the caller number into the phone’s keypad, savvy about baiting techniques and
some goods. The return message
can make a remote connection to as it’s been reported as being used remain vigilant.
is designed to cost significantly
their computer. Once on the victim’s elsewhere. Of course it hasn’t but as
more than the usual SMS rate,
computer, the caller will then run soon as you enter the details they’re
with the money going straight to
a script that will display reams of recorded and your card can be used
the scammers.
data on the screen designed to by the scammers.
confuse and baffle the victim. In the

www.bdmpublications.com 211
Modern Day Security

Pharming
While on the subject of homophones,
another recently added word to the
long list of security threats is Pharming.
Pharming falls within the online fraud
layer of security and although in reality Pharming has become quite
it’s been around for as long as web sophisticated in recent years,
pages have, the methods of deception and with the rise of connected
are continually evolving. devices that offer Internet

S
o what exactly is pharming? In short, this
is the criminal act of producing a fake
website and redirecting the victims to it.
The website could be anything from a reasonably
popular online shopping store, to one of the well- Harvesting
known high street banks. The victim, unaware
that the web site is fake, as the front end apes
Time
the real thing, even down to the small print at the
bottom of the page, will login with their details.
After the user has logged in several options are
available to the ‘pharmer’. They can collect the
username and login details and simply leave the access it’s quickly become
victim with a blank web page; this is usually a one of the more popular
method used by an amateur pharmer or those
who want a quick username and password grab
criminal cyber activities.
before disappearing into the darkened corners
of the Internet. Otherwise, they can redirect the
victim to the real site where they need to enter their
login details again. The latter is a more convincing
method of pharming, as the victim rarely questions
why the bank has asked for their login credentials
twice; they often put this down to a mistaken entry
on their part.
Either way, the pharmer now has a considerable
list of valid usernames and passwords for the bank
or online shop they faked, which they can then
sell via the Dark Web or use themselves. How do
they, the pharmers, get away with being able to do
this? Interestingly, there are several ways in which
someone can fake a legitimate website.

212 www.bdmpublications.com
Pharming

http:// DNS http:// Fake Naming http:// Hosts

DNS cache poisoning is the primary method Fake naming relies on the attacker seconding their One method that’s more difficult to pull off,
of creating a fake website with the view pharming attempts with a phishing email. The email though if successful is remarkably effective,
to setup a pharming scam. This involves can look legitimate and contain relevant information is to alter the victim’s Hosts file on their
the criminal attacking the Internet naming about the person in general. There’s often a link at the computer. The Hosts file is located in C:\
system, which is responsible for creating bottom that although is spelt correctly in the email, Windows\System32\drivers\etc\hosts on
readable names for websites, such as www. is in actual fact a hyperlink to a pharming website Windows computers, /private/etc/hosts on
ebay.com and so on, rather than a string that’s similar to the real thing but spelt somewhat macOS, and /etc/hosts on Linux computers.
of numbers in the form of the IP address, differently. For example, the email could say ‘your Its function is to map hostnames to IP
such as www.184.232.124.65 or similar. overdraft is nearing its limit, please login to www. addresses, translating the readable websites
The Internet naming system relies on DNS bank.com to transfer funds…’ The www.bank.com to IP addresses on a local network. However,
servers to provide the conversion between part is correct, but the hyperlink and the resulting it can also be used to circumvent the Internet
IP addresses and readable web site names. website may be taking you to www.bnak.com, which lookup of a legitimate web site, redirecting
The attacker can mount an attack on the DNS although subtly misspelt is often difficult to miss you to a fake one. It’s not often that the Hosts
cache, thus changing the way in which traffic when you’re concentrating on the website content. file can be altered, as it’s a system file that
moves on the Internet. Effectively, instead of requires elevated permission in order to edit,
the user’s request to go to www.ebay.com, but a cleverly written virus can do the trick.
they’re taken to the attacker’s fake website
instead. Thankfully, these kind of attacks
generally don’t last for long, as the DNS cache
is monitored frequently by many different
engineers and companies.

www.bdmpublications.com 213
Modern Day Security

Whilst it’s all fine and well learning


about the different security risks
you face every time you boot up
your computer, often questions
can go unanswered. We’ve
put together ten popular
digital security questions
that we hope will help fill in
any blanks.

Digital
Security
FAQ
Understanding Security
Trying to understand the digital security world can be hard
work. There’s so much to take in, that it’s easy to become lost
in the quagmire of acronyms and homophones. Hopefully
we can help you out with these ten FAQs.

216 www.bdmpublications.com
Digital Security FAQ

Most of the security changes you


Do I need Does having extra can adopt don’t cost anything,
an antivirus just you being more aware and
Without a doubt, yes. Windows security cost? knowledgeable about what’s
program? 10 uses the built-in Windows
going on. In terms of an antivirus
Defender program to help protect
you online. It’s more than ample product, most of the better total
for most users but often better security suites will cost you an
security is required. annual subscription.

How often do I Windows 10 keeps a continual


Viruses and need to update update cycle in operation,
No, sorry. Even legitimate websites
malware are can be infected with a virus or everything? delivering the latest updates in the
only on dodgy background. However, it’s always
some other form of malware.
best to do a daily check for any
sites, right? Remember too, a computer virus
updates for both Windows and any
can enter your system in other
programs you regularly use.
ways, not just online.

That’s a difficult question to answer.


How do I know if More often than not, if it’s too good
Is online Online banking is remarkably something being to be true then it’s likely to be a
banking safe?
safe and utilises the latest and offered is a scam? scam of some form or another.
continually evolving security There are times though when
encryption methodologies. There’s genuine offers are made. It’s best
military grade security at every to research as much as possible
level of the online process, and it’s before committing to anything.
highly unlikely to be hacked.

If you think you’ve been scammed,


I think I’ve just you need to quickly make some
Are hackers Whilst it’s true that most hackers been scammed, changes: change your Windows
after me? aren’t interested in the average what do I do? password, inform your bank that your
user, they’re after bigger targets,
details may be compromised, email
there are instances where you
friends and relatives that you’ve been
could be targeted for one reason
scammed, file a police report, scan
or another. Generally speaking, the
your computer for threats and check
average user will only be targeted
your credit card reports.
en masse in a country-wide
phishing or similar attack.

I’ve opened a scam There’s a good chance you may


email attachment, have a virus on your computer.
Yes, there’s nothing stopping you. what do I do now? Close all open programs, open
Can I keep a A school of thought is that while Windows Defender and do a Full
phishing phone you keep them on the line, turning Scan of the system. If anything
it into a mock-prank call, you’re
scammer on is detected Defender will tell you
saving someone else from being
the line? duped. However, it’s best to simply
what to do. Then, consider a
third-party AV suite and scan the
tell them you know they’re trying computer again.
to scam you and hang up.

www.bdmpublications.com 217
Protecting Yourself

218 www.bdmpublications.com
INDEX

Protecting
Yourself
Being able to recognise a scam or virus is one thing but you need to
know how to protect yourself against possible attacks. We look at the
top Internet security packages, from Bitdefender, Kaspersky and McAfee,
as well as what encryption is and how to make it work for you.
Using a Virtual Private Network is an excellent way to improve your
Windows security, we’ll look at how a VPN works, what the best VPNs are
and how to install and use one on your PC.

220 Be Smart 240 What are Wireless Security Standards?


222 Top Ten Antivirus and 242 How to Secure Your Wireless
Security Packages Network
224 Bitdefender Total Security 244 What is Encryption?
2018 Review
246 Encrypting Your Windows 10 Laptop
226 Kaspersky Total Security
248 Top Ten Encryption Tools for
2018 Review
Windows 10
228 McAfee Total Protection Review
250 What is a VPN?
230 Setting Up Windows 10 Security
252 How Can a VPN Improve
232 Why Updating is Important Windows Security?
234 What to Keep Updated and How 254 Top Ten VPNs
236 How to Secure Your Web Browser 256 Using a VPN for Added Security
238 How to Secure Your Home Network and Privacy

www.bdmpublications.com 219
Protecting Yourself

Be Smart
We’ve looked at some of the many varied ways in which you can be compromised by a digital
attacker and some of the ways in which you can help protect yourself. However, it’s often more
beneficial to be able to recognise the signs of a digital security issue.

Weakest Links
In terms of digital security, you’re only as strong as the weakest link in your security chain. You can tick all the security boxes but if you don’t know what to
look for in the first place you’re still vulnerable.

PASSWORD CHANGE A good sign of a breach in your digital BANK ACTIVITY If you check your bank activity regularly and you’ve
security is the sudden changing of a noticed some odd, small transactions that you fail to
password. It can be for a random site, webmail or just something small to begin identify, then your account could already be hacked. Sometimes hackers will
with. Sometimes a hacker with a keylogger in place will test the water before take small amounts or purchase inexpensive items to check the validity of an
accessing your bank, in which case you need to virus scan your PC immediately. account before emptying the vault as it were. Contact your bank immediately.

PERSONAL SPAM We all receive spam emails of some form or another. SLOW PC One of the many signs of your computer being infected by a
However, if you suddenly start getting emails of a virus is the sudden slowing down of the overall system. Most
more personal nature, then you need to look at where that information could be operating systems, Windows in particular, slow down over time but if you power
coming from. The details could be your full name, date of birth, knowledge of any up your computer one day and it’s noticeably slower than usual we’d
children or even a recent accident you may have been involved with. recommend you run a virus scan.

220 www.bdmpublications.com
Be Smart

SLOW BROWSER In relation to the previous tip, a browser slow RANSOMWARE WARNING In the case of a ransomware attack,
down can also indicate that something is you don’t often get much warning
potentially going on. Browser hijacking can adversely affect the speed at which that something is about to happen. Generally speaking, a sudden and inexorable
pages load, as it’s sending information to a remote source. Naturally it’s not slowing down of your computer will be a key element, as the ransomware is
always a digital security issue but to make sure, check your system. frantically encrypting your files in the background.

POP-UPS Furthering the browser issue, if you suddenly notice a lot ROUTER LOGS It’s always recommended to check your router’s
more advertising, pop-ups or similar, then it’s usually a good logs frequently. Although hackers are generally
sign that you’re infected with some form of adware or Trojan tracker. anonymous groups or individuals on the other side of the world, often a
hacker could simply be a neighbour leeching your broadband connection.
Check the logs for any unidentifiable computers attaching to the router.

INFECTED CONTENT Viruses want to be spread from one


computer to another and they can infect
your email or social media platforms. If you suddenly have your friends
asking you why you’re posting adverts for pharmaceutical enhancements,
then there’s a good chance you’re infected with something. BANK STATEMENTS Keeping an eye on your credit card statements
will reveal any compromising security leaks.
Just as with bank statements, small transactions are usually the first indicator, then
once the hacker knows the card is valid they can then blitz it until you’ve run up a
huge debt. Always check your statements and mark any suspicious transactions.

www.bdmpublications.com 221
Protecting Yourself

Top Ten Antivirus and


Security Packages
Whilst the built-in Windows Defender is a great antivirus and security tool, it’s nowhere near
as capable as one of the many third-party security suites. The likes of Bitdefender, McAfee and
Symantec have years of security specialism behind their products.

Better Protection
A third-party security suite offers much more than virus scanning. With one of these, you’re covered against most, if not all, digital threats. Here are ten
security suites worth considering if you’re serious about your digital protection.

BITDEFENDER Bitdefender Total Security 2018 is the latest security SYMANTEC Norton Security Premium is the top choice for the home
suite from one the world’s leading security specialists. user from Symantec. With it you can protect up to ten PCs,
This version offers unrivalled levels of protection and performance for Windows, Macs, smartphones or tablets and it will keep you safe when shopping online,
macOS and Android platforms. There’s even an advanced ransomware general surfing or conducting transactions.
protection element to help protect your folders.

MCAFEE McAfee Total Protection offers a 100 per cent guarantee of virus WEBROOT Out of the three possible solutions available from Webroot,
removal, or you get your money back. There are three main Webroot Internet Security Complete is the one for home
versions available: Antivirus Plus, Total Protection and Livesafe; each has its own users to consider. With it you’re protected from virtually any threat, as well as
particular twist but all offer excellent security features and benefits. getting 25GB of secure online cloud storage.

222 www.bdmpublications.com
Protecting Yourself

Bitdefender Total
Security Review
Bitdefender is regarded as one of the best antivirus and security companies in the world. Its products
have won numerous awards and have been proved time and time again to be efficient and effective
whilst offering cutting edge technology.

The Ultimate Protection


There’s a lot to offer from Bitdefender’s Total Security. It’s one of the leading security suites available and is cited as possibly the best total protection packages
in the world. Let’s see what it has to offer.

Total Security is Bitdefender’s flagship product and offers comprehensive security devices, the dashboard will inform you of your child’s online activity, visited sites
packages for Windows, macOS and Android users all under a single web portal. and social media behaviour.
Pricing does alter slightly, depending on what special deals may be available but
Ransomware is handled by an independent module that requires activation
expect to pay somewhere in the region of £59.99 for a single year license for up
but once enabled it automatically protects files in your Documents folder, with
to five devices.
the option to include other folders too. Any attempt to edit one these protected
What do you get for your money? Well, Bitdefender has upped the ante with files results in a message appearing, which you need to confirm the action. This
regards to its protection suite; not an easy task for a company with a long history makes it increasingly difficult for ransomware to start encrypting and messing
of already providing the leading security suite on the market. Total Security 2018 around with your valued data.
is quick, easy to install and easy to understand, with the unboxing to installation
On top of all the superb features though, is the excellent scanning engine. The
and a complete system scan taking no more than half an hour.
Bitdefender scan is quick and doesn’t slow your computer down while being
Most of the problems with modern security suites is the heavy interface that active in the background or while conducting a full system scan.
comes with the package. A modern suite must include a wealth of elements to
In short, if you’re in the market for a complete and fully featured security suite, then
make it even slightly competitive in an already saturated and quite aggressive
Bitdefender Total Security is the one you should most definitely consider.
marketplace. This in turn creates an interface that’s often too cluttered, and a
little overwhelming for the newcomer. Bitdefender though has managed to bring
together a clean and sleek setup, with the most prominent features available with
just a click or a couple of clicks of the mouse.
Naturally you can dig much deeper into the settings, selecting predefined
profiles and modes, or tweaking the core to either lighten the security,
without compromising the overall defences, or tightening everything
up to an almost NSA-level of security clearance.
It’s packed full of interesting and useful features, some of which
you never thought you’d appreciate until you actually had
them to hand. For example, the vulnerability scanner will “Bitdefender Total
hunt down any missing Windows updates, issues with Wi- Security is one of the
Fi security and even weak passwords. Integration with your best AV and protection
browser is excellent too, offering clearly defined green ticks products available today.”
next to search results that are classed as safe to visit, including
integration with Facebook. You can also set up a secure vault
for files that you want to mark as ultra-private and keep away
from any prying eyes.
You can command everything from the Bitdefender Central Activity
Dashboard, which displays the current subscription along with the
status of your Bitdefender installed devices, plus alerts, reports and so
on. It’s a simple interface that keeps the stuff you want to see prominent,
whilst gently hiding the deeper information that only the more advanced user
may be interested in viewing. Of course, should anything untoward happen
to any of the Bitdefender installed devices, then you receive the appropriate
warning. Interestingly, should you activate the parental features on any of the

224 www.bdmpublications.com
Bitdefender Total Security Review

“One of its many splendid features is a “The scanning engine is quick and
vulnerability scanner that informs you efficient and doesn’t unnecessarily
of any weaknesses in your system.” slow your computer down.”

“Once installed it
automatically updates
and keeps you safe from
digital threats.”

www.bdmpublications.com 225
Protecting Yourself

Kaspersky Total
Security Review
Kaspersky was one of the first security companies to offer the end user a cross platform AV
protection suite, some years ago now. Since then the company has improved its products hugely
and now produces one of the leading security suites available.

Next Generation Protection


There are a lot of features to like about Kaspersky Total Security, all of which help you not only be protected from whatever’s out there but also help you
manage your system better.

Kaspersky’s Total Security is the mega product of the company’s AV and protection completing a full system scan as Bitdefender is but it’s only a minute or so out. The
utilities for home users. It’s reasonably priced at around £39.99 for one device and performance hit on the system is negligible, in fact you’ll be hard-pressed to notice
a years subscription, rising to a maximum of £109 for five devices and a two year any negative impact once the software is installed and continually scanning.
subscription. Obviously prices can change depending on what deals are currently One last component worth mentioning is the Parental Control feature. With this
available, so check the Kaspersky website for the latest guide. Kaspersky offers a method of keeping children safe whilst they use their devices.
Much like the Bitdefender entry, Kaspersky has gone to great lengths to provide You can create usage scheduling, GPS safe zones and receive notifications should
an easy to use and simple to understand interface. Whilst, again like Bitdefender, anything suspicious attempt to access your child’s device when they’re using it.
you’re able to delve deeper into the inner workings, the average user isn’t instantly Beyond that there are also filters to stop children accessing adult sites, or sites that
bewildered by page upon page of technical jargon, icons and sub-menus. It’s can feature disturbing content.
handy too that everything starts from the Kaspersky online portal, where you can Kaspersky Total Security is an impressive product and one that the home user can
download your purchased software, alongside installers for other modules, that certainly feel confident about. It’s quick, easy to use, regularly updated and ticks all
eventually all fall under the same control centre umbrella. the right boxes from the point of view of a user, parent and someone who wants to
The front end categories that are available via the control centre are: Scan, Database make sure they’re as secure as possible on the modern Internet.
Update, Safe Money, Password Manager, Privacy Protection, Backup and Restore,
Protection for all devices and Parental Control. Most speak for themselves and
are fairly self-explanatory; however, components such as Safe Money and Privacy
Protection deserve a little more explaining.
Safe Money utilises Kaspersky’s unique protection engine, whereby your
online transactions are safely behind the product’s security web. This
feature takes care of protecting your shopping as well as online banking,
so it’s an impressive weapon in the already ample Kaspersky arsenal.
Privacy covers a range of different features. This component protects
you when surfing, guarding your online identity and information,
whilst also actively blocking malicious websites and preventing “Kaspersky Total Security
any form of tracking or monitoring. It also includes an element that is one of the leading AV
blocks any attempts to access your computer’s webcam, which is and security products for
certainly a handy feature; it will also prevent any attempts to access the home user.”
your stored data whilst you browse the Internet.
Needless to say, the features available are certainly impressive.
Beyond the few we’ve mentioned above, there are also controls
to improve browser security, protection for any cloud access, a
vulnerability scanner and a trusted application mode that will only
allow white-listed programs to be executed. You can create a Kaspersky
Rescue Disk, which you can boot from should something ever go wrong,
allowing you to scan and clean your computer without it needing to access
Windows. The list goes on and covers just about everything you would want from
an all-encompassing security suite.
In terms of speed of operation, and the performance hit on the system, Kaspersky
Total Security is about on par with that of Bitdefender. Admittedly, it’s not as fast at

226 www.bdmpublications.com
Kaspersky Total Security Review

“Components such as Privacy “There’s a lot to like about Kaspersky’s


Protection are welcomed and flagship product. It’s quick, easy to use
remarkably useful to the end user.” and ticks all the right boxes.”

“The control centre


interface is uncluttered
and easy to follow
with plenty of options
available.”

www.bdmpublications.com 227
Protecting Yourself

McAfee Total Protection


Review
The name McAfee has been synonymous with antivirus and security since the late ‘80s and is
considered as the granddaddy of the computer security world. Its latest complete protection
package, Total Protection, has a lot to offer the end user, as you’ll soon see.

McAfee For Consumers


McAfee is now a part of Intel Security and as such it’s backed by the latest generation of hardware level security as well as it’s award winning software
scanning engine.
The name McAfee has seen some interesting press over the last decade, not top of the league of password management programs, does boast a multi-factor
just for the security software itself but also with regards to news reports on the authentication process. In addition, you can set individual True Key passwords for
company founder, John McAfee. The founder’s colourful lifestyle aside, McAfee all members of your family: up to five users.
Total Protection is a singularly impressive suite of tools. The cost is a little higher
Among the multitude of features you can find, File Lock an interesting addition. This is
than the previous entries, priced at £79.99 for a one year subscription. However,
an impressive encryption mechanism that locks your files behind an impenetrable,
one highlighted feature is the Virus Protection Pledge, whereby you get your money
military grade encryption wall. It’s not activated by default, which is understandable
back should McAfee not be able to remove a virus that’s already on your computer.
as encryption does still carry with it a higher level of user knowledge, and it’s not
It’s worth mentioning that the annual subscription includes installation on an unlimited something the average user will immediately consider adopting when setting up
number of devices; which is certainly worth considering if you’re one of the many their computer security.
modern households that owns countless Internet-connected devices, computers and
Performance wise, we’ve already mentioned that McAfee is somewhat slower than
everything in between. It’s an excellent choice for the home user, without doubt.
that of Bitdefender or Kaspersky but as with the other entries you won’t notice any
Installation and the initial full system scan were slower than that of Bitdefender perceivable slowdown in the computer’s operation with it installed. McAfee Total
and Kaspersky but only by about five minutes. If you’re constantly in a rush you Protection does an excellent job of keeping your files and personal information
may want to consider the other suites; however, most users will be satisfied with safe when online and with its added features it’s certainly worth looking at in
the result from McAfee. At least it gives you time to make a cup of tea whilst you’re greater depth.
waiting for the scan to finish.
Just as with the other products we’ve looked at, the interface is simple to
understand and navigate, with the core, and most used, functions within easy
reach of the mouse pointer; the more advanced options are neatly tucked
away for those who are a little more knowledgeable about such things.
In short, it works well and keeps the wealth of available options at
bay until the user requests them. Needless to say the settings are
extensive, allowing the advanced user a higher degree of control
over the way the suite of tools works within the system it’s
installed on. “McAfee Total
Protection, now a
McAfee’s three tier approach to system protection is worthy of
part of Intel Security,
mention too. First, the scanning technology does a thorough,
is certainly worth
fine-toothed comb inspection of the files on the system.
considering for the
Heuristic analysis then takes over, monitoring behaviour of
home user.”
files, functions and even code inspection to check for possible
unknown viruses based on the way they work. Lastly, anything
that’s even remotely suspicious is automatically uploaded to the
McAfee Global Threat Intelligence Lab for analysis. Should the code
prove to be a new form of virus, then the team behind the impressive
sounding lab will create a fix and push it out to the other two hundred
million plus McAfee users. It’s not nice getting a computer virus but at least
with McAfee you can be assured that your misfortune is helping others.
The Password Management feature is an interesting addition to the McAfee suite of
tools. In reality it’s Intel’s True Key Security component, which although not perhaps

228 www.bdmpublications.com
McAfee Total Protection Review

“There are ample features to explore


and utilise to improve your security
when online.”
“McAfee is simple to use, update and
monitor. Plus the added bonus of
unlimited device installation is an
alluring factor.”

“The scanning isn’t as quick as


the other products we’ve looked
at but it’s certainly as effective.”

www.bdmpublications.com 229
Protecting Yourself

Setting Up Windows 10
Security
Before we dig deeper into the many levels of Windows 10 security features, it’s worth taking a
moment to check that the initial security features are in indeed up and running, and doing what
they’re supposed to.

Are You Secure?


Remarkably, despite having an antivirus client installed, some users aren’t even aware of the default Windows 10 security features. Here’s a quick ten step
process to check everything is working as it should.

STEP 1 Start by clicking on the Windows Start Button or pressing the STEP 3 Should any of the options display No, then you’ll need to check
Windows key on your keyboard. Enter security into the search bar the setting relating to that particular feature. For example, if your
and click the first option that appears in the results, Security and Maintenance. User Account Control (UAC) is set to Off, click the Change Settings link under the
UAC option. The other features can be found via a search from the Windows
Start Button.

STEP 2 This will open the Security and Maintenance section of the STEP 4 UAC will warn you of any attempt to access a system critical file. If
Control Panel. There are two main sections within this page, click any malware wants to alter a file, then you’re asked if you want to
on the Security section to expand it. Ideally all the options within the Security proceed; obviously you don’t, so you can say no and investigate the issue. There
section should be displaying On, with the exception of Internet Security Settings are various settings to choose from but the second step down from the top is
which will display OK. the recommended.

230 www.bdmpublications.com
Setting Up Windows 10 Security

STEP 5 Close down the Security and Maintenance window, then click the STEP 8 If you click the Virus & Threat Protection Settings option, you
Windows Start Button and search for Defender. Click the resulting can further opt to improve the system protection. Make sure
Windows Defender Security Centre option. that all the sub-options are set to On and scroll down to define the program’s
default Notifications.

STEP 6 If you’re not using a third-party security and AV suite, then you STEP 9 Returning to the main Virus & Threat Protection page, you can
need to make sure that Windows Defender is activated and click the shield icon from the strip to the left of the screen; then
working. There are numerous options available in the new-look Creators Edition click on the Advanced Scan link, located under the Quick Scan button. Within are
Windows update of Defender. Each can be selected with a mouse click and options to run a Full System scan, a Custom scan (of a network location, for
viewed separately. example) or an Offline scan.

STEP 10 Lastly, click on the Firewall & Network Protection from the icon
STEP 7 Click the Virus & Threat Protection option. This will open a new strip to the left. Again, if you’re not using a dedicated, third-party
window allowing you to perform a Quick or Full Scan of the security suite, make sure that the Private and Public Firewalls are set to on, thus
system that details the number of threats found and the number of files scanned. protecting your system from unwanted intrusion.

www.bdmpublications.com 231
Protecting Yourself

Why Updating is Important


Continual updates, rebooting after an update has been installed, then the inevitable second reboot
straight after the first to apply the update: it’s little wonder people stray from the regular update
checks. Whilst it can be a pain though, keeping things up to date is a top priority.

Update, reboot, update, reboot


Updates may well be the bane of the modern computer user but they are there for a reason. It’s not the 8-bit era anymore, we need those updates to help
protect our security. Here are 10 reasons why they’re important.

PATCH VULNERABILITIES Windows updates patch recognised BROWSER UPDATES Windows 10 comes with many different
security holes in the core system. Many programs to make it a more appealing
of the viruses around today exploit a vulnerability in the Windows code that environment. They include Internet Explorer and Edge browsers. As a part of
hasn’t been fixed yet. So when an update comes along, that potential flaw will be Microsoft, these will need to be in tip-top working order to help prevent any
ironed out. modern Internet-borne viruses from entering the system. Daily update checks
will keep things in shape.

EXTRA SECURITY In addition to potential security glitches in the


code, often an update can contain an extra level of
security that’s been programmed in by the developers. For example, the code DEFENDER UPDATES Windows Defender and its other security
that handles remote desktop requests has had a security patch but another code elements will require at least one update a
that handles the authentication is hardened as a result. day to keep up with the latest virus definitions. This is a much needed aspect of
updating, as even if you only go online once every so often, being protected from
locally spread malware (USB drives etc.) is equally important.

232 www.bdmpublications.com
Why Updating is Important

FIREWALL UPDATES To expand the last reason, the Windows GENUINE SOFTWARE Non-genuine copies of Windows have been
Firewall is one of the first layers of security on a thorn in Microsoft’s side since illegal file
your system. With it, access to your computer from another source is monitored sharing on the Internet gained popularity. These days the act of downloading
and even blocked, stopping potential threats before they even hit the virus something illegal is rampant. Windows 10 updates ensure that you’re using a
defence layer. Updates make sure that the Firewall is up to scratch for the job. genuine copy of the OS, which will ultimately secure you PC against threats
from pirated copies.

OFFICE PATCHING It’s not just the Windows core files that require
regular updates, if you use Microsoft Office that FUTURE UPDATING Microsoft has big plans for the future of
can be a part of the overall Windows 10 update schedule. There are Windows 10, it’s often mentioned that this will
vulnerabilities in Office too, which when exploited can allow malicious code in be the last full version of the OS as they will be running Windows 10 as a service
the system. Tick the Give me updates for other Microsoft products box in as opposed to different versions over time. This means it will be a constant
Windows Update’s Advanced Options. update cycle with adding or removing of features. Updates ensure you’re running
the latest versions.

STREAMLINING CODE Updates not only patch any vulnerability,


they can also free up system resources by
improving the code and streamlining the available resources. In short, if your
SIGNED DRIVERS As well as Office, Microsoft provides base-level computer is performing better, then it can easily handle background virus and
drivers for most of the hardware available today. threat scans without affecting what you’re doing.
These drivers are signed and verified as safe, so any new piece of hardware
installed will work and will be safe according to the driver protection engine.

www.bdmpublications.com 233
Protecting Yourself

What to Keep Updated


and How
Discussing updates is one thing but how do you go about making sure that you have the latest
updates and that all the necessary components are being updated correctly? Thanks to the
improved update process of Windows 10, this is surprisingly easy.

Keeping Up To Date
Whilst it’s easy to update Windows 10, there are elements that can be missed. We’ve already mentioned that it’s not only Windows that needs updating but
also software and drivers.

STEP 1 The first port of call is undoubtedly Windows Update. Click on the STEP 3 If you click on the Advanced Options link under the Update
Windows Start button followed by Settings, the cog icon just Settings section, you can then tick a box that enables Windows
above the power icon on the strip to the side. This will open the Windows to automatically check for updates for other Microsoft products, such as Office
Settings interface, locate the last entry, Update & Security and click it. and so on. It’s recommended to make sure the box is ticked, for better security
and protection.

STEP 2 By default Windows Update will automatically check for, STEP 4 Within the Advanced Options page click the link for Choose how
download and install updates for the core Windows 10 files. You updates are delivered. This page details the way Windows
can check for any on the spot by clicking the Check for updates button; and you updates can be pushed to other computers on your network, or even the
can see what’s already been updated by clicking the Update history link under Internet. Whilst it’s a grand idea, there are concerns over privacy from some
the update button. factors of the community. It’s your choice but we prefer this option is Off.

234 www.bdmpublications.com
What to Keep Updated and How

STEP 5 Hardware drivers are usually automatically updated by Windows STEP 8 Third-party programs and applications also require regular
Update but whilst signed by Microsoft the drivers themselves update checks. Again, this is usually done automatically; when
aren’t always the latest versions. Therein lies a problem: even though signed, the you launch the program in question it often checks for the latest version. If
MS drivers won’t utilise the hardware as well as the driver developed by the not, look for links such as Check for Updates or similar, usually in the Help,
hardware manufacturer. About or even under the File menus of your favourite app.

STEP 9 If you’ve attached some hardware and Windows 10 hasn’t been


able to load a driver for it, and there isn’t any documentation
detailing the driver (this often happens with hardware purchased from eBay and
STEP 6 In such cases it’s often best to use the hardware manufacturer’s
the like), then you’ll need to hunt one down. Start by locating the device’s
driver, as this is more up to date and features security patches as
well as performance updates. For example, if you own an Nvidia graphics product name and number and enter it into a search engine.
card right-click the Nvidia icon in the taskbar and select Open Nvidia
GeForce Experience.

STEP 10 You can often force Windows 10 to locate a driver by right-


clicking the Windows Start button and choosing Device
Manager from the menu. In the Device Manager window, select the hardware you
want updating, right-click it and select Update Driver.
STEP 7 The Nvidia GeForce Experience allows you to improve in-game
graphics and check for the latest drivers. Usually this is done
automatically, and you are notified of any available drivers. However, If you want
to check manually, click on the Drivers tab followed by Check for Updates.

www.bdmpublications.com 235
Protecting Yourself

How to Secure Your


Web Browser
The web browser is possibly the weakest link in the entire security chain. It’s the software product
that’s on the front line, the one that will inevitably bear the brunt of any Internet attacks and as such,
attackers focus a lot of effort on making the browser a portal into your system.

Safer Surfing
Securing your web browser isn’t too difficult. There are plenty of options available, including some third-party add-ons you can use to improve security. For
this tutorial, we’re using Chrome.

STEP 1 Start by opening Chrome and clicking on the three vertical dots in STEP 3 With the Advanced Sync Settings box open, select the option for
the top right of the browser window. This is the link to the Encrypt all synced data with your own sync passphrase. Enter a
available options; from the list choose Settings. secure passphrase you can remember in the boxes provided and this will
enhance the security of all data synced between Chrome and the Internet.

STEP 2 It’s generally recommended that you sign into Chrome using a STEP 4 Look to the bottom of the Settings page and click the link for
Google account, as this can greatly improve the overall security of Show Advanced Settings. The first new section to appear under
the browser. For example, when you sign in, under the Sign In section in Settings, the Advanced settings is Privacy. Start by clicking on the Content Settings button.
click on the Advanced Sync Settings button, the first option available.

236 www.bdmpublications.com
How to Secure Your Web Browser

STEP 5 Content Settings allows a greater degree of control over Cookies, STEP 8 Under the Downloads section, it’s an idea to tick the box Ask
JavaScript, Flash, Pop-ups, your computer’s microphone and where to save each file before downloading. Again this can be a
even the webcam. It’s an extensive list so we can’t go into all the options within bit of a pain for the user; however it stops malicious background downloads
this limited space. For maximum security, disable JavaScript and Flash and from infecting your system, giving you more control and the ability to stop
make sure the mic and webcam are protected too. the process.

STEP 9 To the left of the Chrome Settings page you can see links for
Extensions, Settings and About; click the Extensions link. With the
Extensions page open, scroll down to the bottom and click the Get More
Extensions link.

STEP 6 Click the Done button when you’re finished with Content
Settings, to return you to the Chrome Settings page. Within
Privacy still, ensure the last option, Send a “Do Not Track” request, is ticked. This
will stop any tracking elements from monitoring your browsing activities.

STEP 10 With the Chrome Web Store launched, via the Extensions link,
search for Adblock Plus. Within the results, click on the Add to
Chrome button on first option for Adblock Plus. This will install an advertising
blocker within Chrome, securing you from any threats from Internet advertising.
Do the same for Blur (an anti-tracking add-on) and HTTPS Everywhere.

STEP 7 Just under the previous step’s tick box, it’s also recommended to
untick the two Passwords and Forms boxes that offer to enable
Autofill and Save your Passwords. Whilst it’s a pain to constantly enter
passwords, this will stop any hijack Chrome attacks from gaining your usernames
and passwords.

www.bdmpublications.com 237
Protecting Yourself

How to Secure Your


Home Network
We’ve mentioned previously that an attack doesn’t always come from the other side of the globe
but can indeed be a little too close to home at times. Home network hacking is possible with the
simplest of tools available on the Internet, often even just tapping into a cable.

Network Protection
Without being too paranoid, it’s remarkably easy to get into a neighbour’s home network. If you live in a block of flats or you use powerline adapters, you may
need to consider these ten steps for better network protection.

ROUTER PASSWORD The most common entry point to gain access DISABLE DHCP It can be a pain but try disabling DHCP on your router
to your network is via the router. The router and opting for static IP addresses. Every device that
from your ISP may well be offering the latest forms of encryption but it doesn’t connects to a DHCP router will receive an IP address. By eliminating that you get to
take a genius to trawl the less reputable sections of the Internet to obtain a list of specify the address range available. It’s not fool proof but it’s worth considering.
passwords. Therefore, change the default username and password to access it.

MAC ADDRESSING Most routers these days come with a form of


authentication called MAC (Media Access Code)
address filtering. Every networkable device, computers, tablets, games consoles,
come with a unique MAC address. The filtering allows you to enter the MAC POWER OFF According to Trustwave’s 2013 Global Security Report,
many home network hacks are conducted when the
addresses of your devices, so only they can be used on your router. Consult your
household is away or asleep. This leaves the hacker with ample opportunity to
router documentation for more details.
steal bandwidth and view files you may have on a NAS drive. The short, simple
solution is to power off the router at night and if you go out for the day.

238 www.bdmpublications.com
How to Secure Your Home Network

POWERLINE ENCRYPTION Powerline adapters are an excellent SHARE LESS Sharing resources and files from one computer to
resource for connecting wired another is perfectly fine but consider sharing less if you
network devices, without trailing lengths of cable around the home. However, live in close proximity to others. Once a hacker has gained access to your
depending on the adapter, it is possible to use another adapter to gain access to network, getting to any shared folders you have will be a doddle. In extreme
yours. Newer homes are common where you’re able to pick up another network, cases don’t share anything but generally tighten password control.
so use the encryption button if the adapter has one.

REMOTE ACCESS Remote administration on both the router and


computer certainly help you out when you’re not at
ETHERNET CABLES Cabling a home with Ethernet isn’t a difficult
the keyboard. Perhaps you connect to your home network from work? Whatever
project, this offers faster connection speeds
the reasons, it does leave a potential gap in your home network security. Consider
than that of wireless; but if you’re living in shared accomodation or a flat block,
closing it completely or double-checking the authentication is top notch.
make sure that any unseen cable lengths can’t be access by a neighbour. It’s
easy enough to splice into an Ethernet cable and steal bandwidth.

NETWORK MAPPING Consider using a network mapping program,


such as Open-AudIT, to gain a better
understanding of what devices are attached to your network. Become familiar
with the addresses, manufacturer, model IDs and so on of every connected
object. That way, should anything new appear, you’ll know it’s not something VISIBLE PORTS If you run a small office make sure that all your wall
ports are located in areas where they are secure.
you allowed. Behind desks and generally away from where the public or any visitors may be
able sneakily plug a laptop in.

www.bdmpublications.com 239
Protecting Yourself

What are Wireless Security


Standards?
Wireless security has adhered to a number of standards since 1999, each improving over
the last due to the ability for a then-modern computer to hack the security levels behind
them. Tighter controls are needed as computers and the way they connect have become
increasingly more complex.

WEP, WPA, WPA2, IEEE…


Amid the confusing acronyms lies a logical progression of wireless encryption and security protocols. Whilst at first they seem bewildering, it’s quite
interesting to learn of their history.

The technology behind delivering a wireless network has evolved over the last These standards are always moving forward and like most elements of the
couple of decades and so has the ways and means in which to secure it all. It’s not technology industry they come with a bewildering cocktail of acronyms and
just simply down to choosing a password that no one is likely to guess, you need meanings. Encryption and all things security can be a confusing topic, even for
to make sure that data and connection to a wireless network is encrypted to the experts. Here are the current, and most important, terms you should be familiar
highest possible standard. with when talking about wireless security standards, wireless networking and the
hardware that lies between your wireless communications.

IEEE
The Institute of Electrical
and Electronics Engineers is the
organisation responsible for setting
the entire wireless security industry, and
data communications standards. It was
founded, surprisingly, back in 1963 and
is regarded as the largest association 802.1x
of technical professionals in You’ve no doubt come
the world. across the numbers 802.11 when
looking at wireless-based and networking
documentation but what on earth does it
mean? 802.1x is the IEEE standard for providing
authentication and controlling user traffic across
wireless and wired Ethernet-based networks. It’s an
ideal application for providing authentication for
wireless networks, as it requires very little processing
power from the authenticator: the actual wireless
access point. The better the standard, ending
with a, b, g, n, ac and so on, the higher
the speed of communications
between devices.

240 www.bdmpublications.com
What are Wireless Security Standards?

WPA2
WPA2 is the upgraded
standard security technology of WPA. It’s
WEP
This is the original wireless
designed to offer the user an impressive 256-
encryption security standard, Wired
bit encryption key, which is virtually uncrackable
Equivalent Privacy. Whilst the protocol
unless you’re a secret research lab with a few billion
worked for the late nineties wireless networks,
dollars to spare on quantum computing and dedicated
it was soon overshadowed by the ever increasing
hardware decrypting processors. There are also different
power of the average computer. WEP uses a 40-bit
sub-standards within WPA2, with AES (Advanced
standard encryption key, which is a key consisting of
Encryption Standard) and TKIP (Temporal Key Integrity
either 10 or 26 hexadecimal digits. That sounds like a
Protocol), both of which are encryption methods,
lot of possible keys to crack but a modern, powerful
along with the lesser used CCMP (Counter
computer would be able to break 40-bit
Mode with Cipher Block Chaining Message
encryption in around 30 seconds; compare
Authentication Code Protocol).
this to months for a computer in the
late ‘90s.

Access
Point
Talking about access points, this
is the hardware that acts as a receiver
or transmitter for the wireless signal and
network. It can physically be a number of
WPA different components, such as a router, switch
Replacing the WEP standard, or powerline adapter but essentially it’s the
WPA (Wi-Fi Protected Access) provided hardware that converts a wired Ethernet
a much needed improvement for the ever network to a 2.4GHz or 5GHz wireless
advancing march of security. It became the signal and vice versa; it’s also
standard in 2003 and offered the user either 64-bit or referred as the WAP, Wireless
the more adept 128-bit key levels of encryption. A 64-bit Access Point.
key attack would take several lifetimes when it was first
introduced; these days it’s estimated that it would take
several months, maybe less if the attacker used several
computers working as a cluster. Naturally 128-bit key
lengths are mind-numbingly more complex and even
by today’s standards, the theoretical process of a
brute force attack would take more time than
the universe has estimated left to exist.
Which is a very, very long time.

www.bdmpublications.com 241
Protecting Yourself

How to Secure Your


Wireless Network
It may seem a little far-fetched but it’s not unfeasible for a hacker to sit outside your house with a
tablet or laptop and gain access to your home network via the router’s Wi-Fi signal. Understandably
it’s quite rare but it’s worth considering beefing up your protection.

Wi-Fi, Lock and Key


A lot of the standard tips on protecting your Wi-Fi merge with those of protecting your wired network. It’s common sense mostly and keeping an eye on
what’s going on in your own network.

ADMIN PASSWORD All routers come with a generic username and CHANGE SSID The Service Set Identifier (SSID) is the name of the
password. Depending on the model and router that’s broadcast so you’re able to locate and
manufacturer of the router, it’s surprisingly easy to get hold of the username and connect to it. Most routers will display the name and ISP, or the make and
password. For example, view www.routerpasswords.com and choose your router. model, making it easier for a hacker to find the information they need to gain
With that being the case, change the administrator username and its password. access. It’s recommend therefore to frequently change the SSID.

ISP PASSWORD ISP supplied routers tend to have their own set of HIDE SSID It’s also possible to select an option to hide your SSID from
usernames and passwords. Although these are more being broadcast. Whilst this doesn’t stop it being hacked, it
secure than that of the default set, they are still obtainable from the more dubious does make it a little more difficult for someone who’s casually looking around for
quarter of the Internet. A potential hacker will easily be able to get hold of sets of networks to access. You’ll need to consult your router documentation to find
passwords, so where possible change the ISP default username and password. how to hide your SSID for make and model.

242 www.bdmpublications.com
How to Secure Your Wireless Network

USE WPA2 Most modern routers will already come with the latest ROUTER RELOCATION Most users will have their router located
security standard enabled, WPA2; but there are instances of in the living room, near the master phone
some routers defaulting to a lesser security type for the sake of device socket. This means that not only will the router broadcast through the house,
compatibility. It’s essential that you ensure your router is using the latest and it’s also broadcasting over much of the street in front. Consider placing the
best form of encryption for your protection. router in a more central location of your house. This offers great coverage,
whilst limiting its signal reach beyond.

DISABLE WPS The WPS button on a router and a device will allow
ROUTER FIREWALL The firewall that comes with Windows 10 is easy pairing of the two without the need to enter the
good but the firewall from third-party AV encryption password. This is certainly convenient but someone who may gain
software is even better; and for extra protection, make sure that the router’s physical access to your router will be able to pair their own device. Look to
firewall is enabled and doesn’t have any potential leaks. turning off WPS in the router’s settings.

MAC FILTERING Filtering MAC addresses was discussed previously


but it’s worth repeating with regards to wireless
network security. By filtering those devices that are allowed to connect to your
DISABLE GUEST Some routers come equipped with the ability to router, and keeping an eye on what’s connecting, you’re able to control your
allow a guest network. This enables users to security to a far higher degree than usual.
connect to the router without requiring an encrypted password. Obviously this is
a potential huge gap in your home network security. If you have no need of a
guest network, then look to the documentation on how to disable it.

www.bdmpublications.com 243
Protecting Yourself

What is Encryption?
We’ve mentioned encryption and its impact on your privacy and security, but what exactly is it?
The definition of encryption is ‘the process of converting information or data into a code, to prevent
unauthorised access’.

Kryptos Communications
To better understand encryption it’s worth taking a moment to learn about its origins, how it’s been developed over the years and how it applies to our
modern communications.
The word encryption comes from the ancient Greek word Kryptos, which means be shared with everyone and is usually generated by software or provided by a
hidden or secret. Interestingly, the use of hiding messages from others can be traced designated authority. The private key is something that’s usually only known by the
back to early Egyptian scribes who inserted non-standard hieroglyphs within other individual user. Interestingly both types of keys can be applied, where one user has
communications in order to hide the message from casual viewers. According to a public key and another a private key, which can be combined to form a shared
historians the Spartans used strips of leather with messages engraved. When the encryption level.
strips were read they were meaningless but when wrapped around a staff of a
These keys are many characters in length, proving it nigh impossible for someone
certain diameter the characters would be decipherable.
to Brute Force hack them. The Brute Force method involves using a program on a
Of course, the modern forms of encryption are far more advanced but the overall computer to try every possible combination of a key until the correct one is found. In
core concept has remained the same: to be able to send a message to others the case of the 256-bit encryption, it would take 2256 different combinations to break
without anyone else being able to decipher it. However, modern encryption now the key. If you were able to force one trillion keys per second, it would still take you
requires more than simply sending coded messages. Not only is confidentiality somewhere in the region of 1057 years in order to crack 256-bit encryption. However,
required, encryption must perform a level of authentication, so the origin of the a powerful computer can probably manage around two billion calculations per
communication can be verified; integrity of the communications, where both second, so in theory it would take 9.250 years for your standard desktop to crack it.
the sender and those who receive the communication can be ensured that the Take in mind that the universe has theoretically only been in existence for 1.410 years.
message hasn’t been altered in between; and some form of nonrepudiation, where
Numbers as big as that are generally far too mind-boggling to comprehend. Suffice
the sender cannot deny having sent the communication in the first place.
to say that if you’re able to use 256-bit encryption for your communications or to
During the early digital age the only users of encryption were the government and protect your data, then you’re going to be protected for at least seven times the
military, and as such between them they created a set of algorithms and standards current age of the universe.
to protect the communication on the battlefield and from one government agency
to the next. These algorithms grew in complexity as technology advanced and it
wasn’t long before the military-based forms of encryption were being used in
commercial modes of communications. Within a few short years, bank transfers,
cash withdrawals and data sent to and from modems began utilising these
new protocols to protect sensitive information.
Today we’re regularly seeing and using devices that boast ‘military
grade 256-bit AES’ forms of encryption, a standard that is regarded
as nearly impossible to break without spending billions on
specialist hardware and software. In plain English, the modern
form of encryption takes data and passes it through an algorithm
together with a key. This creates a garbled file of characters that Encryption is the act of
can only be clearly read if the correct key is applied to decrypt
the data. Algorithms today are divided into two categories:
symmetric and asymmetric.
protecting your data from
Symmetric key ciphers use the same key to both encrypt prying eyes
and decrypt data. The most popular symmetric cipher is AES
(Advanced Encryption Standard), developed by the military and
government to protect communications and data. This is a fast form
of decryption that requires the sender to exchange the key used to
encrypt the data with the recipient before they’re able to read it.
Asymmetric key ciphers are also known as public-key cryptography and
utilise two mathematically linked keys, public and private. The public key can

244 www.bdmpublications.com
What is Encryption?

“Forms of encryption can be


traced as far back as ancient
Egypt, using non-standard
hieroglyphs.”

“Making data impossible to read


is just one step, you also need
the key to decrypt that data.”

“The universe is 14 billion years


old, but it would take seven
times that time to crack 256-bit
encryption.”

www.bdmpublications.com 245
Protecting Yourself

Encrypting Your
Windows 10 Laptop
Windows 10 Pro comes with Microsoft’s BitLocker program to encrypt the file system; however,
Windows 10 Home versions do not have this feature. Thankfully there are many encryption
programs available for download, we’re using DiskCryptor in this tutorial.

Windows 10, Under Lock and Key


We’re going to encrypt a 2GB USB flash in this example, purely for ease of use and to demonstrate how you can encrypt your entire laptop hard drive(s).

STEP 1 Encryption doesn’t affect the core data, other than making it STEP 3 It’s always best to ensure safe data before commencing with
impossible to read without the decryption key but it’s always anything like this. It’s also always worth doing (as we are) a test of
worth making sure you have a backup of all your data prior to any system related the software first, on a disk that you don’t mind messing up should you get the
changes. If you store your work or data in the Documents folder, then start by process wrong. Let’s start by navigating to the DiskCryptor homepage, at www.
opening it in Windows Explorer. diskcryptor.net/wiki/Main_Page.

STEP 2 Press Ctrl+A to highlight all the files, then press Ctrl+C to copy
them to the clipboard. Next, choose a suitable backup location
such as an external or network drive and when ready, press Ctrl+V to paste the
copied data into the new location. Then, should something go wrong, you have a
recent backup of your most used data.

STEP 4 Using the menu to the top left, click on the Downloads link. Look
for the latest version in the Download section and click the link
for the Installer. This will open a confirmation box, click the Save File button to
download the DiskCryptor executable file.

246 www.bdmpublications.com
Encrypting Your Windows 10 Laptop

STEP 5 The dcrypt_setup.exe file should now be in your Downloads STEP 8 You’re now offered a selection of available algorithms to
folder. Double-click it and select Yes to accept the Windows choose from. Click the drop-down box to view them all but we
confirmation. With the DiskCryptor setup window open, click the Next button recommend staying with the default AES algorithm for the time being. Leave
and accept the license agreement on the following page. For the remainder of the Wipe Mode box as None and when you’re ready, click the Next button.
the options choose the defaults, clicking Next. When done, click the Install
button and reboot the computer.

STEP 6 After a reboot, click the Windows Start button and locate the STEP 9 In the next section, choose a unique password for accessing the
newly installed DiskCryptor program. You will need to click Yes to encrypted disk; you’re notified how strong the password is. When
authorise its administrative access. With DiskCryptor open you can see the list of you’re ready, enter it again in the Confirm box. Click the OK box to start the
currently installed hard drives in your system. You can click each in turn and encryption process.
view its information at the bottom of the DiskCryptor window.

STEP 7 Start by selecting the disk you want to encrypt. In our example, as STEP 10 Depending on the size of the drive, and how much data there is
mentioned before, we’re going to test this out on a USB stick. We on it, the encryption process could take some time. When it’s
recommend you do too, until you’re comfortable with the process. With the complete you’re notified and the selected drive will the fully encrypted, with you
correct drive selected, either click the Encrypt button to the right or right-click being to access and decrypt it using the password you set up in the previous step.
and choose Encrypt from the menu.

www.bdmpublications.com 247
Protecting Yourself

Top Ten Encryption Tools


for Windows 10
There’s no shortage of programs that can encrypt files, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good
a solution.

Encryption Galore
Here are ten different encryption tools for you to consider that work well with Windows 10, and some previous versions too. Some are free, others cost but
they’re all good in their own right.

BITLOCKER Available only for users of Windows 10 Pro, Windows 8.1 7-ZIP Primarily a compression program, 7-Zip can also encrypt your data
Pro and Enterprise and Windows 7 Enterprise and with the AES 256-bit standard. It’s simple to use, completely free
Ultimate versions. If you’re running the Home versions, you’ll need to upgrade via and comes in either 32-bit or 64-bit versions depending on which type your core
the Microsoft site, or from the Windows Store. In short, BitLocker offers full disk Windows system is.
encryption with 128-bit or 256-bit AES standards.

VERACRYPT This is a free disk encryption program that’s based on the AXCRYPT Another excellent free program, AxCrypt offers 256-bit
popular TrueCrypt. It offers enhanced security, lots of encryption, easy to use interface, cloud storage integration,
levels of encryption and support for UEFI drives. It’s available for Windows password management, secured folders and is available in a multitude of
version 7 onwards as well as Mac OS X, Linux and even the Raspberry Pi. different languages. There’s support for Windows Vista onward as well as support
for files sizes over 4GB.

248 www.bdmpublications.com
Top Ten Encryption Tools for Windows 10

FOLDER LOCK An excellent and comprehensive folder locking GPG4WIN This entry is a little more advanced but once you master its
program, with support for 256-bit encryption and intricacies it’s an extraordinarily powerful program, and free.
Windows versions from Vista onward. It costs in the region of £40 but you’ll need It’s designed for file and email encryption, offering incredible levels of security for
to check for the most recent pricing. For your money, you get secure backups, Windows 7 upwards and Microsoft Outlook 2003 and newer.
USB protection, password wallets, a secure file shredder and much more.

CRYPTOEXPERT 8 Costing around £60, CryptoExpert 8 offer support DEKART PRIVATE DISK This is a simple and easy to use program
for Windows versions from 7 onward, unlimited that supports AES 256-bit encryption,
file size encryption, 256-bit AES encryption, unlimited secure file vaults and on compatibility with Windows Mobile, free unlimited support and updates; and
the fly encryption as you move and copy files around your system. it also includes its own firewall to help prevent hackers from gaining access to
your system.

CERTAINSAFE This is an interesting product, as it provides DISKCRYPTOR We used DiskCryptor in the previous tutorial as it’s a
cloud-based encryption for any files or folders you fairly straightforward program that can achieve high
upload into your online storage. It offers AES 256-bit encryption and an easy levels of encryption with ease. There’s a lot more you can do with it and you can
to use setup and integration into your cloud provider. It’s Pay as you Go, so get further support from within the product’s homepage.
you only pay for what you use.

www.bdmpublications.com 249
Protecting Yourself

What is a VPN?
Your system may be secure to any online threats but it doesn’t always mean your privacy is assured.
This is where a VPN comes in, as it offers the user a heightened level of anonymity when online and
even another level of security and protection.

Virtual Private Network


Using a VPN can help hide your online presence. Whilst this may seem like an ideal way to get to illegal content, it’s actually designed to help fight for your
basic right to Internet and digital privacy.
Essentially, a VPN (Virtual Private Network) is a server or group of servers in a remote Thankfully it’s not a lot, for the most part: you’ll be expected to pay in the region of
location that you can connect to through a client. The VPN servers then hide your £5 to £15 per month. This grants you better coverage and the ability to use up to five
Internet-bound IP address with their own, so if you connected to a VPN that’s or more different devices, including tablets and phones.
located in Australia then your IP address would be as if you were actually sat at a
Over the coming pages we dig a little deeper into VPNs, as you can imagine, using
desktop down under.
one will significantly improve your protection when online. In terms of Windows 10
The benefits of this are many but mainly a VPN will allow you to access region security, the use of a VPN is quickly becoming vital, so by the end of this chapter
restricted websites, protect you from tracking and shield your browsing activities you’ll be knowledgeable and helpfully utilising one to your own advantage.
from those who want to find out where you are personally based. Obviously there
comes a negative side, in the form of being able to access content that your country “A VPN isn’t just used to get access to
has deemed illegal for some reason but on the positive, VPNs have allowed people foreign online services, it can be used by
remote workers to access head office as
in countries with extraordinarily tight restrictions to get access to the outside world; if they were in the building”
often enabling them to report on what’s going on in their own country to the world.
However, for most users having a VPN means they’re able to gain access to TV
channels in the U.S., Canada, Europe and other parts of the world. It’s not always
about being able to moderately ‘cheat the system’ by forcing the Internet to
think you’re somewhere else other than where you actually are though. Remote
workers and employees who live in other countries can connect to company VPNs
and be able to use the company’s network resources as if they were physically sat
in the building.
The connection from your computer to the VPN server, via the client, is usually
secure to the tune of 256-bit encryption levels, depending on the VPN company who
is hosting the service. All your Internet traffic will filter through the VPN server’s
systems, offering multiple layers of protection from viruses, malware and
privacy. Beyond the other possible scenarios, using a VPN whilst you’re
abroad, working in a hotel for example, will enable you to access your
home country’s services and work resources. One more element
that’s worth mentioning is that using Wi-Fi hotspots is one of the
biggest security risk for travellers; using a VPN can effectively
improve your security whilst using a café’s free Wi-Fi.
Using a VPN will protect your
Most operating systems come with the ability to connect to a
VPN through their network settings. If you have the network
access online and filter all
and connection details of the VPN in question, then you’re able
to connect to it using the built-in Windows 10, Linux or macOS your Internet traffic through its
options. However, the more common, and in some respects,
easier method, is to use the client which most VPNs now offer as
standard. The client is often simply a connection window that will
secure service.
ask you your login details, then provide a method of allowing you
to connect to any of provider’s geo-location servers, listed by country.
Once the choice is made, you simply click the connect box and within
a few seconds your IP address will be located within the chosen country.
There are plenty of VPN providers to choose from and we’ll look at ten of the most
popular in a while. Some offer a free connection service that’s handy for quick
browsing but isn’t very fast. To gain access to faster servers, with better security
and protection features you need to pay a monthly or annual subscription fee.

250 www.bdmpublications.com
What is a VPN

“You’re able to access


web pages and Internet
services from all over the
world, even if you can’t
from your own country.”

“A VPN greatly improves


security for devices and when
you’re using free Wi-Fi at cafés
and other such locations.”

www.bdmpublications.com 251
Protecting Yourself

How Can a VPN Improve


Windows Security?
We’ve emphasised the enhanced privacy that a VPN offers when you’re connected to its services,
and the heightened levels of anonymity, but what security benefits does a VPN bring to a Windows
10 computer with an antivirus program already installed?

Security Beyond Anonymity


It’s a good question: how can a VPN improve Windows security? Whilst the privacy side is well catered for, there are some good security enhancements and
features a VPN brings to the table.

BROWSING ACTIVITY This doesn’t happen often but an ISP can THREAT PROTECTION To expand the previous feature, VPNs will
become compromised and details of user filter web pages that are dangerous or
activities leaked or stolen. Using a VPN can hide your browsing activity from contain threats. Even with a good antivirus client installed, you can still access a
trackers and even your ISP, enabling you to browse with freedom of fear of dangerous site. Using a VPN will stop the site from even being loaded.
having your details leaked or accessed by others.

ANTIMALWARE Many VPN providers utilise a level of antimalware into HIGHEST ENCRYPTION The connection between you and the VPN
their security layers. This enhances your security by server is encrypted to the highest possible
filtering any downloads through the VPN first. Should there be a virus present, standards. This makes it near impossible for some external element to gain
then it can be removed or stopped at the VPN before it even reaches you. access to the data you’re transmitting. Online banking and shopping are
extremely secure with a VPN.

252 www.bdmpublications.com
How Can a VPN Improve Windows Security?

WI-FI PROTECTION Public and free Wi-Fi hotspots are notorious AD BLOCKING
when it comes to mobile security. Anyone with
a little knowledge and some free tools via the Internet can intercept public Most VPNs will also add an
Wi-Fi network and hijack your connection, revealing all your data. A VPN will extra layer of security
encrypt the data and protect you. whereby they actively block
any advertising from
websites. Internet ads are a
necessary evil in some ways,
as they provide much
needed funds for your
favourite freely available
websites. However, some
contain malicious content
and need to be blocked.

SECURE TUNNEL If you’re working abroad, or you’re a remote USE HTTPS Using HTTPS instead of HTTP uses the secure side of the
worker, then a VPN connection to the company’s Internet protocol. Sadly, it’s not always implemented in
servers will ensure that all the sensitive business data will remain secure. It’s browsers or by users. Many VPNs will force all websites to use the secure
difficult for a company to ensure 100 per cent security with mobile and off-site connection that a HTTPS site offers, enhancing your browsing security.
workers but a VPN will provide a secure tunnel straight to the company itself.

MULTI-PLATFORM ZERO LOGS In some countries data retention laws are quite archaic,
with governments and other bodies being able to access
The availability of iOS and Android your data log for as long as you’ve been able to access the Internet. A good VPN
VPN clients means that your call won’t detail any logs of your browsing and in most cases won’t even hand over
data and data stored on your device any personal information relating to you to other agencies.
is also secure. Mobile VPN apps will
use the same levels of protection
and security, so your data can’t be
stolen when you’re not even aware
of it.

www.bdmpublications.com 253
Protecting Yourself

Top Ten VPNs


There’s no shortage of programs that can encrypt files, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good
a solution.

Encryption Galore
Here are ten different encryption tools for you to consider that work well with Windows 10, and some previous versions too. Some are free, others cost but
they’re all good in their own right.

CYBERGHOST CyberGhost is our favourite VPN. It offers 256-bit AES NORDVPN NordVPN offers two levels of encryption, access to fast
military grade encryption, no logging, access to 27 servers, no logging, a kill switch in case the VPN connection
countries and hundreds of servers, protected browsing, ad blocking, access to drops and you’re still surfing and support for multiple devices and operating
fast servers, unlimited traffic and bandwidth and an anti-fingerprint system. All systems. It’s well priced and is highly regarded among the press and media. Not
for around £5.83 per month for up to five devices. bad for a mere $5.75 per month (around £4.50).

HMA Despite its colourful name, Hide My Ass VPN is considered to be one PUREVPN With support for multiple devices, 256-bit AES encryption
of the best services available. Along with the usual secure 256-bit and access to 180 locations worldwide with 750 plus servers,
encryption connection you get blistering speeds, access to over 300 locations, PureVPN is a great choice for the home user. The cost varies depending on the
anonymous email use, a free web proxy access and free extensions for your package but expect to pay in the region of $5.90 (around £4.58). Just as with all
browser. Expect to pay around £5 per month. these VPNs, it’s worth checking for the latest pricing.

254 www.bdmpublications.com
Top Ten VPNs

VPN UNLIMITED VPN Unlimited offers a full firewall service with PRIVATE INTERNET ACCESS Private Internet Access VPN offers a
anti-malware, ad blocking and anti-tracking. There’s wealth of features with its
256-bit AES encryption, over a thousand servers in 70-plus locations, support for impressive service. 256-bit levels of encryption, no traffic logging, ad blocking,
up to five devices, fast servers and app support for iOS, Android and Widows support for five devices and access to over three thousand servers across twenty
Phone. Pricing varies but expect to pay around $8.99 (approx. £6.97) per month. five countries. It’s surprisingly cheap too, at just $6.95 (about £5.40) per month
depending on the package you opt for.

IPVANISH IPVanish is another highly regarded and awarded VPN VYPRVPN VyprVPN is an exceptionally good service that offer access to
service. For $6.49 (around £5) per month depending on the fast servers, multiple device support, unlimited bandwidth
package, you get access to fast servers, unlimited bandwidth, no logging, 256-bit and connection, 256-bit AES encryption and access to over seventy global
AES encryption and support for up to five different devices. locations and hundreds of servers. The Premium package costs just £5.83 per
month for a one year subscription, but check regularly for any changes.

TUNNELBEAR VPN TunnelBear VPN offers an initial 500MB per FACELESS.ME Faceless Me is an interestingly named VPN service.
month free service, moving up to $9.99 (around Amongst its features expect to see elevated levels of
£7.75) per month for unlimited bandwidth. For this you get access to fast servers encryption, unrestricted access, an easy to use interface and unlimited traffic.
across twenty plus countries, 256-bit AES encryption and support for Windows, You get 2GB per month for free but for $6.65 (around £5.16) you can have
iOS, Android, macOS and browser add-ons. unlimited access and traffic.

www.bdmpublications.com 255
Protecting Yourself

Using a VPN for Added


Security and Privacy
We’ve covered how a VPN works, how it can improve your security and given you a top ten chart of
recommended providers but we’ve not looked at how you would set one up and what it’s like when
up and running.

CyberGhost
We’re going to use CyberGhost as the example VPN for this tutorial. You’ll need to purchase one of the available packages to begin with, Premium is £3.74 per
month, while Premium Plus is £5.83.

STEP 1 We won’t use the free option in this instance, as the paid for STEP 3 Go to the Downloads folder and double click the CyberGhost
services offer a better set of features with which to display the executable followed by a click on Yes for the Windows
VPN in action. Start by navigating to www.cyberghostvpn.com and clicking on authentication process. Accept the agreement and follow the on-screen
the Pricing link in the upper portion of the main CyberGhost site for your regional instructions to set up CyberGhost on your PC; the default options are fine to use,
and latest pricing. unless you specifically require a different location for installation.

STEP 2 Assuming you’ve purchased one of the options, click the yellow STEP 4 Once the installation is complete you’re presented with the main
Free Download button located in the top right of the main page. CyberGhost client window. However, before you make a
This will, after a few seconds, automatically initialise the download of the latest connection, click on the Login link located at the top of the client window.
CyberGhost client software. Click Save File to download it to your
Downloads folder.

256 www.bdmpublications.com
Using a VPN for Added Security and Privacy

STEP 5 Enter your CyberGhost login and password that you set up STEP 8 Click back to the CyberGhost client and return to the main
when you purchased the package and click the OK button. Once window. Click the Home icon along the top of the client window
the login is confirmed you’re taken back to the main client window where the and then the Choose My Server button in the bottom right. This allows you to
available options for the account package you purchased will be displayed. choose your own server from the available countries that CyberGhost works with.

STEP 9 Look through the list and pick a server; we’re going to use one of
the Vienna servers in this instance. The Ping value is how fast the
server is, the lower the ping the faster the connection. Either click to highlight the
STEP 6 Before you use the service, it’s best to check a couple of things. server followed by clicking the Connect button or double-click to launch the
First click on the Settings link along the top of the client window. server connection.
In here you can see multiple options for the control, connection and how
CyberGhost will work with your PC. Generally speaking, the defaults are fine
unless you have a specific reason to change them.

STEP 7 One more thing before connecting to the CyberGhost VPN: open
a browser and enter www.ipcim.com/en/?p=where. This will
display detailed information based on your IP address, such as the ISP you’re
using, the country, city, even latitude and longitude, complete with a map and STEP 10 The CyberGhost client will take a few seconds to connect. When
it’s ready you’ll see a ‘You are currently protected’ message in
possible radius you fall into. This is the kind of information we want to secure
the client. Close your browser and relaunch it, then return to the www.ipcim.
from prying eyes.
com/en/?p=where page. You can see that the Internet now thinks you’re located
where the chosen CyberGhost server is, protecting and securing your privacy and
personal details.

www.bdmpublications.com 257
Online Protection and Disaster Recovery

258 www.bdmpublications.com
INDEX

Online Protection
and Disaster
Recovery
While you can successfully protect yourself and your own computer, as
soon as you make a connection to the outside world you’re under the
influence of many external factors. We look at how data is transmitted
from your computer to the Internet and how a canny hacker can
intercept that data for their own means.
Over the coming pages you’ll discover how best to protect yourself
and what strategies you can use to become more secure when online;
even when you’re out and about with your Windows 10 laptop and
other devices.

260 How Does Information Move Around 272 How to Secure Yourself
the Internet? on WhatsApp
262 How Can Internet Data be 274 What to Avoid when Creating
Intercepted? a Password
264 10 Tips to Protect Yourself Against 276 Password Generators and Tools
Interception 278 Top Ten Password Managers
266 How to Secure Your Devices 280 Shopping Online and Security
268 How to Secure Yourself on Facebook 282 How to Remove a Virus or Malware
270 How to Secure Yourself on Twitter from a Windows PC

www.bdmpublications.com 259
Online Protection and Disaster Recovery

How Does Information Move


Around the Internet?
Before we get into online protection and disaster recovery, it’s worth taking a moment to look at
how information moves around the Internet, in particular your information. Just how is data sent
from your PC across the Internet, to potentially fall into the hands of someone else?

Information Superhighway
The Internet is a huge, complex network of computers and is widely credited as humanity’s greatest achievement. It’s estimated that the Internet houses
something in the region of 1024 bytes of information, which is quite a lot.
That estimated 1024 bytes equates to an exabyte of potential information held by The protocols used throughout the Internet define what the data being
every single connected device that makes up the Internet, some of which is your communicated actually is. For example IMAP, Internet Message Access Protocol, is
information. It’s an impossible number to visualise, since we’re only using gigabytes a mail protocol for accessing email on a remote server, such as accessing Gmail.
or terabytes of storage in most of our devices. More to the point though, how on These protocols help further the transmission of data to its intended location,
earth does all that connect together, and how does it work? making it more accurate and telling the computer on the other end what it is and
how to piece together the jigsaw puzzle of packets that will be received.
To be able to transmit all that information, the data that travels around the Internet
is in packets. Each of these packets contains a header and a footer. The information Essentially this is how information is sent and received around the Internet.
stored in the header and footer contains the details regarding the data being sent. Obviously, there’s a lot more going on in the background than we’ve mentioned
For example, if you send an email to someone, as soon as you click the send button here. The complexity that you can go into when dealing with data transfers is quite
the data will be wrapped up in headers and footers, split into numerous packets staggering and a little bewildering at times. Suffice to say, all those packets of data
and sent on its merry way. contain information about something or someone and somewhere out there are
packets of data that contain information about you, where you are, what you’re
Whilst that sounds logical, much in the same way a telephone call takes place, the
doing, and other personal details such as bank accounts, passwords, names
reality is quite different. Those packets can take any route possible to get to the
and addresses.
destination, as defined by the header and footer. Those routes don’t necessarily all
have to be the same either. Some packets may travel from one server to the next via
one data pathway, while others will take another. The server at the other end will use
the information provided by the headers and footers to collate the message, reform
the data and present it to the email recipient the way in which you intended it to.
Remarkably, if the server at the other end detects missing packets it can
request the missing information from its available connections. Any
missing data can then be sent via an alternative route, updating the
information as it goes so other packets will know that the previous
route isn’t getting through. The headers and footers then tell the
server that the data packets are all present and what they should
look like; the email will arrive accordingly. The Internet is regarded as the
All this happens in milliseconds. This sounds incredibly complex
and on paper it makes the Internet appear to be a slow, lumbering
beast dealing with incomplete packets of data. In a way that’s
greatest human achievement,
how it works but instead of being a lumbering beast, the Internet
or more accurately, the servers and computers attached to it, are
and it’s not difficult to see why
fathoming data packets by the millions every second.
Just as we’ve seen, each computer on the Internet is connected
using an IP address. These are registered across the Internet, so the
headers and footers in each packet contain the IP address of the sender
and where the data is heading to. That way, it’s not just a random collection
of data travelling across the ether in the hope of landing in the right place. The
DNS, Domain Name System, converts the IP addresses to readable names, such
as Google.com and the like, and back again. That way when you enter the email
address someone@somewhere.com the DNS servers will convert the information
and the packets sent to the relevant destination.

260 www.bdmpublications.com
How Does Information Move Around the Internet?

“Data is split into packets, with


headers and footers telling
servers what to do with it and
where its going. ”

“Along with protocols, packet


information can take any
possible route to its destination
and it happens in a matter of
milliseconds.”

“DNS servers translate IP


addresses to readable locations,
the packets then know where
exactly to head to deliver the data.”

www.bdmpublications.com 261
Online Protection and Disaster Recovery

How Can Internet Data


be Intercepted?
We’ve seen how data travels around the Internet in packets and with the help of various protocols that determine
its source, destination and what manner of data packet it is. While that’s all well and good, it’s worth knowing how a
hacker goes about intercepting that information.

The data packets that make up a message, or a string containing a


username and password, are sent to and from yours and other
computers without most of us ever really knowing what’s going
on in the background. It’s this lack of knowledge that’s the
hacker’s greatest tool. Well, that and some clever software
that’s freely downloadable from the Internet. Let’s look at MITM
how data can be intercepted by a hacker. Let’s use the The first and most notable form of attack is called MITM or Man In The
scenario that you’re on a business trip, or just out and Middle. This attack utilises a set of free tools that can essentially grab data
about, and you’re using a café’s free, public Wi-Fi. packets from the locally used network. This means that the data packets
leaving your computer must travel through the free Wi-Fi’s network before
going off into the Internet to its destination. The MITM attacker can sniff out this
data, intercept the stuff that looks interesting, which can be done by reading the
There are numerous, and headers and footers and determining what the message/information contains,
quite ingenious, ways and decode it to view in plain text on their computer.
in which data can be
Think of this form of attack as a postman opening a bank statement letter,
intercepted by a hacker. writing down all your bank details, then sealing the envelope before posting
it through your door. The data packets are easily intercepted on the free
Wi-Fi and unless you’re using a HTTPS site, they take very little effort to
decode and read.

Man in the
Middle

Shoulder Surfing
Normally you need to Whilst not a technical way of intercepting data,
be using an unsecure hackers will still use the old tried and tested method of
stealing information simply by sitting close to you and
network, such as a public
peering over your shoulder whilst you enter login details
Wi-Fi but there are other or write an email.
ways and means.
It doesn’t take much skill, as we’re usually so busy
concentrating on other things that we often fail to
notice someone looking over our shoulder. However,
it’s a real and credible threat, so be wary.

262 www.bdmpublications.com
How Can Internet Data be Intercepted?

Fake Wi-Fi
This is another element to a MITM attack, also known as an Evil Twin.
Essentially a hacker can sit at the same café as you and everyone else and
use a set of tools that can pretend to be the actual Wi-Fi router belonging to
the café. This enables them to do several things: first, they’re able to beam out
the fake Wi-Fi signal to every device within range, which in turn (if the users have
their devices set to attach to any freely available Wi-Fi) will instantly connect to
the fake signal. Secondly, once they have a device connected, they’re able to
use their laptop and the tools therein to intercept all the traffic that’s being sent
to their fake Wi-Fi signal. Thirdly, the attacker can connect themselves to the
actual café Wi-Fi and act as a filter to the real connection to the Internet. The
victim isn’t even aware that their connection is compromised.
Naturally, this means that every single scrap of data is being filtered
through the hacker’s system. It’s just up to them to collect it all, decode
it and use the information within for their own gains.

Fake Sites
We’ve mentioned fake websites previously. This way of data
interception is often working hand-in-hand with the scenario we’re
using as an example. Combining the aforementioned Evil Twin and
packet sniffing methods, a hacker, who has taken the time to set up the
scam, can create several fake website front ends that mimic banking sites,
Outlook access, login pages and so on. They then host those sites on their
interception laptop, together with the Evil Twin fake Wi-Fi and should a user
connect and request the page of their bank they instead get the fake site that
the hacker set up.
The victim will then unwittingly enter their details, which will be stored by the
hacker before forwarding the victim to the actual bank website. The victim will
then be required to re-enter their banking details into the actual bank website.
For their part, they simply think they’re mistyped a password and
gain access to their account as normal. Sadly, the hacker
now has plain text information regarding all their
login details and can begin to transfer
money from their account.

www.bdmpublications.com 263
Online Protection and Disaster Recovery

10 Tips to Protect Yourself


Against Interception
While it may seem like fearmongering, detailing the ways in which data can be intercepted, it’s sadly
a real world fact. Public Wi-Fi, hotspots and free access points are the bane of the security industry.
Thankfully, there are ways in which you can protect yourself.

Public Safety
Despite the different and varied ways a hacker can gain access to your inbound and outbound data, there are means in which you can defend yourself. Here
are ten tips to help you protect your data from being intercepted.

TIP 1 Not all public Wi-Fi access points are havens for nefarious hackers TIP 3 Always double-check a website for spelling errors, older logos or
but that doesn’t mean you should let your guard down. Every anything else that may raise an alarm. If your banking website looks
security software and firewall in the world can’t help you if you’re not savvy when even remotely different from when you last used it, try and avoid logging into it
it comes to information security. If you’re going to use public Wi-Fi, don’t use it for until you get to a more secure Internet location.
banking or other highly personal detail transactions.

TIP 2 It may not always be possible to spot an Evil Twin fake Wi-Fi access TIP 4 Ensure you use the latest antivirus and antimalware definitions for
point. It’s often best to double-check with members of staff, if it’s a your security client. If you’re going to use public Wi-Fi, make sure
café, airport, restaurant or similar, that the Wi-Fi you’re connecting to is actually you’re up to date prior to leaving, especially airport Wi-Fi points, and that the
theirs and not one that’s being spoofed. Avoid Wi-Fi names like ‘Free Wi-Fi Here’ client is in good working order.
or similar.

264 www.bdmpublications.com
Online Protection and Disaster Recovery

How to Secure
Your Devices
Mobile device hacking is on the rise. Most people now carry a phone or tablet around with them
all the time, containing their emails, browser data, photos and enough personal information for
someone to be interested.

Ten Tips for Safer Mobiles


Your personal information is worth quite a bit to the right group of people. It’s not just Windows 10 security you need to keep in mind, you need to consider
your mobile security too.

SECURITY LOCK Locking your device is one of the most basic of MOBILE ENCRYPTION It’s possible to set up data encryption on
security tips for mobile devices. Either use a number mobile devices these days. For example, you
code, pattern lock or finger print to lock your device when not in use. Should can encrypt the entire device or just the part that contains emails and personal or
someone steal it, it becomes a little more difficult for them to gain access. That banking data. Either way, encryption will protect the contents of your device.
won’t stop a professional digital criminal, but it will deter the rest.

REMOTE WIPE If possible set up some form of remote wipe. Should BACKUP DATA Make sure that the data you have on your device is
your phone or tablet be stolen or lost, you’ll be able to regularly backed up. You may have umpteen security
use another Internet connected computer to send a delete signal to the lost elements in place but if the device is lost and you haven’t made a backup, then
device. You may never see the phone again but at least the personal data within your data is lost too.
is now out of the hands of others.

266 www.bdmpublications.com
How to Secure Your Devices

BLOCK INSTALLATIONS Try to avoid installing third-party apps. FALSE TEXTS Be aware of social engineering phone scams, Vishing
iOS devices are covered in this regard and Smishing in particular. Criminals love sending false
thanks to Apple’s walled garden approach to its app store. However, Android banking texts, links to fake websites and all manner of other scams designed to
users are particularly vulnerable. Don’t install anything from an unknown source gain access to your personal information.
and research plenty before installing anything.

POWER OFF WI-FI Remember to turn off your Wi-Fi when you
NO ROOTING Avoid jailbreaking or rooting your device. Whilst it’s leave the home or office network. If you
regarded as a positive process, to remove the built-in desperately require Internet access and don’t want the data charges, then
software from the manufacturer and give you control over the device, it often consider using a VPN if you’re connecting to public Wi-Fi points.
also opens your device to backdoors that were previously sealed. Unless you
know how to properly secure a device, leave rooting alone.

UPDATE SYSTEM Keep your system as up to date as possible. It MOBILE AV


can be a pain having to frequently accept update
and upgrade messages from your device, and waiting for the OS or the app to Download and install a
update itself, but more often than not an update will provide much needed good mobile antivirus
security patches. and malware tool set.
Bitdefender, McAfee and
all the other major
security companies offer
a mobile version of their
products and with it
you’ll be better prepared
for any potential
cyber attack.

www.bdmpublications.com 267
Online Protection and Disaster Recovery

How to Secure Yourself


on Facebook
Facebook has become one of the best sources for cyber criminals to gain personal information on
the Internet. Without realising it, a user is giving out reams of data and in most circumstances they’re
making it public.

Tips for Better Facebook Profiles


The dangers of social media aren’t just for young people, many adults have been duped into befriending someone they don’t know and exposing their
personal information.

Facebook’s policy forbids the use of fake names but it does allow nick Go to Settings > Privacy, and make sure that the Who can see my stuff
names to be used. Where possible, use your nickname instead of your section is set for just friends, as opposed to friends of friends or public.
real name. This will effectively hide your real name details from those who would This will effectively hide your Timeline contents from others and only your
wish to exploit it. confirmed friends will be able to see any updates.

Set up two-factor authentication, alerts about unrecognised logins and Never post any contact information on your profile. We often
make sure that emails from Facebook are encrypted. These can all be automatically start filling in the phone number field on a site but take a
found in the Settings > Security and Login section. moment to consider what the ramifications could be should your number be
made aware outside your circle of friends. That also includes house address too.

268 www.bdmpublications.com
How to Secure Yourself on Facebook

Tempting as it may be, try to avoid posting your location. Whether you’re Not all apps you install on your phone or tablet are good. Take a
at home alone, or you’re on holiday, should that information be made moment to read what an app will try to access when it’s installed. Often
available then a criminal will know that your house is empty or worse, that you’re a rogue app will attempt to access your Facebook account to farm for your and
alone in it. your friend’s information.

Try and avoid sharing random thoughts of the day, inspirational quotes,
fake news or other such items that appear on your Timeline from others.
Often these instances are created to farm for shares and likes and as such can
often be traced back to individuals who are simply looking for active
Facebook accounts.

Whilst in the Settings > Privacy section, consider editing the default
options for the Who can look me up fields. These will prevent the
public, or even friends of friends, from being able to find you on Facebook,
which in turn adds a higher level of security to your account.

Try not to accept every friend request you get. Take a moment to
check the person out and if necessary message them to find out who
they are and how they know you. If their comment is something like ‘we met
at the bar last month’ then it’s best to ignore the request, as they could be
fishing for information.

Finally, ensure that the Do you want search engines outside of Facebook
to link to your profile option is set to No. This will hide you from
someone who has entered your name into Google in the hope that they might
be able to find your Facebook account.

www.bdmpublications.com 269
Online Protection and Disaster Recovery

How to Secure Yourself


on Twitter
Twitter’s success has boomed in recent years. Where once it was simply one of the more popular
social media platforms, thanks to presidential candidates and scores of celebrities, it’s fast become
the modern media phenomenon.

Securing the Twitterverse


Sadly, due to its popularity, Twitter is a hotbed of scammers, spammers, hackers and social engineers scouting out the next potential victim for monetary
gain, or simply behaving abusively. Here are ten tips to help secure your Twitter account.

If you click on your profile picture and choose Settings and Privacy from We’ve previously mentioned the fact that using weak passwords is,
the menu, you’re able to set up a form of two-factor authentication unsurprisingly, not recommended. However, you’d be amazed at how
called Verify Login Requests. This will enable Twitter to use your phone number many people still use the likes of ‘password1234’ or something similar. Set a
to send texts for any login requests. So even if your password is compromised, good, strong password that will take some cracking.
the hacker can’t get in without the text code.

Just like most other social media platforms, phishing scams are rife on
Twitter. Be wary of anyone sending you Tweets claiming to be someone
you know, offering a too-good-to-be-true job or even informing you that your
account is compromised. It’s likely a phishing scam, so delete and report the There are many accounts
instance to Twitter. on Twitter that simply
aren’t real. These bots, as they’re
known, can be programmed to
post daily amusing, inspiring and
socially acceptable Tweets. On the
flip side, other bots are designed to
Tweet suspicious links to
virus-infested websites. In short,
unless you trust the account, don’t
follow any links.address too.

270 www.bdmpublications.com
How to Secure Yourself on Twitter

Within your account settings, you’ll see a menu to the left with a Word Muting is an excellent feature within Twitter’s account settings.
Privacy and Safety option. Click this to enable Twitter privacy, With it you’re able to mute any words you don’t want to see in your
Discoverability, Direct Message notifications, the ability to hide sensitive Tweets notifications or timeline. There are often Tweets you’d like to avoid even seeing in
and the removal of blocked accounts. It’s worth going through the list to further your timeline, so muting them is an ideal solution to help keep your account
secure your account. clean and free from negative aspects.

Direct messaging in Twitter is both advantageous and dangerous at the It’s always worth browsing through the Apps section in the Twitter
same time. Whilst great for communicating directly with another user, options. This is where you can allow or revoke access for any apps
it’s also used by others to lure in victims or send links to malicious websites. It’s you’ve used via the Twitter account; and you can also see what rights each
best to ignore most messages unless you know who they’re from. app has to your Twitter account.

If you use your Twitter account to login into any third-party apps or
games, then you may need to consider setting up a secondary Twitter
account. Whilst convenient, some apps can be hijacked to collect account
details, leaking them to hackers.

Like Facebook, be careful of what you post. It’s nice letting others know
you’re off on holiday to the Bahamas for several weeks but there could
be a rogue account that’s now informed of an empty house; and if you were
foolish enough to mention your address in previous Tweets, they know exactly
where to go.

www.bdmpublications.com 271
Online Protection and Disaster Recovery

How to Secure Yourself on


WhatsApp
With over a billion users worldwide, WhatsApp is proving to be a force to be reckoned with in the
social media marketplace. This messaging app was released over eight years ago and developed by
the Facebook team; since then it’s become the most popular messaging app.

WhatsApp Security Tips


With this popularity comes a darker side to messaging. Accounts of terrorists using WhatsApp, along with hackers, scammers and all manner of nefarious
individuals and groups are ever in the popular media.

Protecting your WhatsApp For added security you can


account can be done mainly opt for two-step
through the Settings > Account > authentication, which will require a
Privacy option. In here you’re able to PIN when registering your phone
secure your personal details, profile, number with WhatsApp. This is an
status, messaging and who can see absolute must for those who use the
your account. app regularly.

Beyond WhatsApp itself, make sure that your phone or tablet is securely
locked with an access PIN, pattern, facial or finger print recognition
system. This way, should you lose your phone, it will be locked against anyone
who tries to access it and WhatsApp.

Thankfully, WhatsApp
already encrypts and
secures messages sent from one
device to another. This means
that your data can’t be
intercepted and read. However,
you can opt to view security
notifications if a contact’s security
setting has been altered. This is in
the Settings > Account >
Security menu.

272 www.bdmpublications.com
How to Secure Yourself on WhatsApp

Generally you’re not able to add users to your chat list if you don’t If you don’t want WhatsApp contacts to see where you’ve been, you
already have them in your contacts list. However, clever phishing scams need to disable the Last Seen option within the Privacy settings. This will
can have a victim add a contact, who can then message them using WhatsApp; prevent other users from ‘seeing’ your movements. Should a malicious contact
as with all social media platforms, be wary of phishing attacks. be added, they will never know where you are or have been.

You can block users via the WhatsApp Web feature. Log into WhatsApp
Web, and click on the three horizontal dots by your profile picture. Then
click Settings and from there the Blocked option. You can select contacts to
block from WhatsApp.
Be wary of scams where you’re contacted through other social media
accounts informing you that your WhatsApp account has been
compromised. These often request you to add a so-called legitimate contact,
who in reality isn’t, or visit a webpage that’s riddled with malware.

You can block all images If you use WhatsApp Web it’s always best to ensure that you’ve logged
from appearing on your out of it correctly before leaving your computer. The last thing you need
photostream within WhatsApp. iOS is for someone to come over to your computer and view any conversations
users can look to their Settings then between contacts.
Privacy > Photos and deselect
WhatsApp from the list of allowed
apps. Android users will need to
create a file called .nomedia within
the WhatsApp images folder to stop
the app from listing pictures.

www.bdmpublications.com 273
Online Protection and Disaster Recovery

What to Avoid when


Creating a Password
Creating a strong password sounds easy on paper but when you’re presented with the password box
it’s easy to become stumped. Should you get past that part, there are also security rules to follow to
further protect that password.

PA55W0RD1234
To help you create the perfect password, and secure it further, here are ten tips for happier password management. There’s always password pitfalls but stick
to these general tips and you should be okay.

OBVIOUS DATES Never use your date of birth, partner’s date of birth, VISIBLE PASSWORD Never write your password down on a Post-It
children’s date of birth, pet’s names, family names note or somewhere near your computer. It’s
or even the town where you grew up in. This is all information that can easily be not too difficult for someone to visit your computer whilst you’re on a coffee
collected from social media sites or even a clever Internet search. break and read the note.

SAME PASSWORDS Never use the same password for multiple COMMON PASSWORDS Try and avoid using common words in
sites. It’s tempting and easy to have a single your password. Most password attacks are
password for everything but should that password ever become compromised brute force, using dictionary words to gain access. Avoid using sequences of
you will lose access to every site you visit, including any banking sites. numbers, such as 1234. Instead, try inserting numbers, capital letters and symbols
into words, such as C0m”o% instead of the word common, for example. However,
avoid common words altogether if possible.

274 www.bdmpublications.com
What to Avoid when Creating a Password

CHANGE REGULARLY Regularly change your password. Most LENGTHY PASSWORDS Don’t use short passwords. The longer
companies and good sites will require you to they are, generally, the harder and more
enter a new password that hasn’t been used previously in the last few months complex it will be should anyone try to crack it. A longer password that also
every thirty days or so. If not, then you should actively keep changing your utilises upper and lower case, numbers and symbols can’t easily be viewed by
password yourself. any shoulder surfers.

UNTRUSTED DEVICES Never enter your password on a device or SECURITY QUESTIONS In addition to creating a password, some
sites also offer a rescue security
computer you don’t trust. Entering your
question. Sadly most of these questions are a little too easy to get the
account details on a public computer, such as a kiosk or library, is dangerous as
answers for. Questions such as Mother’s Maiden name, first pet, town where
you don’t know what protection these machines have nor whether they’ve
you grew up, etc. can again be obtained by the clever hacker.
already been compromised.

STRONG PASSWORDS A strong password isn’t going to be easy to


remember at first. For example, something
like 8%&KY4&$XzwMhfrk will take a hacker around a hundred thousand years to
PUBLIC WI-FI Try to avoid logging into certain sites when you’re crack but it hardly flows off the tongue. Find a happy medium and make your
using public Wi-Fi. We’ve already covered how data password as strong as possible.
on a public, free Wi-Fi access point can be intercepted. Your passwords,
therefore, can be intercepted and viewed in plain text by a hacker.

www.bdmpublications.com 275
Online Protection and Disaster Recovery

Password Generators
and Tools
We’ve looked at some tips on what not to include when coming up with a strong password.
However, it’s not always as straight forward as that. Whilst some can come up with an elaborate and
incredibly strong password, others struggle. Thankfully, there’s help on offer.

Top Ten Password Generators


We live in an age where you don’t have to sit with a dictionary and cryptic decoder to come up with an excellent password. There are many generators freely
available to help you out. Here’s our top ten.

NORTON IDENTITY SAFE PASSWORD GENERATOR WIGHT HAT PASSWORD GENERATOR This online password
generator has been
Norton by Symantec, offers a handy free password online generator. You can set around for quite some time and has proved to be one of the best available for
the password length, include letters, mixed case, numbers, punctuation and no those after a unique and unbreakable password. There are ample options, and
identical characters. You can find it at: none of the passwords generated are stored remotely. Visit:
https://identitysafe.norton.com/password-generator/. http://strongpasswordgenerator.org/ for more information.

LASTPASS LastPass is a popular password management program, which


STRONG PASSWORD GENERATOR Another great online we’ll look at in the next section; it also offers a free password
resource that will create generator. Found at https://lastpass.com/generatepassword.php, this
an incredibly strong password based on the options you choose. You can choose excellent tool will help you create a strong and virtually unbreakable password
the length, punctuation and avoid similar characters but also display phonetic in seconds.
words to make it easier to remember. Try it out at:
https://strongpasswordgenerator.com/.

276 www.bdmpublications.com
Password Generators and Tools

MSD SERVICES An interesting site this, one that will allow you to XKPASSWRD This site is powered by the XKPasswd.pm Perl module,
create multiple unique passwords, based on length, which offers a range of settings to help create a unique
upper and lower case, number and symbols as well as whether the end result will and very strong password. There are plenty of options to choose from and you
be pronounceable or completely random. It’s at https://msdservices.com/ can save and load your preferred configuration for later. It’s at:
apg/index.php for those after several passwords. https://xkpasswd.net/s/ if you want to check it out.

SAFEPASSWD Another great site to have in your password arsenal.


LITTLELITE PASSWORD GENERATOR Another simple but
SafePasswd has been around since 2006 and is regarded
easy to use and good
as one of the best online password generators. The options are many and with
online password generator. LittleLite offers some options, including
them you can create something truly impossible to crack. You can find it at:
password length, number, upper and lower case, symbols and spaces. It’s
https://www.safepasswd.com/.
found at http://www.littlelite.net/pwdgen/ and certainly worth
considering bookmarking.

DINOPASS For kids at school or when online, DinoPass is an excellent


resource that will help them come up with a memorable, yet
strong password. You can choose between a simple or strong password type,
PASSEDS.NINJA This is a quick and easy online password depending on where it’s going to be used and there’s meanings of each to help
generator. You won’t get any options or added out, too. You can find it at:
extras, you simply click a button and ten unique passwords will be displayed http://www.dinopass.com/.
for you to choose from. It’s worth looking into for a quick solution to password
creation; https://passwds.ninja/.

www.bdmpublications.com 277
Online Protection and Disaster Recovery

Top Ten Password


Managers
Creating uncrackable passwords is one thing, remembering them for each of the services that require
one is something else entirely. The reason why most people opt for a single password for all their
accounts is simply due to not being able to remember them all. This is where password managers help.

Manage Those Passwords


Password managers differ in what they offer, how they work and what optional extras they provide. Therefore it can be tricky to find one that fits the bill.
Some are free, others cost a monthly or annual fee; here are ten to consider.

LASTPASS LastPass, which also offer a free password generator, is STICKY PASSWORD Sticky Password is available both as free or
regarded as one of the finest managers available. There’s a Premium versions, costing just £24 and offers
free version that offers unlimited password storage, cross-platform access, two-factor authentication, autofill for websites, advanced biometrics; it’s also
two-factor authentication and elevated levels of encryption. There’s also a available on all major platforms. The Premium version goes further with cloud
Premium version that offers a lot more, including 1GB of encrypted file storage backup and syncing and with every license purchased a Manatee is saved.
and higher levels of encryption. Certainly worth considering.

ZOHO VAULT Zoho Vault is another excellent password management DASHLANE With free, Premium and Business options available,
application. With a free version on offer, moving up to Dashlane covers a huge user base. Its features are many
Enterprise levels for just €7 per month, Zoho allows unlimited passwords, access and it offers the user a high degree of encryption and security alongside all the
from all platforms, password tracking, offline access, auto-login for websites and usual auto-filling, two-factor authentication and the ability to export data.
much more.

278 www.bdmpublications.com
Top Ten Password Managers

KEEPER Keeper is a powerful and feature rich password manager that KEEPASS KeePass is a freely available, open source password manager
has Individual, Family and Business plans available for £20.99, that’s regularly updated and comes with a long list of
£44.99, and £22 per year respectively. With unlimited password storage, unlimited interesting features. You can import and export password data, it’s fully portable
device syncing, finger print login and secure cloud backup, amongst others, it’s so there’s no installation required and it adheres to 256-bit AES encryption.
certainly one to consider.

1PASSWORD 1Password offer an individual and Family plan for as little PASSWORD BOSS Password Boss offers both free and Premium
as £2.30 and £4 per year. With it you can access password plans, with the Premium plan costing around
across all your devices and operating systems; there’s offline access, automatic £24 per year. There are ample features to enjoy, including cross platform
synching, 1GB of secure storage available and a 365 day password history recovery. support, full military encryption, cloud synching and more.

TRUE KEY True Key is an excellent password manager with a free LOGMEONCE LogMeOnce is an award-winning password manager
and Premium plan available; the Premium plan costing that incorporates many interesting features. It’s ultimate
around £29.99 a year. It’s unique in that it utilises facial recognition as well as selling point, however, is a passwordless operation, whereby you are able to log
finger print, and integration with Windows Hello. There are plenty of other in to any website or service just by using facial recognition. Prices do vary across
options available too, so it’s worth looking into. the Premium, Professional and Ultimate editions but the personal version is free.

www.bdmpublications.com 279
Online Protection and Disaster Recovery

Shopping Online
and Security
Windows 10 is continually improving and as such the new
updates have brought a more customisable degree of control
over the operating system’s privacy configuration; something
that Microsoft has always been criticised for in the past.

The length of breadth of online


shopping is far too vast to cover every
conceivable angle here. So rather than

10 Online
Shopping
Security Tips

focus on particular elements, here are


ten online shopping security tips to RUSH BUYING Don’t be
fooled into
apply across the board. rush buying something that’s at a
ridiculously low price. If a site is selling
an iPhone for £20, then it’s more than
likely to be a ruse to lure you in and
steal your money.

FAKE SITES Ensure that you’re


buying from a real
website. Fake sites are remarkably easy
to create by the clever hacker and are
designed to steal your transactions. Be
wary of sites other than the big names.
While smaller online shops are fine, just BOGUS EMAIL Strange email
look into the type of security it’s using addresses are
and do some research before purchasing. something to look out for with suspect
online shops. If the support email or
contact information for the site is
something like: ebayhelp@gmail.com
instead of support@ebay.com, then
there’s most definitely something wrong.

280 www.bdmpublications.com
Shopping Online and Security

STRONG PASSWORDS
USE HTTPS Remember to load
up the online shop
Use a strong and unique password for
using HTTPS instead of HTTP. This will
all your shopping sites. Occasionally,
ensure that the transactions and data
although not often, websites can be
sent between you and it are encrypted to
hacked and the database of users is
the highest possible levels. If possible,
leaked. If your password is strong
use a browser add-on such as
enough, it will stand up to any
HTTPS Everywhere.
decryption methods.

SHOPPING APPS
AVOID PUBLIC Wi-Fi
If possible, always use an online
Tempting as it may be, don’t use a public
shop’s dedicated app rather than the
Wi-Fi access point to conduct any online
standard website. Websites can be
shopping. For one, you could be attached
compromised, however apps from
to an Evil Twin Wi-Fi point, where the
iTunes and the Windows Store, for
hacker is filtering all information through
example, can’t be altered by a
their system and two, all your data can be
third-party.
intercepted and potentially read.

3RD PARTY SECURITY Invest


in one PAYPAL If possible use PayPal
or a Credit Card as
of the many third-party antivirus and
opposed to a Debit Card. Credit cards
malware suites, such as Bitdefender.
have an extra layer of protection and
These programs also offer extra security
legal standing than that of a debit card;
when shopping online and can help
PayPal features many protection
prevent any hacking or data interception
elements within its accounts too.
from happening whilst the transactions
are in progress. They can also check the
site you’re buying from, too.

BANK TRANSACTIONS
Always keep an eye on your bank
account and the transactions that go on
after you’ve conducted online shopping.
This will help you get an idea of what’s
going on and should something
suddenly crop up that looks suspicious,
then you’re able to inform your bank
before too much damage is done.

www.bdmpublications.com 281
Online Protection and Disaster Recovery

How to Remove a Virus or


Malware from a Windows PC
So far we’ve looked at ways to prevent getting scammed or indeed getting malware on your system
but what if you’re unlucky enough to already have some form of digital infection? Thankfully, there’s
a way to remove malware and viruses from your computer.

Malware Busters
For this tutorial let’s use a preconfigured rescue disk from Bitdefender. You need to transfer, or burn, the disk contents to a CD or a USB stick and boot into the
safe environment through one of those mediums.

STEP 1 Make sure you have a blank CD or a USB stick that’s at least 1GB STEP 3 Click the Next button and using the drop-down menu next to
in size. The Bitdefender Rescue Disk is downloaded as an ISO Removeable Drive choose the drive letter of your USB stick. Click
(which is an image file containing all the disk information) and can be Next to start the transfer of the image. Once the image is transferred click the
downloaded from www.download.bitdefender.com/rescue_cd/latest/ Finish button and remove the USB stick and power off your computer.
bitdefender-rescue-cd.iso.

STEP 2 To transfer the ISO to USB download Stickifier, which is an STEP 4 If you’re using a CD, start by inserting the CD into the drive. Locate
executable that doesn’t require any installation. Insert your USB the downloaded Bitdefender Rescue ISO, right-click it and choose
stick and double-click Stickifier. Click the Select an Existing ISO Image option Burn Disc Image from the context menu. Tick the Verify disc after burning option
followed by the three full-stops and using Windows Explorer, locate the and click the Burn button to start the process. Once the ISO is burnt to the disc,
downloaded Bitdefender Rescue ISO. Click the Open button to select the image you can power off your computer.
and continue with the process.

282 www.bdmpublications.com
How to Remove a Virus or Malware from a Windows PC

STEP 5 You now need to allow your PC to boot up into the Bitdefender STEP 8 You need to accept the license agreement notification first. Tick
Rescue CD environment. Power up your PC and open the Boot the I agree box, followed by clicking the Continue button. The
Option Menu. This could be accessed by pressing F12, depending on the make virus scanning software will then start to automatically update itself with the
and manufacturer of your PC motherboard. With the boot options available, latest virus definitions from the Bitdefender servers. The process won’t take too
select either the CD or USB stick and press Enter. long, so let it run through the update.

STEP 6 The PC will now boot into the Bitdefender Rescue Disc STEP 9 Once the update is complete you’re taken to the main
environment. This is a custom Linux operating system with all the Bitdefender Rescue CD antivirus interface. The three main
necessary Bitdefender security tools preinstalled. First, you need to choose options: Scan Now, Update Now and Settings are fairly self-explanatory; the
which language to load the environment. Use the arrow keys, and press Enter for Settings allows you to set a few more options regarding the scan, however the
your language choice. defaults will suffice.

STEP 7 Ideally you should use a wired Internet connection but if you’re STEP 10 To remove a virus on your PC, click on the Scan Now button.
on wireless, click on the network icon in the bottom right of the Select the drive you wish to scan and click the Open button to
desktop to establish a connection with your router. Once you’re connected to commence scanning the system. Any viruses found will be detailed along with
the Internet, double-click the red Bitdefender icon on the desktop, labelled options for removal. The process may take some time, so be prepared for a
Antivirus Scanner. lengthy wait.

www.bdmpublications.com 283
Online Protection and Disaster Recovery

Glossary of Terms
The bewildering world of technological terms is often difficult even for experts to navigate without
becoming slightly confused and we could easily dedicate an entire book just to the glossary.
However, here are some of the more important terms from the world of digital security and safety.

Digital Security A-Z


Digital security and safety terms are often as clear as mud. Use this glossary whenever you come across a term you don’t understand.

A
connected, infected computers that organisation’s internal network and
are used to flood a network or send an external network, usually the
spam message to the rest of Internet. DMZ’s help to enable the
the Internet. layered security model in that they
Access Control: A term used to provide subnetwork segmentation
ensure that resources are only Brute Force: A hacking technique that based on security requirements or
granted to users who are entitled uses all possible password
policy. DMZ’s provide either a transit
to them. combinations one at a time in order
mechanism from a secure source to
to gain access to a user account
Active Content: Code that’s an insecure destination or from an
or system.
embedded in a web site. When the insecure source to a more

C
site is accessed the code is secure destination.
automatically downloaded Denial of Service (DoS): Prevention
and executed. of authorised access to a system
Advanced Encryption Standard or network.
Cipher: A cryptographic algorithm
(AES): An encryption standard used in the encryption and Disaster Recovery Plan (DRP): A
designed to specify an unclassified, decryption process. plan of action used to restore
publicly disclosed, symmetric systems in the event of a disaster.
encryption algorithm. Cookie: A file used to store information
about a website that can be read Distributed Denial of Service
Asymmetric Cryptography: Public should the user ever visit the (DDoS): A type of DoS attack using
key cryptography, where algorithms site again. multiple attacking systems to
use a pair of keys, one public and amplify the amount of network
one private, to unlock the content Cyber Attack: An attack on a system
using malware to compromise its traffic, thereby flooding and
protected by the encryption. swamping the target systems
security. Usually in order to gain
Authentication: Used by systems to access to steal information or or networks.
confirm the identity of a user. demand a ransom. Domain Name System (DNS): The
Cyber Bullying: When an individual, domain name system (DNS) is the

B or group of individuals, threaten or way that Internet domain names are


post negative and derogatory located and translated into Internet
messages or doctored images of Protocol addresses. A domain name
is a meaningful and easy to
Backdoor: A tool used by hackers or someone online.
remember ‘handle’ for an
system security experts to access a

D
Internet address.
computer system or network,

E
bypassing the system’s usual
security mechanisms.
Bandwidth: The limited amount of Data Encryption Standard
communications data that any (DES): A popular method of data
channel is capable of sending or encryption using a private (secret) Encryption: The process of securing
receiving in a specific time. key. There are data by transforming it into
72,000,000,000,000,000 (72 something unreadable using
Biometrics: A security measure that quadrillion) or more possible cryptographic means.
uses physical characteristics to encryption keys that can be used.
authenticate a user’s access to Ethernet: Communication architecture
a system. Decryption: The process of for wired local area networks.
transforming an encrypted message

F
Boot Sector Virus: A virus that can into its original text form.
affect a computer as it boots, before
the operating system has Demilitarised Zone (DMZ): A
even loaded. demilitarised zone (DMZ) or
perimeter network is a network area Fingerprinting: Used by hackers and
Botnet: A large number of Internet (a subnetwork) that sits between an security experts to send packets to a

284 www.bdmpublications.com
Glossary of Terms

L
system in order to see how it Spoofing: An attempt to gain
responds, usually to determine the unauthorised access.
operating system and
security measures. Spyware: A type of malware that spies
Local Area Network (LAN): on a user’s activities or system and
Firewall: A hardware or software layer Communications network linking
reports back to a remote system.
designed to prevent unauthorised multiple devices in a defined, limited

T
access to or from a computer or location, such as a home or office.
network to another computer
or network.
Logic Bomb: A type of malware that’s
dormant until a predefined time
Flooding: A malware attack that causes when it explodes and runs or injects
an eventual failure of a system by malicious code into a system. Trojan Horse: A type of malware
bombarding it with a continuous designed as a useful program but in

M
stream of data. reality hides some malicious code.
Two-Factor Authentication:

G
Gateway: A network point that acts as
Malicious Code: Software that’s
designed to circumvent security
measures and gain unauthorised
Authorisation of access to a system
or resource through a username/
password combination as well as
another form of authorisation, such
the door into another network. access to a system.
as a PIN code.
Malware: A generic term to describe

H different types of malicious code.

V
Hacker: Someone who violates or
circumvents a computer security
measure. Can be used for malicious
N
Network: A group of linked computers
Virus: A type of malware designed for
multiple purposes to spread and
purposes or legitimately to test a infect as many computer systems as
or devices that can share resources
system’s vulnerabilities. and communicate with each other. possible. Usually destructive but can
be used to grind a system to a halt by
HTTP: Hypertext Transfer Protocol, the

P
using up all of its available resources.
protocol used by the World Wide
Web (Internet) that defines how VPN: Virtual Private Network, a secure
messages are sent, received and tunnel between two systems using
read by browsers and other Password: A secret security measure advanced encryption methods to
connected software layers. used to access a protected resource protect the communications
and authenticate access. between systems.
HTTPS: Hypertext Transfer Protocol
Secure, an encrypted and far more Phishing: A method used by cyber

W
secure version of HTTP. criminals to obtain information from
a user by baiting them with fake

I
emails or messages.
PIN: Personal Identification Number, Wi-Fi: A wireless network standard
used as a form of authentication between connected systems.
Internet Protocol Address (IP): A access to a system, resource or
standard used by servers user account. Worm: A type of malware that can
and machines to connect to each replicate itself and spread through

R
other and form an individual identity other systems consuming resources
for each connected device. and contents destructively.
Internet Service Provider (ISP): A
company that provides Internet
access to businesses and
residential addresses.
Ransomware: A type of malware that
locks, or encrypts, all files on a
system until a ransom is paid and
the unlock code is entered.
Z
Zero Day: Described as the day a new
IP Spoofing: A form of attack where a
device provides a false IP address to Rootkit: A set of tools used by a hacker security vulnerability is discovered,
a server or network. to mask their intrusion and obtain one that has no fix or patch yet to
administrator access to a system. stop it.

K
Key Logger: A type of malware that
S
Zombie(s): A computer that’s infected
with malware and connected to a
network or the Internet and used to
spread its infection to other
can record key presses as a text file
Sandbox: A system architecture
designed to test code in a secure computers. Used also to describe an
and send that file to a remote attack on other systems by hoards of
and safe environment without it
source. Once obtained, the hacker zombie computers.
affecting the host system.
can then see what keys
you’ve pressed.

www.bdmpublications.com 285
Black Dog Media
From Beginner
Master
Master YourYour
Tech Tech From Beginner to Expert
to Expert
To continue
To continue learning
learning moreYour
more about about
PCyour tech visit10
& Windows usvisit
at: us at:
www.bdmpublications.com
FREE
FREE Tech Guides
Guides

Microsoft
PC Edge Browser
& Windows 10 Have You Been
Samsung Hacked?
& Android

Apple iPhone, iPad, Photography, Coding Python,


Mac, MacBook
Windows 10 Tips&&Watch
Tricks Windows Security
Photoshop Risks
& Lightroom 100GB FreePiCloud
Raspberry Storage
& Linux

EXCLUSIVE
EXCLUSIVEOFFERS
Offers on
on Tech
our TechGuidebooks
Guidebooks
G Print & digital editions
G Print & digital editions
G Featuring the latest updates bdmpublications.com/ultimate-photoshop
G Featuring the very latest updates Buy our Photoshop guides and download tutorial
G Step-by-step tutorials & guides
G Step-by-step tutorials and guides images for free! Simply sign up and get creative.
G Created by BDM experts
G Created by BDM experts
Check out our latest titles today! When you sign up to our
PLUS SPECIAL DEALS and Bonus Content monthly newsletter!

BDM’s Desktop Series


8th Edition - ISSN 2050-1137
2021 © copyright Black Dog Media Ltd. All rights reserved.
Editorial and design are copyright © Papercut Limited and
All editorial opinion herein is that of the writer as an
individual and is not representative of the publisher or
PLUS BDM’s Desktop Series: 5th Edition is an
independent publication and as such does
is reproduced under licence to Black Dog Media Limited. any of its affiliates. Therefore the publisher holds no not necessarily reflect the views or opinions

SPECIAL DEALS
Published by: Black Dog Media Limited (BDM) responsibility in regard to editorial opinion and content. of the producers of software, applications or products
Editor: Russ Ware Notice: Before purchasing this publication please read contained within. This publication is not endorsed or
Art Director & Production: Mark Ayshford and ensure that you fully understand the following associated in any way with Microsoft or any associate or
Black Dog Media Limited reserves the right not to be held
Production Manager: Karl Linstead guidelines, if you are in any doubt please don’t buy. affiliate company.
Design: Lena Whitaker, Martin Smith responsible for any mistakes or inaccuracies found within

and Bonus Content


Editorial: Russ Ware No part of this publication may be reproduced in any form, the text of this publication. Therefore the publisher,
All copyrights, trademarks and registered trademarks
Sub Editor: Alison Drew stored in a retrieval system or integrated into any other editor and their respective employees or affiliates will not for the respective computer software and hardware
publication, database or commercial programs without accept responsibility for loss, damage, injury occasioned companies are acknowledged. Windows is a
Printed and bound in Great Britain by: the express written permission of the publisher. Under no to any persons acting or refraining from action as a result trademark of Microsoft Corporation, registered in the
Acorn Web Offset Ltd circumstances should this publication and its contents be of the content with this publication whether or not any United States and other countries. Windows ©2021
Print Services supplied by: Media First (International) Ltd resold, lent, loaned out or used in any form by way of trade such action is due to any error, negligent omission or act Microsoft Corporation.
Newsstand distribution by:
without the publisher’s written permission.
employees or affiliates.
Sign up to our monthly newsletter
on the part of the publisher, editor and their respective
Assorted images used within this publication are

bdmpublications.com/ultimate-photoshop
Seymour Distribution Limited
and get the volumes
latest
Some contentupdates, offers
2, East Poultry Avenue, London EC1A 9PT While we pride ourselves on the quality of the reproduced under licence from Shutterstock.com
information we provide, Black Dog Media Limited The articles in these pages that follow are intended as may have been published in previous
International distribution by: reserves the right not to be held responsible for any a guide only. We are not advising you to change your or BDM titles. We advise potential buyers
Buy our Photoshop guides and download tutorial
Pineapple Media Limited
www.pineapple-media.com
mistakes or inaccuracies found within the text of this
publication. Due to the nature of the software industry, and news from BDM.availability,
device, and would actually advise against it if you have
Prices, international
even the slightest doubts. There are potential risks to
Weratings, aretitleshere
to check the suitability of content prior to purchase.
and
the publisher cannot guarantee that all software and/ content are subject to change.
images for free! Simply sign up and get creative.
Digital distribution:
Readly AB, Pocketmags, Zinio, Cafeyn, Magzter
or tutorials, tips, guides will work on every version of
the required hardware. It remains the purchaser’s sole
to help youAll information
the hardware and software involved, and you must be
Master
aware of these before you decide to alter anything on Your Tech!
was correct at time of print.
responsibility to determine the suitability of this book your device. Read all of the information here carefully
International Licensing: and its content for whatever purpose. Any images and then make up your own mind whether you want to For all advertising and promotional opportunities please
Black Dog Media has many great publications and all are reproduced on the front and back cover are solely for follow our guides. We take no responsibility for damage contact: enquiries@bdmpublications.com
available for licensing worldwide. For more information design purposes and are not representative of content. to your smartphone, tablet, computer or any other
go to: www.brucesawfordlicensing.com; email: bruce@ We advise all potential buyers to check listing prior to device used in the process. If you are unsure, please do Black Dog Media Limited (BDM)
brucesawfordlicensing.com telephone: 0044 7831 567372. purchase for confirmation of actual content. not buy this publication. Registered in England & Wales No: 5311511

.
Discover more of our
guides today...
The Complete The Complete The Complete The Complete

Linux Python Nikon Outdoor


Photography
Manual Manual Manual Manual

Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT

The Complete The Complete The Complete The Complete

MacBook Photography
Manual
Photoshop Raspberry Pi
Manual Manual Manual

Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT

The Complete The Complete The Complete The Complete


Lightroom macOS Python & Photoshop
Manual Catalina C++ Elements
Manual Manual Manual

Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT

The Complete The Complete The Complete The Complete


Samsung Windows 10 macOS
iOS 14
Galaxy Manual Big Sur Manual
Manual Manual

NEW
for iPad &
iPhone

Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills Expert Tutorials to Improve Your Skills
100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT 100% INDEPENDENT

You might also like