We select and review products independently. When you purchase through our links we may earn a commission. Learn more.
X
X
The Best Tech Newsletter Anywhere

Join 425,000 subscribers and get a daily digest of news, geek trivia, and our feature articles.

Sign Up Here arrow indicating signup email field.

How to Host Your Own VPN with Algo and Cloud Hosting

Companies all over the world sell VPN services to secure your online activity, but can you really trust a VPN provider? If you want, you can create your own virtual private network with the open-source Algo software, and the …

Do You Need Anti-Ransomware Software for Your PC?

Unlike other types of malware, you can’t just clean up ransomware and go on with your day. A run-of-the-mill virus won’t destroy all your data and backups. That’s why ransomware is a hazard you need to prepare for in advanc…

What Is Smishing, and How Do You Protect Yourself?

You’re probably familiar with email-based phishing, where a scammer emails you and tries to extract sensitive information like your credit card details or social security number. “Smishing” is SMS-based phishing—scam text m…

What Is a Wangiri or “One Ring” Phone Scam?

All day, strange foreign numbers have called your phone. They’re from a country you’ve never visited. Each time the digits change slightly, making it impossible to block them. They ring for just a few seconds before hangi…

How to Install a Video Doorbell

A video doorbell is the best smarthome gadgets you can own. But, if you’ve never installed any doorbell before, the actual installation can feel a little daunting. It’s a pretty easy installation process—we’ll walk you thro…

How to Set Up a Smarthome Without the Cloud

The easiest smarthome tech uses the cloud to do the heavy lifting. But that means you give up your privacy. And if the company shuts down, so does your smarthome. Here’s how to bypass the cloud in your smarthome setup….

How to Protect Your Smarthome from Attack

Every new device you introduce into your smarthome is another device that can be attacked. You can secure your smarthome with simple steps like locking down your router and taking proper care of the gadgets in your smarthome….

Should You Pay Up If You Get Hit by Ransomware?

It might be your worst nightmare. You turn on your PC only to discover it’s been hijacked by ransomware that won’t decrypt your files unless you pay up. Should you? What are the pros and cons of paying off cyber-criminals…

Tired of Robocalls? Stop Answering Your Phone

The robocall problem keeps getting worse. Nearly half of all calls come from automated systems, and that number is increasing. Tired of answering your phone and talking to robots, scammers, or scammer robots? Just stop answer…

Update WinRAR Now to Protect Your PC From Attacks

Do you have WinRAR installed on your Windows PC? Then you’re probably vulnerable to attack. RARLab patched a dangerous security bug at the end of February 2019, but WinRAR doesn’t automatically update itself. Most WinRAR inst…

Wi-Fi Cams Do More Than Just Record Video

The main purpose of Wi-Fi cameras is to record video, but that’s not the only thing they can do. Modern Wi-Fi cams are sophisticated pieces of hardware and they can do a lot more than simply record video….

Why Do Some Websites Block VPNs?

One of the only ways to protect your right to privacy and information online is to use a VPN. Some websites infringe on those rights by blocking VPNs, but they do it for a good reason.
How-To Geek is where you turn when you want experts to explain technology. Since we launched in 2006, our articles have been read more than 1 billion times. Want to know more?