Loading page

Dell Laptops Are Shipping With A Superfish-Like Certificate Vulnerability

Security researchers recently revealed that a certificate with security vulnerabilities has been shipping pre-installed on some Dell laptops. Here’s what you need to know about this Superfish-like vulnerability, and how you can check to see if your Dell laptop is affected.

Turn An Old Mac Into A Cheap VPN With OS X Server

VPN subscriptions cost money, and they often require a bit of research just to figure out if they’re legit. If you have an old Mac sitting around, you can make use of it by turning it into the simplest DIY VPN around, perfect for browsing safely on public Wi-Fi or grab files from your home computer on-the-go.

Create Hidden Administrative Accounts In OS X From The Terminal

Mac: If you share a computer, you might not want everyone who uses your computer to see your username in the login window or fast user switch menu. To hide your name, MacIssues points out you’ll just need a little bit of Terminal skills.

How To Create An Untraceable Messaging Device With An Old Phone

Secret, anonymous messages aren’t just for the dastardly. Luckily, a little privacy isn’t difficult to get. With some effort and a spare phone, you’ll be whistleblowing, protecting your privacy from harassers, and staying anonymous when selling on Gumtree or looking for dates on Match. Here’s how.

Ask LH: What's The Point Of Incognito Mode And Other 'Secret' Browsers?

Dear Lifehacker, I’ve noticed that most internet browsers have a “secret” or “incognito” mode in their options. I was just wondering what the benefits of using this mode are? Does it hide my browsing history from everyone, or just people who use my computer?

Three Ways To Remotely Monitor Someone Else's Computer

Spying on someone’s computer is bad. As in “go to jail” bad. However, there are a few very narrow exceptions, like monitoring your kids or employees. If you fall in this category (or just want to know how someone might be monitoring you), here’s how.

Erase Your Mac's User Folder For A Quick And Dirty Data Wipe

If you’re selling off or donating your computer, doing a full, secure wipe is an important step to protecting your personal data. But if you’re just handing your corporate Mac back to your company or giving it to a family member, Six Colours points out that deleting the user folder is a simpler, if less secure, way to get rid of your info.

Ask LH: Does A VPN App Hide All My Phone's Internet Traffic?

Dear Lifehacker, does a VPN app on a phone make all internet traffic go through it? I’m heading to London and Iceland and want to use unsecured Wi-Fi for banking and email. Do the VPNs push Safari as well as things like the Facebook app through them to be secure? Cheers, Mickus.

Snowden's Preferred Messaging App Signal Now Available On Android

Data retention laws in Australia are in full swing. For those of us who value our privacy and want to encrypt our messages and calls can get the Signal app, which has just been released on Android. The app has been endorsed by the world’s most famous privacy activist Edward Snowden.

Loading page