Home

How to Delete and Disable Location History in Windows 10

Your devices collect all kinds of information about you to provide helpful services and deliver so called targeted advertising. To help reduce the impact of these less than helpful services you may want to restrict your personal location information that’s stored in Windows 10.

So, here’s how to turn off location services in the Windows 10 Creators Update and delete your personal location history.

Disable Location Services

Some Windows Store apps in Windows 10 require your current location to work correctly, while others would like it in order to tailor your experience. Before you turn off location services keep in mind that any location-specific services or apps will no longer be available to you.

If that’s okay with you, open the Settings app by clicking the Windows Start button and then selecting the cog icon in the lower left-hand corner. In the Settings app go to Privacy > Location and turn off the slider labelled Location service.

Disable per-app Instead

If restricting your location data systemwide is too extreme, Windows 10 lets you do it on a per-app basis. However, this feature will only work for apps built with the Windows Store platform.

In the Settings app go to Privacy > Location, and toward the bottom of the screen is the heading Choose apps that can use your precise location. This is followed by a list of apps that want to use your location, each with a corresponding on/off slider. The only one you can’t change is Cortana, because the personal digital assistant requires your location to work. Other than that, you can restrict access to your location on a per-app basis.

Next, it’s time to delete location history. You can do this regardless of whether you’ve turned off location services for your device.

In Settings > Privacy > Location, scroll down to the sub-heading Location history. Click the Clear button in that section to erase your location history on your PC or tablet. Once the history has been cleared, a checkmark appears next to the Clear button.

That was easy enough, but we’re not finished yet. Your location history is also stored on Microsoft’s servers. Below the Clear button, click the link labelled Manage my location info that’s stored in the cloud.

That will take you to the location section of your Microsoft Account’s privacy settings. On the right-hand side of this page look for the section called Clear location activity.

Under that heading is a button with the same title. Click Clear location activity and a pop-up appears asking you to confirm your choice, because you cannot undo this action. Click Clear and you’re done. If you want to be extra-sure, refresh the web page and you’ll see that the map it displays no longer shows any location data.

That’s all there is to clearing your location activity in the Windows 10 Creators Update. If you don’t want your location used at all, you should restrict your browser from asking for your location as well.

Use the Windows 10 Calendar App to Look up Days and Dates

In the Creators Update of Windows 10, Microsoft has finally included a fully featured Calendar App. They have also redesigned the taskbar so that clicking the clock at the right side (which shows the date and time) pops up a usable calendar.

By default, this pop-up calendar shows the current month, with today’s date highlighted. You can use the up and down arrows just above the calendar headings to scroll back and forward one month at a time to find a specific date, but there’s a much faster way to navigate around this app.

Click the date heading, which shows the current month and year, to replace the current month’s calendar with a list of months in the current year, with the current month clearly highlighted. You can then use the up and down arrows to move through the calendar one year at a time, or click the Year heading to switch to a display of decades where you can choose the exact year you want.

See all your Calendars at a glance in Agenda view

If you decide to connect your personal or work email account to the Windows 10 Calendar app, you can see appointments, meetings, and events for the selected day in an agenda view just below the pop-up calendar.

The only setup you need to do to make this view possible is to open the built-in Calendar app and add each of your online calendars to it. Click the Settings icon, then click Manage Accounts. Any accounts you’ve added from the built-in Mail app will appear here. If you want an account to show only mail and not calendar appointments, open the account settings, scroll down to the Sync Options section, and slide the Calendar switch to the Off position.

After you set this up, you can ignore the Calendar app completely. If you use Google Calendar on the web, for example, you can continue to manage appointments and events in your browser, and they’ll show up automatically in the Windows 10 agenda view. The same is true if you use Office 365 or Outlook.com with Microsoft Outlook.

Each calendar you attach gets its own colour coding. Appointments in the agenda have a matching stripe at the left so you can tell at a glance whether an upcoming appointment is from your personal or work calendar.

Create a Single-Column Start Menu in the Windows 10 Creators Update

If there’s one thing Microsoft loves to do, it’s play around with the Windows 10 Start Menu. The Windows 10 Creators Update is no different, with Microsoft adding an interesting new setting for all of you who prefer an uncluttered desktop experience.

Microsoft has now made it easier to simplify the Start Menu into a single column without dumping the live tiles. What this new Start Menu setting does is create a single view, where you can switch between your live tiles and your apps list.

To achieve this simplfed view, open the Settings app and go to Personalization and then click Start. Scroll down past the preview to the list of on/off sliders and turn off the one that’s labelled ‘Show app list in Start menu’. Don’t worry, because even if you turn this setting off you will still be able to get to your apps list.

Now, we’ve got a single view of live tiles, but it’s still arranged horizontally. If you like that look, just leave it as is, but if you want a single column you’ll need to move all your live tile groups from the right over to the left.

To do this, hover over the name of the live tile group you want to move and then just click and drag. If you have difficulty moving the groups, use the two horizontal lines on the right as your click-and-drag target.

Now, to switch between live tiles and the app list just click one of the two icons in the upper-left corner of the Start Menu.

The only downside to Microsoft’s new setting is that you can’t have the Start menu show your app list by default.

An alternative is to not mess with you Start settings and just move your live tiles over so that you have one column of tiles and one column for the Windows 10 app list.

Move your default Windows 10 data folders to a different drive

When you add a new user account, during initial setup or even sometime afterward, Windows 10 creates a user profile folder in C:\Users, with your username (or the variation you have set) as the name of the profile folder.

It then fills the new profile with default data folders such as Documents, Pictures, Music and Videos. For most Windows 10 users, this is a perfectly acceptable set up.

However, in some circumstances it makes perfect sense to move one or more of these subfolders to a new location.

If you have a desktop computer with a small solid-state drive as the system C: drive and a much larger data drive for storage, you can stop a large digital media collection from overwhelming your C: drive by moving the Pictures and Music folders to your separate data drive, probably your D: drive. If you do not have a separate data drive they are fairly cheap to buy and are easy to install into a desktop PC.

To move a folder, open C:\Users, double-click your user profile folder, and then right-click any of the default subfolders and select Properties. On the Location tab, click Move, and then select the new location for that folder. (If you enter a path that doesn’t exist, Windows will offer to create it for you, as long as you have a spare D: drive or some other external drive.)

Just repeat this simple process for any other folders you might want to move to your separate data drive.

Note: Only move the folders in your Users folder. Never move your entire user profile to another drive!

How to Get Out of Windows Safe Mode if you’re stuck in this Mode

What if you find yourself stuck in Windows Safe Mode after having been in Safe Mode to fix some problem or run your antivirus and malware programmes.

If you first entered Safe Mode by using the System Configuration tool, this could well be your problem as your PC may keep booting into Safe Mode every time your PC starts up.

To check if that is the case Press Win + R, and then type msconfig in the resulting run box, and click the OK button. This opens the System Configuration view. Select the Boot tab. If you find the Safe boot option is checked, uncheck it. Then re-boot your PC and it will re-boot to your normal desktop display.

TIP: As a rule you should never use the System Configuration tool to enter Safe Mode, unless you have good reason to reboot multiple times into that particular environment.

If you find that the Safe boot option is not checked, try getting to the Windows Start Up Boot Menu. How you do this depends on your Windows version and the age of your particular PC set up.

If you are running Windows 7, re-boot your computer and press F8 repeatedly. Once the Advanced Boot Options Menu comes up, select Start Windows Normally. This might also work on some Windows 8 PCs, or on some PCs that were upgraded to Windows 10.

Luckily, there’s another way to do this in Windows 8 and 10. Go to the Shutdown Menu, and hold down the Shift key as you select Restart. Now select Troubleshoot > Advanced options > Startup Settings > Restart.

Your computer will reboot. But instead of loading Windows, it will bring up a Startup Settings screen with all sorts of options. Press Enter ‘to return to your operating system.’

When your PC re-starts it should now boot straight into your normal Windows desktop.

How to spot if an email is a phishing attack?

One of the biggest problems in online security is the phishing email. So many unsuspecting people fall pray to this sort of attack that the incidence of phishing is actually on the increase. Phishing for financial gain is certainly on the rise and you could even be the next victim of this sort of phishing attack.

To avoid being a potential target, here are four things to look out for that show whether an email is safe or potentially dangerous.

1. If the Email is Unsolicited

Legitimate companies never email users asking for personal information. Neither would they send an email unannounced asking you to download an attachment. No matter how real the email looks, if it is unsolicited and it is asking you to do something, it is most likely a scam.

This is especially true for phishing attacks pretending to be from your bank. According to data from Kaspersky Labs, for the first time in 2016, the detection of phishing pages which mimicked legitimate banking services took first place in the overall chart, leaving the long-time leaders of this chart – global web portals and social networks – way behind.

2. If the Email Exhibits Poor Grammar and Spelling

Emails from legitimate sources generally make sure that there are no typos, no spelling errors, and good grammar. Professional companies have teams of people dedicated to proof reading all marketing material that it sends out. Hackers often lack these good writing skills. As well as this, they may not have English as their native tongue. If this is the case, you can assume that a foreign criminal probably wrote the text in their own language and then used a translation tool to convert the text into the English language.

This means that if you have an email purporting to be from your bank and it has various examples of bad spelling and grammar, then it is most likely not from that bank but from a criminal.

3. Beware of Mismatched URLs

Criminals try to fool victims into clicking on links that to the average reader look like the real URL of a legitimate website, but the hyperlink is actually a URL belonging to a criminal. You can prevent visiting the link by hovering you mouse arrow over the link, because most browsers will display the real URL link at the bottom of a browser window. If that URL in the email does not match with the link the arrow hovers over, it is most likely a fake that could lead you into a phishing trap.

4. Beware of fake URLs in your Email

Legitimate emails will feature URLS that lead back to an official website of a company. The URL will have a straightforward name (i.e. yourtrustedbank.com). A criminal will try to make a URL look like a real website as much as possible, such as yourtrustedbankp.com). Users should always check any link before clicking on it. Better still, always check a URL by cutting and pasting the link into a search engine, like Google. A scam should reveal itself in the first page of search engines results.

This type of phishing activity is not just limited to banks, according to Kaspersky’s research, criminals have even created fake URLs containing the word ‘steam’ in order to make the URL even more like the original, which could deceive inexperienced gamers who play games using the Steam program.

So make sure you never click on a link, or download an attachment, without checking that the links are genuine.

The Danger of Rootkits

A rootkit is a collection of program tools that enable user-level access to a computer or a computer network. Typically, a hacker installs a rootkit on your computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking your password. Once the rootkit is installed, it allows the attacker to mask its intrusion and gain root or privileged access to your Windows PC.

A rootkit may consist of spyware and other malicious programs that monitor traffic and keystrokes, create a “backdoor” into the system for the hacker to use, attack other machines on a network and alter existing system tools to escape detection.

Rootkits often try to enter your PC by executing a phishing attack, where a hacker tries to trick you into running an executable file (.exe) in an email attachment, or via a hyperlink distributed via email or instant messaging. Once they are in place, rootkits are not too easy to find or get rid of.

The rootkit threat is not as widespread as viruses, malware and spyware. But removing rootkits is largely a reactive process. You will only notice changes to your computer after you are infected by a rootkit.

Is There Really a Rootkit Problem?

To determine if there is truly a rootkit operating behind the scenes, use a system process analyser such as ‘Sysinternals ProcessExplorer‘ or, better yet, a network analyser. By using these tools, you will probably be surprised to find what programs are doing and what is going in and out of your PC’s network adapter. You may also discover that you simply have an over-worked PC running with too little memory or a severely fragmented hard drive.

However, if your computer is normally super-fast with no lack of memory or hard drive issues, but still slows down and even starts to behave badly, then a rootkit attack could be the cause. But equally these symptoms could be the result of a virus or a spyware attack.

It is one thing to find a rootkit, but quite another to remove it and any spyware it is probably hiding. In fact, it may or may not be possible. In many cases you will never really know if you are infected since a rootkit can often interfere with your scanning and removal programs.

Before you even try to remove a rootkit make sure you take a backup all your important data files.

Rootkit Detection and Removal Using Software

Sysinternals, F-Secure and Kaspersky all offer standalone rootkit detection tools, Sysinternals RootkitRevealer  (is only for Windows XP (32-bit) and Windows Server 2003 (32-bit),  F-Secure Blacklight and Kaspersky TDSSKiller.

Even Microsoft has implemented rootkit detection features in its own malicious software removal tool.

Tip – For an extensive list of rootkit detection tools see ’16 Free Rootkit, Trojan Horse, Virus and Spyware Removers for Windows 10′ – www.geckoandfly.com/4696/the-best-rootkit-virus-detector-detection-and-remover-scanner.

Removing a rootkit with cleaning tools may actually leave Windows in an unstable or inoperable state depending on which files were infected and subsequently cleaned. Or, worse, a well-coded rootkit could conceivably detect the removal process and self-destruct taking your data out with it!

If these cleaning tools do not find anything, or they do find a rootkit but cannot delete it, then you could keep trying other tools, but there does come a point time when you have to evaluate if the effort is worthwhile. Perhaps you should just wipe your Hard Drive and re-install your Windows Operating system.

Some Defences Against Rootkits

To truly protect your computer, make sure you always read the current user instructions for your scanning tools to see what special steps you need to take before, during and after the clean-up process.

Then, after you’ve found and cleaned a rootkit, re scan your system to double-check that it was fully cleaned and the rootkit has not returned.

To help stay protected from rootkits you should regularly update all your software. This includes programs like your antivirus programme and any spyware or malware programmes you make use of.

Also keep all of your Microsoft software up-to-date by turning on Windows Automatic Updates (for Windows 10 – Settings – Update & Security/ Windows Update). Your computer will automatically download Microsoft security updates when your computer is online.

How to remove Malware from your Windows 10 PC

Is your PC running slower than usual or are you getting lots of unwanted pop-ups? If so, your computer may be infected with Malware.

Short for “malicious software,” Malware refers to software programs designed to damage or do other unwanted actions on your computer system. Common examples of Malware include viruses, worms, trojan horses, and spyware. In particular, Spyware can gather data from your PC without you even knowing it. This can include anything from the web pages you visit to personal information, such as credit or debit card numbers.

Although other problems such as hardware issues can produce very similar symptoms, it’s best to check for Malware if your computer is beginning to act strangely.

First Download Malware Scanners

Fortunately, running a Malware scanner is enough to remove most standard infections. If you already have an antivirus program active on your computer, you should use a different scanner for this malware check, since your current antivirus software may not have detected the malware. Remember, no antivirus program can detect 100% of the millions of malware types and variants.

There are two types of antivirus programs.

1. Real-time antivirus programs, which run in the background and constantly watch for Malware.

2. On-demand scanners, which search for Malware infections when you open the program manually and run a scan.

You should have only one real-time antivirus program installed at a time, but you can have many on-demand scanners installed which ensures that if one program misses something a different one might well find it.

If you think your PC is infected download an on-demand scanner first and then follow up with a full scan by your real-time antivirus program. (Among the free, and high-quality, on-demand scanners available are BitDefender Free Edition, Kaspersky Virus Removal Tool, Malwarebytes and Microsoft’s Malicious Software Removal Tool)

Enter Windows Safe Mode before you run these programmes

If you think your PC may have a Malware infection, boot your PC into Microsoft’s Safe Mode. In this mode, only the minimum required programs and services are loaded so if any Malware is set to load automatically when Windows starts, entering Safe Mode may prevent it from doing so. This is important because it allows any malicious malware files to be removed easier, since they are not actually running or active.

To boot into Windows 10 Safe Mode, first click the Start Button and then select the power button as if you were going to reboot, but don’t click anything just yet. Now hold down the Shift key and click Reboot. When the full-screen menu appears, select Troubleshooting, then Advanced Options, then Startup Settings. On the next window click the Restart button and wait for the next screen to appear. Next you will see a menu with numbered startup options; select number 4, which is Safe Mode.

You may find that your computer runs noticeably faster in Safe Mode. This could be a sign that your system has a Malware infection, or it could mean that you have a large number of legitimate programs that normally start up alongside Windows.

Delete all your Temporary files

Now that you are in Safe Mode, you should run a virus scan. But before you do that, delete your temporary files. Doing this may speed up the virus scanning, free up disk space, and even get rid of some Malware. To use the Disk Cleanup utility included with Windows 10 just type Disk Cleanup in the search bar or after pressing the Start button and select the tool that appears named Disk Cleanup. Select the drive you want to clean (probably your C Drive) and then click OK. In the list that appears select Temporary files and then click OK. Disk Cleanup will ask you if you want to permanently delete these files, so click Delete Files.

Once you have run one or two on demand antivirus programs and your real-time antivirus program try running a scan with Malwarebytes.

Run the setup file for Malwarebytes and follow the instructions to install the program. Once the program opens, it will automatically activate a trial of the paid version that enables real-time scanning. You will not get charged after the trial ends, as the program reverts to the standard free version in 14 days. In the meanwhile, you can disable the real-time scanning for those two weeks if you prefer.

To run a scan, switch from the Dashboard tab to the Scan tab. Keep the default scan option (Threat Scan) selected and click the Start Scan button. It should check for updates before it runs the scan, but make sure that happens before you proceed. Depending on the speed of your computer, a Threat Scan can take anywhere from 5 to 20 minutes. While Malwarebytes is scanning, you can see how many files or objects the software has already scanned, and how many of those files it has identified either as being Malware or as being infected by Malware.

Once the scan is complete, Malwarebytes will show you the results. If the software gives your system a clean bill of health but you still think that your system has acquired some malware, consider running a Custom Scan with Malwarebytes and trying the other scanners mentioned earlier in this email. If Malwarebytes does find infections, it will show you what they are when the scan is complete. Click the Remove Selected button in the lower left to get rid of the specified infections. Malwarebytes may also prompt you to restart your PC in order to complete the removal process, which you should do.

Even if the Malware appears to be gone, run a full scan with your real-time antivirus program to confirm that result.

Fortunately, running a Malware scanner in Safe Mode is enough to remove most standard infections.

However, if Malwarebytes automatically disappears after it begins scanning and won’t reopen, you probably have a rootkit or other deep infection that automatically kills scanners to prevent them from removing it. With this scenario you might be better off reinstalling Windows 10 after backing up all your files. Copy all of your files to an external USB Drive or flash drive. If you check your email with a client program (such as Outlook or Windows Mail), make sure that you export your settings and messages to save them. You should also back up your device drivers with a utility such as Double Driver, in case you don’t have the driver discs anymore or don’t want to download them all again.

Once you have backed up everything, reinstall Windows either from the disc that came with your PC, by downloading the installation image from Microsoft, or by using your PC’s factory restore option, if it has one.

Remember, you cannot save installed programs. Instead, you’ll have to reinstall the programs from discs or re-download them.

Finally fix your web browser

Malware infections can damage Windows system files and other settings. One common malware trait is to modify your web browser’s homepage to reinfect the PC, display advertisements, prevent browsing, and generally annoy you. So before launching your web browser, check your homepage and connection.

For Internet Explorer right-click the Windows 10 Start button and select Control Panel, then Internet Options. Find the Home Page settings in the General tab, and verify that it’s not some site you know nothing about. For Chrome, Firefox, or Edge, simply go to the setttings window of your browser to check your homepage setting.

Keep your Windows 10 PC clean

Always make sure that you have a real-time antivirus program running on your PC, and make sure this program is always up-to-date. If you don’t want to spend money on yearly subscriptions, you can choose one of the many free programs that provide adequate protection, such as Avast, AVG, Panda, or Comodo. Also run Malwarebytes daily or weekly to check for Malware intrusions.

Keep Windows and other software up-to-date. Make sure that you have Windows Update turned on and enabled to download and install updates automatically.

How to deal with Ransomware Like Petya or WannaCry

The short answer is to do a combination of things such as perform a reliable backup, make sure your PC is protected and use automated removal tools if the worst happens. These things can be a solid defence against the growing menace of Ransomware.

Ransomware does not sneak into your PC like ordinary malware does. It suddenly appears and demands cash, otherwise it may encrypt all the files on your Windows PC.

A form of Ransomware similar to Petya has attacked the Ukraine and other sites around the globe, encrypting files until a ransom has been paid. Researchers, though, have moved quickly to block the spread of the Ransomware, also known as Petrwrap, exPetr, Petna, and SortaPetya.

There is no real way to remove Petya Ransomware, but researchers have come up with a few ways to immunise your Windows PC and malware companies are working hard to block it completely.

We will just have to wait a while until these ‘solutions to the threats’ are applied to defeat the current crop of Ransomware.

Petya is the second major Ransomware outbreak in the last two months, following WannaCry, which appeared to leverage software the National Security Agency developed, and was then turned into malware. It struck the U.K. National Health Service and several other banks and organisations.

Ransomware Hits You Where It Hurts – So Prepare Well Against Possible Attacks

A few common-sense habits can help limit your exposure to malware and Ransomware.

Keep your computer up to date via Windows Update. WannaCry doesn’t even try to attack Windows 10, choosing instead Windows XP and other older Windows operating systems.

Ensure you have an active firewall and anti-malware solution in place. Windows Firewall and Windows Defender are barely adequate, so a good third-party anti-malware solution is far better. WannaCry patches are already available, even for Windows 8 and Windows XP.

Ensure that Adobe Flash is turned off, or surf with a browser like Google Chrome, that turns it off by default.

Turn off Microsoft Office macros, if they are happen to be enabled (In Office 2016, you can ensure they are off from Options – Trust Center – Trust Center Settings – Macro Settings).

Never open questionable links, either on a webpage or especially in an email. The most common way you will encounter Ransomware is by clicking on a bad link. Likewise, stay out of the bad corners of the Internet. A bad ad on a legitimate site can still inject malware if you are not careful, but the risks greatly increase if you end up surfing where you should not.

For dedicated anti-malware protection, consider Malwarebytes 3.0, which is advertised as being capable of fighting Ransomware. RansomFree has also developed what it calls anti-ransomware protection. Typically, however, anti-malware programs reserve anti-ransomware for their paid commercial suites.

You can download free anti-ransomware protection like Bitdefender’s Anti-Ransomware Tool, but you will only be protected from four common variants of ransomware. Kaspersky also claims that it can block Petya or Petrwrap by simply rolling back changes via its System Watcher component.

Backing Up Your PC Could Be a Good Strategy

Ransomware encrypts and locks up the files that are most precious to you so there’s no reason to leave them vulnerable. Backing them up is a good and solid strategy.

Take advantage of the free storage provided by OneDrive, Google Drive and others, and back up your data frequently. (But beware, your cloud service may back up infected files if you don’t act quickly enough.)

Better yet, invest in an external hard drive, such as the WD 1TB Elements Portable External Hard Drive, to save some less-frequently accessed “cold storage.” Perform an incremental backup every so often, then detach the drive to isolate that copy of your data.

If You are Infected

How do you know you have Ransomware? You will just know. Ransomware tends to be obvious, the imagery associated with most Ransomware is designed to invoke stress and fear in its victims.

Don’t panic. Your first move should be to contact the authorities, including the police and the UK’s National Fraud and Cyber Crime Reporting Centre. Then ascertain the scope of the problem, by going through your directories and determining which of your user files is infected. (If you do find your documents now have odd extension names, try changing them back – some Ransomware uses “fake” encryption, merely changing the file names without actually encrypting them.)

Identification and Removal

If you have a paid anti-malware solution, scan your hard drive and try contacting your vendor’s tech support and help forums. Another excellent resource is NoMoreRansom.com’s Crypto-Sheriff, a collection of resources and Ransomware uninstallers from Intel, Interpol, and Kaspersky Lab that can help you identify and begin eradicating the Ransomware from your system with free removal tools.

If all Else Fails

If you have good copies of your data saved elsewhere, online and on an external hard drive, all you may need to do is reset your PC, reinstall all your applications and restore your data from the backups.

How to remove your login password from Windows 10

While strong account passwords are important (and recommended by QBS PC Help) not every user wants or needs to enter a password every time they boot their Windows 10 PC. Thankfully, there is an easy way for users to disable or bypass the Windows login screen and automatically log directly into their account when booting.

All you need to do is log into your Windows 10 user account as you normally do by entering your password at the login screen. Next, click Start (or tap the Windows Key on your keyboard) and type netplwiz. The ‘netplwiz’ command will appear as a search result in the Start Menu search. Hit Enter on your keyboard or click on the result to open it.

A new window labeled “User Accounts” will appear, listing all the user accounts on your Windows PC. Click on your user account to select it and then uncheck the box at the top labelled “Users must enter a user name and password to use this computer.”

You’ll be prompted to enter the user account’s password (this is a safeguard to ensure that other users on the PC can’t change the settings for accounts they don’t have access to). Enter your account’s password and then click OK to close the window.

Finally, test the new setting by saving all open work and rebooting your PC. If all steps above were performed correctly, Windows 10 should bypass the login screen and load directly into your user account without prompting you for the account’s password.

Bypassing the Windows 10 login screen is relatively safe if there is a low chance of someone else gaining physical access to your PC. If you work in a shared office space or use a laptop that travels outside of your home or office, for example, you probably shouldn’t configure your account to bypass the Windows 10 login screen.

But if you’re a home user with a desktop PC or laptop that never leaves the house, and you don’t have a history of break-ins or nosy children, it’s relatively unlikely that an unauthorised user will gain physical access to your PC.