How Can I Tell If a Web Address Is Safe?

What to look for, what to check.

URLs are simple in concept, yet can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.
(Image: DALL-E 3)
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.

This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.

The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.

I’ll try to make some sense of it all.

Read more

How Do I Sign In to a Different Gmail Account?

There are three approaches.

There are several ways to be signed in to multiple Gmail accounts simultaneously. I'll review the most common and what I find the most useful.
A skilled juggler is performing an impressive feat, effortlessly juggling bright and easily recognizable Gmail icons in mid-air. The juggler is focused, with a look of concentration and joy on their face, as they stand against a simple, unobtrusive background that doesn't detract from the spectacle of the Gmail icons being tossed with expert precision.
(Image: DALL-E 3)

It’s not uncommon for people to have multiple email accounts, often with the same provider. Gmail is a good example. Free Gmail accounts are easy to create.

When you’re signed in to one Gmail account, how do you access another?

I have three approaches for you: sign out and then sign in to the other account; “add an account” so you can switch between accounts with one click; or use separate internet browsers.

Read more

Can You Recommend a Good External Hard Drive?

The landscape keeps changing.

Quality and features in external hard drives change over time. First, look at what you need.
A balance scale featuring a 3.5 inch hard disk on one side and a 2.5 inch hard disk on the other. The setting is a simple, neutral background to keep the focus on the balance scale and the hard disks. The 3.5 inch hard disk appears slightly larger and more robust, representing its greater storage capacity and power requirement. In contrast, the 2.5 inch hard disk is smaller, symbolizing its portability and convenience for travel.
(Image: DALL-E 3)
Question: I  plan to follow your suggestions for backing up. But having never used an external hard drive, I’m overwhelmed with the choices and could use some direction. Can you recommend some guidelines: 2 ½ inches or 3 ½? 5400 vs 7200 RPM? How big? Which brands are the most reliable, etc.?

Can I make a specific recommendation? No.

The problem is that the industry is constantly changing in fundamental ways. Often it seems those changes happen immediately after I make a recommendation!

Instead of specific recommendations, I’ll discuss some of the characteristics of external drives and help you think about what you need.

Read more

6 Steps to Dealing With Phone Spam

Besides getting frustrated, that is.

Phone spam, be it voice or text, is as annoying as it is persistent. Here's what (little) you can do.
An illustration of a person sitting at a desk, overwhelmed by a flood of phone calls and text messages pouring out from their smartphone, like water. Each call and message is visibly marked as spam, forming a wave that threatens to engulf the workspace.
(Image: DALL-E)

This is a question I received not long ago from someone who was receiving unwanted calls. I, too, get unwanted calls and texts.

As we enter a busy political season here in the U.S., I expect things to get worse before they get better.

Let’s look at what few options there are.

Read more

How Can Passkeys Possibly Be Safe?

Mostly because there’s nothing to steal.

Passkeys may feel confusing now, but they're a doorway to a more secure, less frustrating, passwordless future.
A close-up of hands using a smartphone or tablet, with the device's screen displaying a clear and bright passkey icon.
(Image: DALL-E 3)

There’s still a fair amount of discomfort around the concept of passkeys as replacements for passwords. The most common objection is something like “So if someone has access to my machine, don’t they have access to all my accounts?”

The answer, of course, is more complicated than a simple yes or no. The important thing to realize, though, is that passkeys actually add a layer of security.

Read more

Why Does Software Only Seem to Get Bigger?

It has a healthy appetite.

It's a march of technological progress: computers can do more, and we expect software to do more. That leaves those of us with older machines in a difficult spot.
A photorealistic image of a computer screen overflowing with icons, windows, and notifications, representing the abundance of features and capabilities added to software over time.
(Image: DALL-E 3)

Question: Why does most software get bigger and bigger as time goes by with each version?

This is a common complaint.

While I can tell you that it’s not likely to change, let me throw out a few reasons that might explain why it’s happening.

Read more

How Can I Recover an Outlook Password Without Resetting It?

Chances are very slim. Very slim.

Microsoft doesn't know your Outlook.com password. Honest. That makes recovering it without changing it challenging.
Visualize a secure, encrypted server with a padlock symbolizing security, and a magnifying glass over a computer screen displaying an Outlook.com login page, to represent the attempt to find the existing password without changing it.
(Image: DALL-E 3)
Question: I’ve seen all the answers about how to reset my Outlook password, but that’s not what I want. I want to know my existing password. I don’t want to change it.

You probably can’t do this, and there’s an important and interesting reason why not.

There are a few straws to grasp at, but chances are you’ll need to reset your password.

Read more

How Do I Tell Who Sent an Email?

It's extremely unlikely. I'll walk you through why that is and one way you might get lucky.
A magnifying glass over a maze of passages all showing various portions of text.
(Image: Midjourney)

Question: Leo, how can I tell who really sent me an email? And I mean their real name, location, and telephone number, if at all possible?

This is super simple.

You can’t. (I’m assuming you don’t work in law enforcement. The police can get a lot more information than you or I can.)

Let’s look at the various types of data associated with an email and discover how easily they can be completely falsified. I can think of one scenario where you might get lucky, but that’s only if the sender isn’t being particularly careful.

Read more

Isn’t Putting Two Factor Codes in My Password Vault Less Secure?

Technically, perhaps. Pragmatically, not really.

Storing 2FA codes in 1Password alongside passwords might slightly reduce security, but the risk is minimal, especially compared to the convenience.
A formidable fortress stands under a clear sky, its design a blend of medieval strength and modern mystery. The large, wooden door at the fortress's entrance is secured with a robust lock, symbolizing protection and secrecy. Above this door, a sign boldly proclaims "Passwords," hinting at the digital fortification concepts within. Emblazoned on the door is a shield, an emblem of defense and security. Beside the main entrance, a small, quaint ticket kiosk offers a juxtaposition to the fortress's grandeur. This kiosk sports a sign that reads "2FA," and another says "PASS", suggesting a modern, technological gateway requirement akin to two-factor authentication. The entire scene merges the aesthetic of ancient castles with contemporary cybersecurity themes, illustrating a unique intersection of the past and present security measures.
(Image: DALL-E 3)
Question: Surely having 2FA in 1Password along with your username/password is asking for trouble. If 1Password is compromised, the hacker then has login details and 2FA all set waiting for them.

This was in response to a recent article discussing how I found that my password vault — 1Password — was capable of replacing Authy as my second factor. (Authy is discontinuing PC support, whereas 1Password works everywhere.)

Very technically, yes, your security may be slightly decreased. I don’t consider that amount to be sufficient to side-step the convenience. In fact, there’s a possibility that it might be more secure than using Authy desktop.

Your concern is based on an exceptionally unlikely event.

Read more

Can My ISP See I’m Using a VPN?

Yup.

Virtual Private Networks have characteristics visible to your ISP. I'll discuss what they can and cannot see.
VPN
(Image: depositphotos.com)
Question: Can my internet service know if I’m using a VPN?

Yes. Yes, they can.

Let’s look at what Virtual Private Networks (VPN) expose to your Internet Service Provider (ISP) that allows them to figure it out.

Read more

100% Disk Usage in Windows: 12 Things to Try

Working hard. Perhaps too hard?

100% disk usage can happen for many different reasons. I'll review the most common and give you recommendations for each.
A realistic image of a traditional US speed limit sign, featuring the text "SPEED LIMIT 100%" prominently in the center. The sign has a white rectangular background with bold, black letters for the text, typical of US speed limit signs. This custom sign creatively adapts the standard design to convey the concept of reaching the maximum limit or capacity, in this case, represented by "100%". The design incorporates the familiar aspects of US road signage while introducing a unique and metaphorical twist.
(Image: DALL-E 3)
Question: My occasionally-used laptop has been giving me fits for the last year. Regardless of what I do, I still get 100% disk usage. I don’t have any weird stuff on my laptop other than VMware Workstation. I’d like to know if there’s an update to the (subject) for Windows 11 so I can reinstall Windows 11 without losing my apps and files to see if that will fix the problem. Or would you recommend I use my out-of-the-box backup and start over?

I’d recommend none of the above.

100% disk usage is common, but typically only under certain conditions and only for “a while”.

I’ll review the common causes of this issue and what you can do to address them.

Read more

What Is the Thunderbird Email File Location in Windows?

The magic word is profile.

Thunderbird stores everything in what it calls a profile. I'll show you how to locate yours.
A magnifying glass hovering over a Thunderbird email client logo, with a series of footsteps leading from the logo to an illustrated folder labeled "Profiles."
(Image: DALL-E 3)
Question: Where’s my Thunderbird email file location? I’m looking for the files on my PC that TBird uses to store my email.

It’s in an obvious (to Windows) yet not so obvious (to real people) place.

I’ll walk you through the steps to find it.

Read more

How I Use AI at Ask Leo!

It’s my fast but unreliable intern.

I write all my own articles, but I often use AI as a tool along the way. I'll walk through a recent example.
An illustration showing a man working on his computer with a virtual AI assistant depicted as a friendly robot or hologram hovering nearby, suggesting collaboration. The background is filled with digital icons representing technology and creativity, highlighting the partnership between human insight and AI support. The scene conveys a sense of innovation and teamwork between the man and the AI, with elements such as gears, light bulbs, and digital code symbols subtly integrated into the background. The man appears focused and engaged, while the AI assistant exudes a helpful and supportive aura, creating an environment of mutual respect and synergy.
(Image: DALL-E 3)

You may have noticed a small update at the top of every page at Ask Leo!. Right above the search box on the right-hand side, it now says “Written by a real human.

That real human, of course, would be me. I suspect this will set me apart from the future waves of AI-generated content.

But that doesn’t mean I avoid AI completely. I want to lay out exactly how it helps and how it sometimes misses the mark.

Read more

Is There a Way to Use OneDrive as a Dumb Hard Drive?

Use OneDrive without using OneDrive.

Yes, you can use OneDrive online without using OneDrive on your PC or going to OneDrive.com. I'll show you how.
A cartoon duck stands in the middle of a vibrant, digitally illustrated scene, holding a USB cable. The left end of the USB cable is plugged into a fluffy, cartoonish cloud.
(Image: DALL-E 3)

Yes, there is.

I hadn’t even considered this possibility until someone asked, but it’s not even that hard, though it does require installing a third-party tool.

Read more

Should You Use the Free Backup Software that Comes with Some External Drives?

There are better options.

Many external drives include free backup software that I never use. I'll explain why, and what I do instead.
External Hard Disk Drive
(Image: canva.com)
Question: On your recommendation I recently purchased an external drive to use as a place to put my backups. I was surprised to find that it came with free backup software included. Why wouldn’t I just use that instead of downloading or even purchasing something else?

A common question.

I don’t know what free software came with your drive. Chances are, neither do you.

That tells us something.

Read more

Can I Recall an Email From Gmail or Outlook.com?

Yes — but no.

You may have heard of a feature called "message recall". For all intents and purposes, it's not real.
A photorealistic image representing the concept of the irreversibility of sending an email. The scene is set in an office environment, where a person is sitting in front of a computer, their expression a mix of surprise and regret. The computer screen displays a generic email interface, with a sent message confirmation visible. The atmosphere conveys a moment of realization that once an email is sent, it's out of one's control. The room is well-lit, showcasing the office setting with modern furniture and technology, emphasizing the professional context in which email communication often takes place.
(Image: Midjourney)
Question: I keep hearing that people are able to “recall” emails, meaning bring them back before anyone reads them. How do I do that in Gmail?

You don’t.

Ditto for Outlook.com and almost all email providers.

There is one scenario where recall might be possible, but it’s not a situation that exists for many people.

Read more

When You Change Your Phone Number, Change Your Phone Number

But try not to change your phone number.

The ability to keep your old phone number when getting a new phone can avoid several headaches. If you get a new number, there are steps you must take.
An image that illustrates the concept of maintaining continuity and avoiding complications by keeping the same phone number when changing phones or providers. The image depicts a person holding a new smartphone,. The background features a series of faded icons representing different online services (like email, banking, and social media), emphasizing the importance of updating recovery information.
(Image: Midjourney)

I know this sounds somewhat convoluted, but bear with me. It may be the number one way people permanently lose access to their online accounts.

I harp on keeping your recovery information up to date, but there’s one scenario that keeps your recovery information up to date automatically.

It’s what happens when you get a new phone.

Read more

What Is a Pig-Butchering Scam?

No actual pigs are harmed.

Pig-butchering is a nasty term for a particularly painful type of scam. Here's how to protect yourself.
The scene includes a metaphorical depiction of the scam process, showing a digital landscape with a piggy bank standing on one side, looking full and healthy, connected by a series of digital pathways and strings to a shadowy figure on the other side, who holds a butcher knife made of binary code, symbolizing the scammer preparing to 'butcher' the victim's savings. The background is a mix of digital and real elements, such as a cityscape blending into a circuit board, representing the intersection of technology and everyday life where these scams take place. Include symbols like chat bubbles, hearts, and dollar signs floating between the piggy bank and the shadowy figure to represent the building of trust, emotional manipulation, and financial transactions involved in the scam. The overall atmosphere should be ominous yet subtle, highlighting the deceptive and hidden dangers of online scams.
(Image: DALL-E 3)

It’s a distasteful name for a distasteful practice.

Pig-butchering scams are commonplace and seem to be increasing in frequency. I don’t want you to fall victim to it.

Read more

What’s the Difference Between Memory and Disk Space?

They both “remember” — with different results.

The difference between the various things we could call "memory" is a fundamental computing concept. I'll review the basics.
Disk Drives, Flash Drives, and RAM
(Image: canva.com)

Memory, hard disk, and RAM: I get a surprising number of questions that show a misunderstanding between these most basic of computer terms.

The most common mix-up is that they are the same. While they’re not, I can see how it could be easy to confuse them at a conceptual level. So let me explain these terms.

Read more

Everything Is Awesome!

Really. It’s amazing.

A movie I watched reminded me that we are surrounded by awesome. I need to do a better job of reminding myself, and you, of all the awesomeness I see.
Lego Leo
Lego Leo (Image: askleo.com)

I’m going to take a moment, step a little to the side of computing, and let my inner geek out. Not that I restrain him all that much anyway.

Some time ago I watched The LEGO Movie, and besides bringing back some memories, it reminded me of something I hadn’t thought about for a long time.

Not that everything is awesome — that’s something I feel pretty much every day.

No, this was more about how I got my start and how my grandmother had a hand in that.

Read more

Could Malware Record My Chats and Video Calls?

That and so much more.

If you're curious what might happen if a hacker was in control of your computer, the question really is "What can't they do?"
An average computer user sitting at a desk, working on their computer. Above the computer, a puppeteer's hand with strings attached to the computer, symbolizing control and manipulation.
(Image: DALL-E 3)

Question: Hi, Leo. If I’m sure that a hacker is controlling my computer, and I was online in a video call to a friend. Could hackers then see and save a video message during the recording? In other words, can a hacker see my screen and record my video call with my friends and show our faces at the same time?

While this seems like a very specific scenario and concern, I want to address it because it’s a fine example of what a lot of people don’t seem to realize — something very important about the nature of hacking, malware, compromised machines, and the importance of security overall.

To directly answer your question, yes, absolutely. If your machine has been hacked into or is compromised with malware in some way, a hacker could certainly record your video calls.

But the situation is much worse than that.

Read more

Should I Accept Cookies On My Computer?

Cleaning up some cookie crumbs.

You'll be asked again and again whether or not a site can leave cookies. I'll explain why, what the ramifications are, and my suggested answer.
A computer screen overwhelmed by multiple GDPR Cookie Consent pop-up windows. The screen is cluttered with various consent requests, each asking for approval to use cookies, demonstrating the frequency and abundance of these requests while browsing the internet. The pop-ups vary in size and design, reflecting the diversity of websites and their approaches to obtaining consent. In the background of the computer screen, you can see the faint outline of a web page, barely visible through the myriad of consent forms.
(Image: DALL-E 3)
Question: Is it OK to accept “Legitimate Interest” cookies? When I come across them when trying to access a website, often from a link from one of my known regular (and thus legit) sites, there are usually so many of them that it’s impractical to de-tick them all – there could be 100+. There’s usually no “clear all” option. That makes me think that it’s made deliberately awkward so that folk don’t de-tick. Which makes me just a tad cautious/suspicious. Generally speaking, are they OK?

Generally speaking, they are, yes.

Cookies have gotten a bad rap, and some well-intentioned but horrific legislation has made it worse.

Read more

Dealing With the Demise of Authy Desktop

A useful tool, broken.

Authy's desktop version is going away (darn it!). Here's how I will replace it.
Whither Authy?
(Image: askleo.com)

A reader recently informed me that Twillio, the folks that own the Authy two-factor authentication app I’ve been using and recommending for years, has elected to stop supporting the desktop application. Authy will be available as a mobile/smartphone app only.

That’s… disappointing.

I went looking for an alternative. I didn’t find one until I looked at another app already on my computer that fits the bill almost perfectly.

Read more