URLs are simple in concept, yet can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.
This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.
The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.
There are several ways to be signed in to multiple Gmail accounts simultaneously. I'll review the most common and what I find the most useful.
It’s not uncommon for people to have multiple email accounts, often with the same provider. Gmail is a good example. Free Gmail accounts are easy to create.
When you’re signed in to one Gmail account, how do you access another?
I have three approaches for you: sign out and then sign in to the other account; “add an account” so you can switch between accounts with one click; or use separate internet browsers.
Quality and features in external hard drives change over time. First, look at what you need.
Question: I plan to follow your suggestions for backing up. But having never used an external hard drive, I’m overwhelmed with the choices and could use some direction. Can you recommend some guidelines: 2 ½ inches or 3 ½? 5400 vs 7200 RPM? How big? Which brands are the most reliable, etc.?
Can I make a specific recommendation? No.
The problem is that the industry is constantly changing in fundamental ways. Often it seems those changes happen immediately after I make a recommendation!
Instead of specific recommendations, I’ll discuss some of the characteristics of external drives and help you think about what you need.
Passkeys may feel confusing now, but they're a doorway to a more secure, less frustrating, passwordless future.
There’s still a fair amount of discomfort around the concept of passkeys as replacements for passwords. The most common objection is something like “So if someone has access to my machine, don’t they have access to all my accounts?”
The answer, of course, is more complicated than a simple yes or no. The important thing to realize, though, is that passkeys actually add a layer of security.
It's a march of technological progress: computers can do more, and we expect software to do more. That leaves those of us with older machines in a difficult spot.
Question: Why does most software get bigger and bigger as time goes by with each version?
This is a common complaint.
While I can tell you that it’s not likely to change, let me throw out a few reasons that might explain why it’s happening.
Microsoft doesn't know your Outlook.com password. Honest. That makes recovering it without changing it challenging.
Question: I’ve seen all the answers about how to reset my Outlook password, but that’s not what I want. I want to know my existing password. I don’t want to change it.
You probably can’t do this, and there’s an important and interesting reason why not.
There are a few straws to grasp at, but chances are you’ll need to reset your password.
It's extremely unlikely. I'll walk you through why that is and one way you might get lucky.
Question: Leo, how can I tell who really sent me an email? And I mean their real name, location, and telephone number, if at all possible?
This is super simple.
You can’t. (I’m assuming you don’t work in law enforcement. The police can get a lot more information than you or I can.)
Let’s look at the various types of data associated with an email and discover how easily they can be completely falsified. I can think of one scenario where you might get lucky, but that’s only if the sender isn’t being particularly careful.
Storing 2FA codes in 1Password alongside passwords might slightly reduce security, but the risk is minimal, especially compared to the convenience.
Question: Surely having 2FA in 1Password along with your username/password is asking for trouble. If 1Password is compromised, the hacker then has login details and 2FA all set waiting for them.
This was in response to a recent article discussing how I found that my password vault — 1Password — was capable of replacing Authy as my second factor. (Authy is discontinuing PC support, whereas 1Password works everywhere.)
Very technically, yes, your security may be slightly decreased. I don’t consider that amount to be sufficient to side-step the convenience. In fact, there’s a possibility that it might be more secure than using Authy desktop.
Your concern is based on an exceptionally unlikely event.
Two-factor authentication isn't perfect, but it's much better than not using it at all. Here are the various risks and what you can do to protect yourself.
Using any form of two-factor authentication is absolutely more secure than using none at all.
But it’s important to understand that nothing is perfect. Security is never absolute. There are ways to hack every form of two-factor authentication; some just are more difficult to hack than others.
100% disk usage can happen for many different reasons. I'll review the most common and give you recommendations for each.
Question: My occasionally-used laptop has been giving me fits for the last year. Regardless of what I do, I still get 100% disk usage. I don’t have any weird stuff on my laptop other than VMware Workstation. I’d like to know if there’s an update to the (subject) for Windows 11 so I can reinstall Windows 11 without losing my apps and files to see if that will fix the problem. Or would you recommend I use my out-of-the-box backup and start over?
I’d recommend none of the above.
100% disk usage is common, but typically only under certain conditions and only for “a while”.
I’ll review the common causes of this issue and what you can do to address them.
I write all my own articles, but I often use AI as a tool along the way. I'll walk through a recent example.
You may have noticed a small update at the top of every page at Ask Leo!. Right above the search box on the right-hand side, it now says “Written by a real human.”
That real human, of course, would be me. I suspect this will set me apart from the future waves of AI-generated content.
But that doesn’t mean I avoid AI completely. I want to lay out exactly how it helps and how it sometimes misses the mark.
Outlook.com, Hotmail, and Microsoft account compromise and loss happens. Here's how to get your account back depending on what happened to it.
As longtime readers know, I get a lot of reports of Hotmail account theft and compromise. As Hotmail has transitioned to Outlook.com, so, too, have the questions. Every day there are reports of everything from simple password loss to email being sent “From” your email address to attempts to scam your contacts.
Depending on exactly what’s happened, the available remedies may be simple, difficult, or completely impossible; your account and everything in it may be lost forever.
I’ll review the various scenarios and direct you to more detailed articles on Ask Leo! that cover the options for each.
Many external drives include free backup software that I never use. I'll explain why, and what I do instead.
Question: On your recommendation I recently purchased an external drive to use as a place to put my backups. I was surprised to find that it came with free backup software included. Why wouldn’t I just use that instead of downloading or even purchasing something else?
A common question.
I don’t know what free software came with your drive. Chances are, neither do you.
The ability to keep your old phone number when getting a new phone can avoid several headaches. If you get a new number, there are steps you must take.
I know this sounds somewhat convoluted, but bear with me. It may be the number one way people permanently lose access to their online accounts.
I harp on keeping your recovery information up to date, but there’s one scenario that keeps your recovery information up to date automatically.
The difference between the various things we could call "memory" is a fundamental computing concept. I'll review the basics.
Memory, hard disk, and RAM: I get a surprising number of questions that show a misunderstanding between these most basic of computer terms.
The most common mix-up is that they are the same. While they’re not, I can see how it could be easy to confuse them at a conceptual level. So let me explain these terms.
If you're curious what might happen if a hacker was in control of your computer, the question really is "What can't they do?"
Question: Hi, Leo. If I’m sure that a hacker is controlling my computer, and I was online in a video call to a friend. Could hackers then see and save a video message during the recording? In other words, can a hacker see my screen and record my video call with my friends and show our faces at the same time?
While this seems like a very specific scenario and concern, I want to address it because it’s a fine example of what a lot of people don’t seem to realize — something very important about the nature of hacking, malware, compromised machines, and the importance of security overall.
To directly answer your question, yes, absolutely. If your machine has been hacked into or is compromised with malware in some way, a hacker could certainly record your video calls.
You'll be asked again and again whether or not a site can leave cookies. I'll explain why, what the ramifications are, and my suggested answer.
Question: Is it OK to accept “Legitimate Interest” cookies? When I come across them when trying to access a website, often from a link from one of my known regular (and thus legit) sites, there are usually so many of them that it’s impractical to de-tick them all – there could be 100+. There’s usually no “clear all” option. That makes me think that it’s made deliberately awkward so that folk don’t de-tick. Which makes me just a tad cautious/suspicious. Generally speaking, are they OK?
Generally speaking, they are, yes.
Cookies have gotten a bad rap, and some well-intentioned but horrific legislation has made it worse.
Authy's desktop version is going away (darn it!). Here's how I will replace it.
A reader recently informed me that Twillio, the folks that own the Authy two-factor authentication app I’ve been using and recommending for years, has elected to stop supporting the desktop application. Authy will be available as a mobile/smartphone app only.
That’s… disappointing.
I went looking for an alternative. I didn’t find one until I looked at another app already on my computer that fits the bill almost perfectly.