Private browsing sounds safer than it really is. I'll explain what Incognito mode actually hides, what it absolutely doesn’t, and when it’s still worth using. If you think private mode keeps your online activity secret, you’ll want to see where the real limits are.
(Image: DALL-E 3)
Question: I use private browsing mode in my web browser to keep my online activities private. I mentioned that to a friend and he said it wasn’t private at all. If he’s right, what’s the point?
You’re both right, and you’re both wrong.
Private browsing, also known as Incognito mode, protects your privacy only to a point. And it’s typically not the point most people think it is.
Beyond that point, private browsing does exactly nothing to keep you more private.
Ever wonder why Microsoft never fixes that one thing that drives you crazy? It’s not personal. I'll break down why some annoyances stay put, how Windows chooses what to fix, and why even simple changes can be surprisingly risky.
(Image: canva.com)
Question: I have a question that no one has been able to answer so far. Over the years and the last few versions of Windows that I’ve used, Windows Explorer still shows file sizes in KB, and folders no size. I’m currently dealing with files that are between 300MB to 3GB+. I was hoping that when the latest version came out they would have fixed this problem and I could see my file sizes in KB, MB, or GB. All the other non-Windows operating systems I’ve played with automatically show files in their proper notation. Is this a bug in windows or is MS to lazy to fix this program and give us only this second rate software? If you could help clear this up I would greatly appreciate it.
This is a common question.
Not the file-size-display issue, but the more general question: “Why didn’t Microsoft fix this?” where “this” is a person’s pet peeve or a system bug.
In most cases, asking “Why?” is an exercise in frustration; it rarely gets you a straightforward answer. But I can theorize many legitimate reasons for not addressing something like this.
Social media often shows you what it wants you to see, not what you asked for. I'll explain how those algorithms work and the steps you can take to see more of what matters to you.
(Image: Gemini)
A lot has been written in recent years about social media — specifically, the algorithms social media companies use when choosing what to show you.
To say it’s controversial is an understatement. It’s been blamed for everything from increasingly short attention spans to the looming downfall of democracy.
Let’s review what those algorithms mean, how they work, why they work, and some ways you can avoid them — or at least take back more control.
Ever wonder how your computer or phone “knows” where you are, and why it sometimes gets it wrong? I'll break down the clues your devices use, why location mistakes happen, and what you can do when websites think you’re somewhere else entirely.
(Image: Gemini)
Question: My computer and phone seem to know where I am. How do they do that? Sometimes they get it wrong — as in placing me in another country — and deny access to things I think I should be able to see.
Location identification is… complicated.
It’s a mix of various inputs from various places. While I’m not 100% knowledgeable on all the possibilities that can factor into location, here’s a sense of how things work (more or less).
To begin with, it depends on how you’re “looking at” your location, or perhaps who is looking at it.
Tired of being asked if you're human? I'll explain what site owners like me are dealing with behind the scenes and why you’ll probably be clicking “I’m not a robot” a lot more often.
(Screenshot: askleo.com)
CAPTCHAs — Completely Automated Public Turing test to tell Computers and Humans Apart — seem to be popping up everywhere, even on sites where you wouldn’t think they’d be needed.
I’ve been tempted to add a CAPTCHA to Ask Leo!. Seriously tempted.
Let me explain what leads to that temptation. I’ll also explain why it’s unlikely to happen, even though the costs of not doing so can be high.
Storing 2FA codes in your password vault might slightly reduce security, but the risk is minimal compared to the convenience.
(Image: DALL-E 3)
Question: Surely having 2FA in 1Password along with your username/password is asking for trouble. If 1Password is compromised, the hacker then has login details and 2FA all set waiting for them.
This was in response to a recent article discussing how you can use your password vault — 1Password, in my case — to replace Authy as your second factor. (Authy is discontinuing PC support, whereas 1Password works everywhere.)
Your concern is based on an exceptionally unlikely event.
Something many people do every day may expose their location in ways they aren't aware of.
(Image: DALL-E 3 and askleo.com)
I ran across a TikTok channel a while back that got my attention. No, no dancing teenagers; this was a channel dedicated to showing how easy (or hard) it can be for someone with enough time and resources to locate someone else.
Not just anyone, though. They have to have done something very specific.
But it’s something people often do without thinking.
URLs are simple in concept, but can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
(Image: DALL-E 3)
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up, but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times, I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.
This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.
The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.
By far the number one topic on Ask Leo! (as measured by page and video views) is what to do if you’ve lost your password and can’t log in to a service you rely on. Google tops the list, but the problem applies equally to other online services like Outlook.com, Facebook, and more.
There are several reasons you might find yourself in that position, but they’re all made worse by the desperation that can result when account recovery mechanisms don’t seem to work.
And there are many scammers out there ready to take advantage of your panic.
Spam filters can be sophisticated or simple. I'll look at some of the characteristics of email that spam filters check.
(Image: DALL-E 3)
Someone commented to me that his spam filter was pretty useless since the spam he was receiving kept coming from different email addresses. The implication was that this person believed that the “From:” address is the only thing that spam filters check.
While that’s possible, it’s also rare.
These days, spam filters are complex and sophisticated pieces of software that check much more than you might think.
A friend received a fairly convincing phishing attempt. I'll cover the signs that showed it was spam.
A friend recently asked me to look at an email they’d received to confirm if it was legitimate.
It was not.
It was a good attempt, though, and it probably fooled many people into clicking through and potentially handing over their sign-in credentials to a crook.
I’ll review some signs in this email that flagged it as fake.
Backing up data using an online backup service can be an important part of an overall strategy, but it's important to understand its limitations.
Question: I keep hearing about online backup services that will back up your data to the cloud. Assuming it’s secure, why shouldn’t I do that and skip the hassle of doing backups to an external hard drive or whatever?
Online backup services can be a useful component of a broader backup strategy, but they are not enough. There are several factors to consider, including security, completeness, speed, and cost, before deciding if online backup is the right thing for you.
The Recycle Bin is your friend. I'll show you where it lives and how to control the space it uses.
(Image: DALL-E 3)
When you delete a file using Windows File Explorer, that file is placed in the Recycle Bin. The Recycle Bin in Windows has saved many a person from grief, I’m sure.
But where exactly is it, and do the deleted files still take up space?
Temp files can pile up. Why is that, and do you need to worry about them?
Question: Why are there so many temporary files left behind each time the computer is shut down and restarted?
There are indeed many temporary files. As I write this, my primary machine has 322 files in its temporary folder that total 58 megabytes. My example PC, which isn’t used nearly as heavily, has 134 files taking up 78 megabytes.
Just as there are many files, there are also many reasons they get left behind.
Downloading a file from the internet is easy, but controlling where downloads go takes a little more understanding.
(Image: DALL-E 3)
Question: When I download files like ebooks off the internet, I can never find them. Where do they go on my computer?
It depends on how you download them. We’ll look at four scenarios.
Typically, they go into your Downloads folder.
They may also go into the same folder as the last download.
There’s another place downloads can end up that’s kind of dangerous, as it gets “cleaned up” every so often (meaning you could eventually lose your download).
We’ll also look at how to find your file regardless of where it landed.
Question: My computer is being controlled and I cannot load anything I have purchased. Seems like when I change my password it asks several times — not good. Also, when I do it is intercepted and blocked. Why ? This my personal home computer.
When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Most of those people are wrong.
I get variations on this question often.
Someone believes their computer is being controlled remotely without their consent, or they believe their activities are being monitored in detail, or they believe their files and other information are being stolen or manipulated by others with malicious intent.
The bottom line is, they’re convinced someone is spying on them — or worse.
QR codes are a nifty way to encode web addresses and other text in a way that's easy for your smartphone to decode, but they are not without risk.
During a televised sporting event, a company spent a lot of money to run an advertisement that was nothing more than a QR code (like the one displayed above).
Apparently, against all common sense and with no regard for security, millions of people used it.
Why? What did it mean? What are you supposed to do with QR codes, and how do they relate to security?
They’re pretty cool.
But they can also be weaponized, and you’d never know.
It's hard to determine whether an email address is fake.
(Image: DALL-E 3)
Question: How can you tell if an email address is fake? How do scammers make fake emails?
While it can be helpful to identify fake email addresses — they’re a great clue as to whether the email you’re looking at is a scam or worse — you might not be able to. A phony email address can easily be made to look like a valid one.
Sometimes there are clues, and I’ll review a few of those, but some of those clues also apply to legitimate email addresses.
Freely accessible Wi-Fi is almost everywhere, and most systems are set up to use it safely. There are a few things to pay attention to in order to stay safe.
(Image: canva.com)
Question: How come connecting to a trusted public hotspot is not a BIG security issue since multiple devices can be connected to that same Wi-Fi? If even one of the connected devices has malware, then isn’t my device also under threat ??
Microsoft changed the free storage allocation for Outlook.com and OneDrive.
In 2023, I started hearing from people who suddenly could not send or receive email via Outlook.com, or were seeing warnings that they’d soon be unable to unless they took action.
The action? Buying more OneDrive space.
What does OneDrive have to do with Outlook.com? Until 2023, not much. Now, though, they’re attached1 at the hip.