I Lost My Two-Factor Authentication Device. How Do I Recover?

How to prove you’re you without your second factor.

Losing your phone can lock you out of your accounts if it’s your second factor for authentication. Here’s how I recovered while traveling, the backup options that saved me, and the steps you can take now so you’re never stuck without access.
A Dead Phone
A dead phone. (Image: canva.com)

I went to take a photo of my dogs, and apparently, it was cuteness overload for my phone, because it just shut down the moment I tapped the button.

I forced a reboot and took another photo, which worked. A few seconds later, while viewing the photo, the screen went crazy and the phone started squealing. I forced it off again. It came back one more time, worked for a bit, and then shut down one last time. All further attempts to revive it were unsuccessful.

I was now the proud owner of a brick.

The biggest problem? The phone was my second factor for all my multi-factor-enabled accounts — and I was traveling. Could I sign in to my important accounts without it?

Read more

What If My Passkey Doesn’t Work or I Lose the Device It’s On?

You do something else.

Passkeys are supposed to make signing in easier and safer, but what happens when it stops working or your device is gone? I'll show you what to do if your passkey fails or is lost and a technique that makes passkeys work everywhere.
A laptop, tablet, and smartphone arranged in a sunny, colorful flat-lay, each displaying a small golden key icon, showing passkeys working across multiple devices.
(Image: Gemini)
Question: So if I get a passkey and it doesn’t work, what happens then?? How can I change it… or can I change it?

A common variation of this question is, “What if I lose the device on which my passkey is stored?”

Passkeys are easy to use and complicated to explain.

Fortunately, this question has a fairly straightforward answer: just start over.

Read more

How Do I Find Who Hacked My Email Account?

TL;DR: You don’t.

Someone hacked your email and you want answers. Who did it? Where are they? Can you track them down? Here's what you should do.
 an individual examining an email message with a magnifying glass
(Image: Gemini)
Question: I just want to tell you that someone has hacked one of my email IDs and he sent email from my ID to someone else. Now, please tell me how I can find out from which computer and from which place this email has been sent. In other words, how do I find who hacked my email? Your cooperation will be highly appreciated.

When accounts are hacked, folks really want to be able to figure out who did this to them. How did it happen? What computer were they on? Who are they?

The short answer is, you’re extremely unlikely to figure out who hacked your email account. Here’s what to do instead.

Read more

What’s a Zero-Day Attack? A Diagram of the Vulnerability Timeline

Infected before you know there’s a risk.

Yes, your computer can get hacked even when it's fully updated. Zero-day attacks exploit vulnerabilities that your antivirus software doesn't yet know exist. I'll explain how these attacks work and what you can do to protect yourself.
A dramatic stopwatch frozen at zero, with streams of glowing red computer code racing through the clock face. Dark background with electric blue and red lighting creates urgency and tension.
(Image: Gemini)
Question: Can you tell me more about zero-day attacks? I experienced one on my fully updated and patched Windows computer (automatic Windows Update ON), which has the latest anti-malware tools. I saw the hacked behavior and immediately turned off my computer. Scanning both before and after this attack showed no prior or present malware infection. Is this the best response for such attacks, as it appears to have successfully prevented malware infection by this attack that I experienced?

The very nature of zero-day exploits is that your malware scanner would show that you were clean both before and after being infected. It’s not until your security software provider updates their databases and you take that update that your malware scanner knows what to look for.

Yes, that means you may still be infected.

Let’s go through the timeline that got you here.

Read more

Windows Administrator Explained

Why you are and are not the administrator of your own computer.

Why will your computer sometimes tells you "access denied" when you're the only user? Windows has a system of administrator account types that are easy to misunderstand. I'll describe which type of account you likely have, and what the other options can and can't do.
An individual wearing a baseball cap labelled "Adminstrator capable". On a table next to him are baseball caps labelled "Administrator" and "Standard User".
(Image: Gemini)

The concept of the “administrator” in Windows is somewhat confusing. It’s not uncommon for people to be disallowed from doing something on their PC because they’re not the administrator, even though their account is the only one on the machine.

Administration has several forms. Let’s explore what they are and what it means to be administrator… even when you’re not.

Read more

Why Doesn’t My Machine’s IP Address Match What I’m Told on the Internet?

IP addresses versus IP addresses.

Ever wonder why your computer shows one IP address, but websites see something totally different? They're both right. I'll describe how your router juggles two addresses behind the scenes and how that protects you every time you go online.
a computer and router on a desk with a symbolic connection from the computer to the router, and from the router to the cloud representing the internet
(Image: Gemini)
Question: Using tools on my machine, I can see that my IP address is one thing (in my case, 192.168.1.100). But when I go to an internet site that shows me my IP, it shows me something completely different. Which is right?

They both are.

Your machine has one IP address, but it isn’t necessarily the IP address that is used to connect to the internet.

The IP address that appears depends on who’s looking and from where.

Read more

How Do I Uninstall Windows?

You can’t. But you can do something else.

Stuck with a version of Windows you can't stand? You're not alone, and you're not trapped. "Uninstall" isn't a thing, but there are a few options you might not know about.
A photorealistic image of a crisp, clear Windows logo on its screen with the international 'no' symbol, a red circle with a diagonal line, overlaid on top of it.
(Image: DALL-E 3)
Question: I installed the latest version of Windows. I don’t like it. I want to get rid of it, but there is no uninstall program. How does one get rid of this program? I’m moving to Linux.

It happens with every version. People love the version they have, or they at least tolerate it, but the new version? Intolerable.

So they want to jump ship. Great! There are many other fine-looking and capable ships to jump to.

But you’re correct: there is no uninstall.

Read more

Why Password Managers Are [Still] Safer than the Alternatives

Password vaults are the most secure solution.

If you're not using a password manager, you're likely compromising your security more than necessary. Here's why using one is safer.
a locked and secure bank vault
(Image: Gemini)
Question: Recently, I tried to use RoboForm for an account at a large financial institution, but I couldn’t get it to work. In response to my inquiry, this institution said they do not permit logins using credentials that are stored on software because the security of the password could become jeopardized if my computer were hacked, invaded, etc. Is this true? Am I safer not to use tools like RoboForm?

Some people believe using password managers presents a single point of failure. Very technically, they are correct: if someone gains access to your password manager, they have access to everything in it.

Not so technically, I believe they are misguided.

Using a good password manager is significantly safer than any alternative.

Read more

How to Identify Your Machine’s Network Connections

There are probably many more connections than you expect.

Your computer might be chatting with hundreds of servers right now, including sites you might not expect, without you knowing! I'll show you free tools that let you see what your machine is up to online.
a magnifying glass looking at a computer screen that's displaying a network performance graph
(Image: Gemini)

Our machines are pretty much constantly connected to the internet these days. That means the software running on your device is connected to remote servers and services, either constantly or as needed, and probably with little indication.

I’ll show you a few ways to see what your machine is up to, using built-in and free tools.

Read more

Can I Have Different Passwords for YouTube and Gmail?

Keeping services separate is possible, though not obvious.

A Google account includes Gmail, YouTube, and much more. If you want to keep those services separate, you'll need separate Google accounts.
Google & YouTube
(Image: canva.com)
Question: Can I have a different password for YouTube and Gmail? I want to keep them separate.

There’s a way to keep them separate, but it’ll have a side effect you may or may not care about.

Read more

How Do I Tell Which Wi-Fi Protocols My Computer Supports?

They keep changing.

Ever wondered if your Wi-Fi card can handle the latest speeds, or why it won't connect in certain places? I'll show you exactly how to check which Wi-Fi protocols your computer supports, and what those cryptic "802.11" labels actually mean.
A Wi-Fi access point with the items 802.11b, 802. 11g, 802.11n, 802.11a, 802. 11ac, and 802.11ax floating around it.
(Image: Gemini)
Question: I don’t know if my Wi-Fi card is 2.4 GHz or 5 GHz, so my first question is, how do I find which I have?

If you’re having trouble connecting to a Wi-Fi hotspot — open and public, or otherwise — it could be a mismatch between the capabilities of your Wi-Fi hardware and the hotspot providing the wireless networking.

To do this, we need to figure out which protocols — that whole “802.11” thing — your card is capable of. Once we have that information, we can make a few assumptions.

Fortunately, your card’s capabilities are easily discovered.

Read more

Don’t Fall for It: Social Engineering and How Scammers Hack Your Brain

How to recognize, avoid, and beat the scams.

Think you're too smart to fall for a scam? Think again. Scammers aren't targeting your intelligence; they're targeting your humanity. I'll share the sneaky mind tricks they use every day and help you spot the red flags before it's too late.
A used car salesman with a speech bubble containing the words "Trust me!"
(Image: Gemini)

You’ve probably heard the term social engineering. It’s behind almost every scam.

Social engineering isn’t about technology, trickery, or even intelligence or the perceived lack thereof; it’s psychology, pure and simple. It’s about pushing your buttons.

And we all have buttons to be pushed.

Read more

How Do I Gain Administrative Access to a Secondhand Computer?

Here be dragons. Maybe.

It’s important to understand the risks of buying a used computer.
one person handing a desktop computer to another person
(Image: Gemini)
Question: My dad bought a computer from a yard sale. The problem is that they forgot to take off the password. I’m logged in as a user, but not an administrator, so I don’t have admin privileges. How do I become an administrator?

This is frightening for many reasons.

It’s not you who should be scared. We’ll probably be able to get you into the computer. It’s the previous owner who should be concerned; it’s clear they didn’t take a few important steps before selling their computer.

You still need to tread very carefully. I’ll explain why.

Read more

Can You Get Hacked When Your Computer Is Sleeping?

It depends. It’s also extremely unlikely.

Worried your sleeping computer might get hacked? The short answer is no, but there's a catch. I'll explain what that is and why you're still probably safer than you think with basic security in place.
a laptop on a desk, "sleeping"
(Image: Gemini)

I have a love-hate relationship with the sleep function. It puts the computer into low-energy use, pausing active tasks and storing open applications and files in memory. People like it because it keeps the computer powered on and ready to work again.

I love the concept, but I hate most implementations. I often find it results in unexpected behavior. Only if a specific device has proven its sleep function to be generally stable will I use it. It’s a determination I make for every single computer that might sleep, because every machine behaves differently.

So, with that little gripe out of the way, can your computer still get hacked if it’s in sleep mode?

Maybe.

Read more

OK, Boomer: Why Computer Literacy Matters to You

Yes, you.

Technology isn't optional anymore. I'll explain why embracing computer literacy matters more than ever, and how complaining only isolates you further.
A grumpy looking cat sitting on a chair in front of a fireplace.
(Image: Gemini)

Years ago, I used to say that while I worked hard to learn the skills I needed to be successful with technology — loving every minute of it, by the way — those coming after me would have an advantage I never had: they’d be steeped in what we call computer literacy almost from birth.

As technology has advanced and become pervasive, it’s clear I wasn’t wrong. Those generations take technology for granted and leverage it without a second thought.

Those of my generation (I’m a proud “boomer”) and older need to work to stay on top of it all.

Not only do I think that’s a good thing, I think it’s critical.

Read more

How Should I Format My Thumbdrive?

Let’s look at three options.

Looking to format a USB thumb drive but confused about FAT32, exFAT, and NTFS? I'll break down each file system's strengths and limitations and help you choose the best format based on compatibility needs, file sizes, and which devices you'll use it with.
three USB thumbdrives, labelled "FAT32", "exFAT", and "NTFS"
(Image: Gemini)
Question: I always use KeePass installed on a USB stick. I bought a new stick for this purpose. It is formatted as FAT32. Can I leave it like that, or do I have to change that to FAT64 or NTFS?

We can rule out one right away: there is no FAT64. Smile

Let’s review some of the alternatives and consider when you might want to switch.

Read more

Are Deleted Emails Really Deleted?

You might think so, but…

Deleted an email and think it’s gone forever? I'll explain what “delete” really means in webmail and desktop programs, why trash folders and database files can leave messages recoverable, how backups and even court orders can bring them back, and the inconvenient fact that the other person may still have a copy.
a waste bin overflowing with letters and envelopes representing emails
(Image: Gemini)
Question: It is said that deleted files are never completely erased unless you do so with the proper software. Does this also refer to emails? Once I erase an email (incoming or outgoing), does that stick around somewhere also?

When you “permanently” delete a file, the operating system just sets a flag or removes an entry from a list. The file’s data remains on disk until the space is overwritten later by other files. This can allow some files to be “un” deleted if they haven’t been overwritten.

Does the same apply to email messages?

It’s complicated.

Read more

Before You Click: 3 Quick Checks for a Suspicious Website

Dates, location, history.

Found a website you’ve never heard of and not sure you should click? I'll show you three fast clues -- domain dates, server location, and site history -- that can help you judge whether a site feels trustworthy or sketchy before you commit.
A person in a blazer at a laptop, with a magnifying glass over the screen showing a domain name, and faint overlays of “WHOIS,” “Server Location,” and “Site History.”
(Image: Gemini)

Ever encounter a website you’ve never heard of before? Perhaps a domain name that kinda-sorta makes sense but seems like something new?

Websites come and go all the time. The problem? Many of those websites are less than reputable, and many are outright scams and phishing attempts.

There are a couple of pieces of information you can gather quickly to help you decide if you want to click on or take action on that website.

Read more

How Does Cloud Storage Work?

Cloud storage sounds mysterious, but it’s really just your files living on someone else’s online computer. Let's look at how synchronization moves your changes between devices, why it can feel like backup, and the big catch: deletes spread everywhere too.
two computers on a desk with a cloud between them. The computers are symbolically syncronizing files between themselves and the cloud.
(Image: Gemini)

It seems that cloud storage is available everywhere.

But what is it? How do you use it? Why is it valuable?

Read more

What Do I Do If I’m Being Harassed, Bullied, or Stalked Online?

Online harassment is rampant. Here’s what you need to know.

Online harassment can happen to anyone, but what can you actually do about it? I'll break down whether it's illegal, how to identify who's behind it, ways to make it stop, and the critical mistakes to avoid so you can protect yourself and your loved ones.
a computer screen showing a chat window with the title "Stalker Calling"
(Image: Gemini)

Normally, this is where I’d quote the original question. But this topic appears in so many different guises and in so many different ways that quoting a single question would represent only a small slice of a much larger issue.

Cyber-bullying, or online harassment, is a frighteningly common occurrence. Those most at risk appear to be children and individuals who have been in abusive relationships, but it can happen to anyone.

The questions I get most often are:

  • Isn’t it illegal?
  • How do I find out who’s responsible?
  • How do I make them stop?
  • How can I get back at them?

Let’s tackle each of those and a couple more.

Read more

Dealing With Video Starts and Stops While Watching: Three Common Causes and Three Possible Solutions

What to check for, and what to try.

There are common causes, and sometimes simple solutions, for a video that starts and stops as you watch it.

Question: I would like to view YouTube videos without all the stops and starts while watching. What causes that, and can it be corrected?

It’s frustrating to have a video play a little, pause, play a little more, pause, then play a little more, then pause, then play a little more.

I’ll cover the two most common reasons this happens and share some workarounds.

Read more

The Nirvana Fallacy

Something that frustrates me.

I'll explain the Nirvana Fallacy -- rejecting helpful tools because they aren’t perfect -- and show how that thinking can make you less safe.
The Scale of Risk: A balance scale. On one side, a giant pile of "Real Risks" (represented by skulls or viruses). On the other side, a tiny, microscopic "What If?" pebble. The person in the image is obsessing over the pebble examining it closely with a magnifying glass while the giant pile looms over them.
(Image: Gemini)

No, we’re not talking about the band or the Buddhist philosophy of Nirvana.

The Nirvana Fallacy is something I see all the time that leads people to make ill-informed and even dangerous decisions, particularly when it comes to tech. It’s the faulty reasoning that if a solution isn’t perfect, it must not be worth using.

Read more

Is It Safe to Look, Just Look, at Spam?

Maybe.

Curious about what’s hiding in your spam folder, but worried a single click could infect your computer? I'll explain the simple rules that keep you protected and how to view raw message source safely.
an individual looking at the source code a spam email through a magnifying glass.
(Image: Google AI)
Question: I’m interested in looking at what junk and spam I’m getting without jeopardizing myself. So I download mail in Gmail and Hotmail messages in my email program and read them there. Both are good at weeding out spam and junk. They keep these for 30 days and then delete them. I want to read these at least on the Gmail or Hotmail webpages — just read and not click on anything. Is this dangerous? Might I get a malware or spyware foisted on me without my knowledge?

In other words, is opening and reading a message suspected to be spam dangerous?

While there’s always risk, it’s not nearly as bad as it once was. As long as you follow a few precautions, you’re typically safe.

Read more