It's not trying to annoy you, it's an important part of keeping you safe. With an extra step or click, you can easily be the administrator when needed.
(Image: Gemini)
Question: My computer says that I need to be the administrator [to perform a task], but I already am! Any ideas as to what is happening?
I recently added an article that discusses this in some detail: Windows Administrator Explained. In a nutshell, a security feature in Windows means you’re not the administrator of your own computer.
Setting up Windows 11 without a Microsoft account is still possible.
(Image: DALL-E 3 & askleo.com)
Microsoft has been pushing us to use Microsoft accounts to sign into our Windows computers for some time. In recent versions of the Windows 11 setup process, it seems that there’s no choice but to sign in with a Microsoft account.
While it may be well hidden and obscure, the choice is still there. It’s not even that difficult.
I’ll show you how.
Update: March, 2026: I can confirm that this technique still works, at least sometimes (there may be other factors involved). I was able to reinstall Windows 11 Home 25H2 with only a local account.
Your photos capture moments you can never get back, but one lost phone or crashed hard drive could wipe them out forever. Protecting them is easier than you think. Here's a simple plan to make sure your memories are never just one accident away from gone.
(Image: Gemini)
Do you back up photos and videos?
Everyone with a smartphone has a camera, and they use ’em right and left to snap photos and shoot videos. Add in digital cameras, and there is a lot of digital media being created every day.
Much of it isn’t getting backed up. The goal? Multiple copies of your photos and videos in multiple places.
Sending private documents by email feels risky because it is. What's the safest way to get sensitive information to the right person without it falling into the wrong hands?
(Image: Gemini)
Question: I recently had to send some very private identification papers over email. Now normally I wouldn’t do this, and I would use snail mail instead, but this was very urgent, and I thought I would take a chance. As far as I know, no ill has come of it, but I was wondering: what ways are there to send emails securely across all platforms and also be sure that the right person on the other end gets it?
I’m occasionally faced with this dilemma. Either for expediency or convenience, I want to email something I wouldn’t want to fall into anyone else’s hands.
While there are many approaches, there’s only one practical approach.
You thought it was tech support, but it was a scam. You gave a stranger full access to your computer. How worried should you be?
(Image: Gemini)
Question: I called a number that I thought was the support center and was immediately connected with a technician who skillfully asked my permission to allow him access to my computer so that he could diagnose the problem, and I agreed. After he informed me that I had over a thousand errors that needed to be erased and that he could do this for me for only $250, I realized that this was some kind of scam, and I promptly ended the call. What kind of risk have I exposed myself to?
First, good on you for terminating that call. I hear about many people falling for scams like this.
You let a stranger with possibly malicious intent use your machine remotely. How worried should you be?
Your new computer came loaded with software you never asked for. Before you reach for a debloating tool, here's my controversial take on what you should and shouldn't do about bloatware.
(Image: Gemini)
Question: I just got a new machine. How do I get rid of all the cr*p that’s on it that I don’t need or want?
There’s no argument that Windows comes with a bucketload of pre-installed software, much of which we never use, typically referred to as bloatware. Because it’s never used, many people look for a quick way to get rid of it all — debloating — leaving only a presumably leaner, meaner operating system behind.
There are several approaches, ranging from bloatware-cleaning tools to manual individual uninstalls.
Then there’s my approach: for the most part, I do nothing.
Your credit card info can be stolen in stores or online. From tap-to-pay to virtual card numbers, I'll walk you through the best ways to keep your credit card safe.
(Image: Gemini)
Question: As a recent victim of identity theft, I am struggling to install preventive and defensive measures. Assuming my credit card info was stolen somewhere, either at a point of sale or an online sale, what should I be doing to lock down my credit card numbers in the future?
While I’ve fortunately (knock on wood) never been a victim of actual identity theft, I’ve definitely had a credit card compromised a time or two over the years. It’s frustrating, a little scary, and once it was extra inconvenient, as I was travelling when it happened!
Some aspects of transaction technology have changed in recent years, making credit card use safer than ever… if you take advantage of them.
Changing an email address changes a lot more than the address. I'll look at common scenarios and a few additional approaches.
(Image: askleo.com)
Though people ask about this frequently, the answer is rarely simple. Changing an email address often means one thing to the person asking and something very different to email providers.
You didn't ask for it, but there it is: email meant for someone else in your inbox. I'll discuss why this happens and what you can do about it.
(Image: Gemini)
Question: Leo, I have an ongoing problem. I routinely, sometimes as many as three or four times a week, get emails where someone with an email address similar to mine fills out an application, signs up for a newsletter, or even orders a product of some time and fat-fingers-in my address. I really don’t want to change email addresses after using this one for 22 years. Any suggestions on how to stop or reduce this?
For the record, this happens to me constantly. I regularly get emails that were clearly (clearly!) intended for someone else, likely with a similar email address to mine.
I have theories about why this happens to most folks, and additional theories about why my situation might be special.
Microsoft continues to confuse us with repetitive product names. I'll clarify the difference between Outlook, Outlook, and Outlook.com, and help you decide which you want.
(Screenshot: askleo.com)
Question: I use Outlook.com. Does that mean I don’t need Outlook? Are they just two names for the same thing? If not, how do they relate to each other?
Note: I periodically update this article because Microsoft just can’t leave things alone. My caveat is that things may change in the future, and this article may or may not still apply.
The short answer is: Outlook, Outlook (classic), and Outlook.com are three different things, none of which really relate to each other.
They have three things in common: they’re all related to email, they all have the word “Outlook” in their names, and their icons are easily confused.
Losing your phone can lock you out of your accounts if it’s your second factor for authentication. Here’s how I recovered while traveling, the backup options that saved me, and the steps you can take now so you’re never stuck without access.
A dead phone. (Image: canva.com)
I went to take a photo of my dogs, and apparently, it was cuteness overload for my phone, because it just shut down the moment I tapped the button.
I forced a reboot and took another photo, which worked. A few seconds later, while viewing the photo, the screen went crazy and the phone started squealing. I forced it off again. It came back one more time, worked for a bit, and then shut down one last time. All further attempts to revive it were unsuccessful.
I was now the proud owner of a brick.
The biggest problem? The phone was my second factor for all my multi-factor-enabled accounts — and I was traveling. Could I sign in to my important accounts without it?
Passkeys are supposed to make signing in easier and safer, but what happens when it stops working or your device is gone? I'll show you what to do if your passkey fails or is lost and a technique that makes passkeys work everywhere.
(Image: Gemini)
Question: So if I get a passkey and it doesn’t work, what happens then?? How can I change it… or can I change it?
A common variation of this question is, “What if I lose the device on which my passkey is stored?”
Passkeys are easy to use and complicated to explain.
Fortunately, this question has a fairly straightforward answer: just start over.
Someone hacked your email and you want answers. Who did it? Where are they? Can you track them down? Here's what you should do.
(Image: Gemini)
Question: I just want to tell you that someone has hacked one of my email IDs and he sent email from my ID to someone else. Now, please tell me how I can find out from which computer and from which place this email has been sent. In other words, how do I find who hacked my email? Your cooperation will be highly appreciated.
When accounts are hacked, folks really want to be able to figure out who did this to them. How did it happen? What computer were they on? Who are they?
The short answer is, you’re extremely unlikely to figure out who hacked your email account. Here’s what to do instead.
Yes, your computer can get hacked even when it's fully updated. Zero-day attacks exploit vulnerabilities that your antivirus software doesn't yet know exist. I'll explain how these attacks work and what you can do to protect yourself.
(Image: Gemini)
Question: Can you tell me more about zero-day attacks? I experienced one on my fully updated and patched Windows computer (automatic Windows Update ON), which has the latest anti-malware tools. I saw the hacked behavior and immediately turned off my computer. Scanning both before and after this attack showed no prior or present malware infection. Is this the best response for such attacks, as it appears to have successfully prevented malware infection by this attack that I experienced?
The very nature of zero-day exploits is that your malware scanner would show that you were clean both before and after being infected. It’s not until your security software provider updates their databases and you take that update that your malware scanner knows what to look for.
Why will your computer sometimes tells you "access denied" when you're the only user? Windows has a system of administrator account types that are easy to misunderstand. I'll describe which type of account you likely have, and what the other options can and can't do.
(Image: Gemini)
The concept of the “administrator” in Windows is somewhat confusing. It’s not uncommon for people to be disallowed from doing something on their PC because they’re not the administrator, even though their account is the only one on the machine.
Administration has several forms. Let’s explore what they are and what it means to be administrator… even when you’re not.
Ever wonder why your computer shows one IP address, but websites see something totally different? They're both right. I'll describe how your router juggles two addresses behind the scenes and how that protects you every time you go online.
(Image: Gemini)
Question: Using tools on my machine, I can see that my IP address is one thing (in my case, 192.168.1.100). But when I go to an internet site that shows me my IP, it shows me something completely different. Which is right?
They both are.
Your machine has one IP address, but it isn’t necessarily the IP address that is used to connect to the internet.
The IP address that appears depends on who’s looking and from where.
Stuck with a version of Windows you can't stand? You're not alone, and you're not trapped. "Uninstall" isn't a thing, but there are a few options you might not know about.
(Image: DALL-E 3)
Question: I installed the latest version of Windows. I don’t like it. I want to get rid of it, but there is no uninstall program. How does one get rid of this program? I’m moving to Linux.
It happens with every version. People love the version they have, or they at least tolerate it, but the new version? Intolerable.
So they want to jump ship. Great! There are many other fine-looking and capable ships to jump to.
If you're not using a password manager, you're likely compromising your security more than necessary. Here's why using one is safer.
(Image: Gemini)
Question: Recently, I tried to use RoboForm for an account at a large financial institution, but I couldn’t get it to work. In response to my inquiry, this institution said they do not permit logins using credentials that are stored on software because the security of the password could become jeopardized if my computer were hacked, invaded, etc. Is this true? Am I safer not to use tools like RoboForm?
Some people believe using password managers presents a single point of failure. Very technically, they are correct: if someone gains access to your password manager, they have access to everything in it.
Not so technically, I believe they are misguided.
Using a good password manager is significantly safer than any alternative.
Your computer might be chatting with hundreds of servers right now, including sites you might not expect, without you knowing! I'll show you free tools that let you see what your machine is up to online.
(Image: Gemini)
Our machines are pretty much constantly connected to the internet these days. That means the software running on your device is connected to remote servers and services, either constantly or as needed, and probably with little indication.
I’ll show you a few ways to see what your machine is up to, using built-in and free tools.
Ever wondered if your Wi-Fi card can handle the latest speeds, or why it won't connect in certain places? I'll show you exactly how to check which Wi-Fi protocols your computer supports, and what those cryptic "802.11" labels actually mean.
(Image: Gemini)
Question: I don’t know if my Wi-Fi card is 2.4 GHz or 5 GHz, so my first question is, how do I find which I have?
If you’re having trouble connecting to a Wi-Fi hotspot — open and public, or otherwise — it could be a mismatch between the capabilities of your Wi-Fi hardware and the hotspot providing the wireless networking.
To do this, we need to figure out which protocols — that whole “802.11” thing — your card is capable of. Once we have that information, we can make a few assumptions.
Fortunately, your card’s capabilities are easily discovered.
Think you're too smart to fall for a scam? Think again. Scammers aren't targeting your intelligence; they're targeting your humanity. I'll share the sneaky mind tricks they use every day and help you spot the red flags before it's too late.
(Image: Gemini)
You’ve probably heard the term social engineering. It’s behind almost every scam.
Social engineering isn’t about technology, trickery, or even intelligence or the perceived lack thereof; it’s psychology, pure and simple. It’s about pushing your buttons.
It’s important to understand the risks of buying a used computer.
(Image: Gemini)
Question: My dad bought a computer from a yard sale. The problem is that they forgot to take off the password. I’m logged in as a user, but not an administrator, so I don’t have admin privileges. How do I become an administrator?
This is frightening for many reasons.
It’s not you who should be scared. We’ll probably be able to get you into the computer. It’s the previous owner who should be concerned; it’s clear they didn’t take a few important steps before selling their computer.
You still need to tread very carefully. I’ll explain why.
Keyboard not working, but you need to type to sign in to Windows? There's a solution for that.
(Image: Gemini)
Question: My keyboard’s on the fritz, and now I can’t sign into my computer. If I could get in, I think my mouse would be enough for some of what I need to do, but how do I get in in the first place?
Over the years, Windows has improved its accessibility features. They allow users with hearing, visual, motor, or other types of needs to interact with computers using assistive technologies. But the tools are there for everyone, and can be useful to all of us.
Worried your sleeping computer might get hacked? The short answer is no, but there's a catch. I'll explain what that is and why you're still probably safer than you think with basic security in place.
(Image: Gemini)
I have a love-hate relationship with the sleep function. It puts the computer into low-energy use, pausing active tasks and storing open applications and files in memory. People like it because it keeps the computer powered on and ready to work again.
I love the concept, but I hate most implementations. I often find it results in unexpected behavior. Only if a specific device has proven its sleep function to be generally stable will I use it. It’s a determination I make for every single computer that might sleep, because every machine behaves differently.
So, with that little gripe out of the way, can your computer still get hacked if it’s in sleep mode?