How Do I Tell If an Email Address Is Fake?

There may be clues. Or not.

It's hard to determine whether an email address is fake.
Illustration in a popular 3D animation style showcasing a detailed email envelope icon. Over the envelope, there's a large, clear magnifying glass zooming in on a generic email address (e.g., user@example.com) written on the envelope, set against a light gradient background.
(Image: DALL-E 3)
Question: How can you tell if an email address is fake? How do scammers make fake emails?

While it can be helpful to identify fake email addresses — they’re a great clue as to whether the email you’re looking at is a scam or worse — you might not be able to. A phony email address can easily be made to look like a valid one.

Sometimes there are clues, and I’ll review a few of those, but some of those clues also apply to legitimate email addresses.

Read more

How to Deal with Spam

You can’t stop it, but you can take steps to avoid getting more.

Spam is inevitable; just don't ask for more.
Stop Spam!
(Image: canva.com)

Imagine a world without spam. What a nice, quiet place, right? Many services would be more efficient and cost less.

Unfortunately, that utopia is not to be. Spam exists and can’t be completely prevented.

But you can take steps to prevent getting more spam.

Read more

Four Risks With Free Wi-Fi

It can be fine, and probably is, but there’s always risk.

Freely accessible Wi-Fi is almost everywhere, and most systems are set up to use it safely. There are a few things to pay attention to in order to stay safe.
Free Wi-Fi
(Image: canva.com)
Question: How come connecting to a trusted public hotspot is not a BIG security issue since multiple devices can be connected to that same Wi-Fi? If even one of the connected devices has malware, then isn’t my device also under threat ??

This question was asked in response to a Ask Leo! Tip of the Day suggesting that you look out for “fake” public hotspots.

The issue is that even if the hotspot itself is the correct and trusted hotspot, what about all the other users?

Read more

Backups Are GREAT Security

They protect you from failure as well as malware.

Don't overlook backing up as part of your computer security. When the worst happens, it's your backup that will save you.

We tend to think of backing up as separate from keeping our computers secure.

Nothing could be further from the truth.

To misquote the cereal commercial: backups are an important part of a healthy, secure breakfast.

Read more

What to Do When Your Outlook.com Storage Is Full

Microsoft changed how they allocate storage.

Microsoft changed the free storage allocation for Outlook.com and OneDrive.

In 2023, I started hearing from people who suddenly could not send or receive email via Outlook.com, or were seeing warnings that they’d soon be unable to unless they took action.

The action? Buying more OneDrive space.

What does OneDrive have to do with Outlook.com? Until 2023, not much. Now, though, they’re attached1 at the hip.

Read more

Will Google Delete Inactive Accounts?

The answer is YES.

Google deletes accounts that are inactive for two years -- including Gmail, Drive, Photos, and even YouTube content. I’ll explain what “inactive” means, how to keep your accounts safe, and why this change could erase important cultural history.
Google Logo
Google Logo (Screenshot: askleo.com)

At the end of 2023, Google announced that the company would start deleting inactive accounts.

Let’s review what it means to be “inactive”, what you need to do, and why this might be a serious blow to our cultural history.

Read more

Backing Up a New Computer

Chicken, meet egg. Or maybe say hello to Heisenberg.

Backing up your new computer on arrival can be an important safety net. But there are degrees of what's good enough.

Question: I’m supposed to receive a new laptop tomorrow and don’t quite understand how to make your suggested system image backup before connecting to internet without connecting to get the software. Can I download it to an external drive and then run software directly onto the new machine (offline)?

Creating an image backup of a brand-new machine boils down to a chicken-and-egg scenario: you want to back up the unmodified machine, but you must modify the machine by installing software to back it up.

Or do you?

There are a couple of approaches to this. One is practical and easy, and the other is technically more accurate.

Read more

7 Ways to Increase Internet Speed in Windows

We all feel the need for speed.

Internet speed: we all want it. Here's how to improve yours.

In a previous article about speeding up Windows, I mentioned that sometimes a computer can appear to be slow, but the fault may be in your internet speed.

That raises the question, of course: how do you increase internet speed in Windows?

I have some suggestions.

Read more

Why I Rarely Panic

Perhaps it’s why I still have my hair.

Don't Panic

So much of we hear about just isn't panic-worthy, even if news reports make it seem like it is.

As I watched a “major” security issue2 unfold a few years ago, I read the media reports seeming to claim that the end of the world (or at least the internet) was upon us. I felt like I was supposed to be panicking.

I didn’t, and neither the world nor the internet ended.

It’s not in my nature to panic. That’s just the kinda guy that I am. Panic may occasionally be called for, but usually it does more harm than good.

Read more

Do I Really Need a Recovery Email?

Yes, you do.

Alternate email addresses can allow you to regain access to your account if it's hacked or you forget your password.

Question: OK, I’m confused. How does the recovery email on Google work? Where do I get the messages? Do we really need a recovery email?

Yes, you need a recovery email for every account that offers the ability to set one.

Recovery email is one of those concepts that is easy to take for granted and assume everyone understands. Even if you do, you might want to review the concepts and ensure that the recovery email addresses you have are set up properly.

Read more

Two Reasons to NOT Reuse Passwords

Hackers keep track of your passwords if they find ’em.

Reusing passwords -- even strong ones -- is risky. If one site gets hacked, attackers try that same password elsewhere. Worse, once exposed, it’s saved bv hackers and reused in future attacks. I’ll discuss why this matters, how to check if your password’s out there, and what to do instead.

A reader recently commented:

Question: It’s a good idea to get a feel for how strong your password is. There are plenty of password-strength tools online. You don’t need to put your password into some random website (I wouldn’t ever recommend that), but having a good sense of the strength or weakness of your password is really important.

I disagree.

You don’t need a password-strength tester.

You should, however, use a password-found tester. And while it’s not “some random website”, there is a website I suggest you use.

Read more

Are You Afraid of Tracking Cookies

They don’t worry me, but others feel differently.

Cookies are placed on your machine by websites -- often more websites than you realize. We'll review cookies and how third parties use them.
A person walking through a dense forest, leaving a trail of cookies behind them.
(Image: DALL-E 3)

In two other articles — What Can a Website I Visit Tell About Me? and What Are Browser Cookies and How Are They Used? — I discussed how websites gather information about the people who visit them.

What I didn’t talk about in much detail is that through clever use of cookies — typically associated with advertising — some services gather and use more information about you.

We need to talk about tracking and third-party cookies.

Read more

What Happens When Applications Die?

If you rely on them, it pays to prepare.

Apps don’t last forever, and when one you rely on disappears, it can take your data with it. I'll show you how to protect yourself so you stay in control.
1Password CSV Export
Exporting data from a password vault. (Screenshot: askleo.com)
Question: While I am not particularly concerned about my privacy (all that stuff on the internet was out there before the internet, it was just a little harder to find), I am not particularly trusting. I realize that TrueCrypt was open source and Lastpass etc. are all paid services, but what happens if they go belly up? What happens if they hire some idiot and all of their software goes up in smoke? I have a hard time trusting these services, or any others for that matter, and these are things I want under my control.

What you describe happens more often than one might think.

There are people who use an application for some time and suddenly find that the company is no longer in business, and there’s no way to get an update. Sometimes that means they can’t migrate to current versions of their operating system if they want to keep running that now-unsupported software.

It’s something I consider when selecting important software. Depending on what programs we’re talking about, there are approaches you can use to back up your data and protect yourself from potential software obsolescence or disappearance.

Read more

How Do I Print Pictures From Websites so They Look Good?

You might not be able to.

Trying to print a cute photo from a website and wondering why it looks fuzzy on paper? I'll explain why that happens, what you can do, and when high-quality results are possible.
Different resolutions, stretched.
(Image: askleo.com)
Question: I would like to know the simplest way to print a small to medium image from a webpage and have it print out as a crisp picture to fit an 8-1/2″ by 11″ sheet.

This question has one simple and one complex answer.

The simple answer is that most of the time, you can’t.

The complex answer, of course, is: it depends.

Read more

Do Complex Passwords Still Matter If You Use 2FA Everywhere?

Yes.

Do you think your passwords don’t matter because you use 2FA everywhere? I'll break down why weak passwords still put you at risk, how attackers work around 2FA, and the steps that keep your accounts safe.
A warm, colorful door with two locks and corresponding keys—one labeled “Password,” the other “2FA”—both needed to open it.
(Image: Gemini)
Question: If I’m using 2FA everywhere possible, do complex passwords matter as much? Doesn’t 2FA protect me against compromised passwords?

2FA (Two-Factor Authentication) adds a strong safety net, but it doesn’t replace the need for good passwords. As the first factor, passwords work together with 2FA to protect you from different kinds of attacks.

Read more

Did Microsoft Lie About Windows 10?

The dangers in believing sound bites and clickbait.

Windows 11 proved the old “Windows 10 is the last version” claim wrong, but was it that claim a lie? I'll look at where it came from, what Microsoft actually said, and how headlines can twist a message.
Windows 11
(Screenshot: askleo.com)

With the end of support for Windows 10 having passed (or been extended, or something), I’ve heard from many people complaining, “But Microsoft said Windows 10 was the last version of Windows!”, often followed by some form of “neener neener!”

In my opinion, Microsoft did not lie when “they” said, “Windows 10 will be the last version of Windows.” Let me don my asbestos underwear and explain what I think happened.

Read more

UniGetUI – Keep (Almost) All Your Apps Up to Date Automatically

So many apps. So many updates.

Tired of chasing updates for all your programs? This tool pulls all of them into one place and keeps them up to date for you. I'll show you how UniGetUI can save you time, reduce clutter, and make managing your apps almost effortless.
UniGetUI webpage.
UniGetUI. (Screenshot: askleo.com)

It’s common advice to keep your system and all your installed applications as up to date as possible. Windows Update takes care of Windows and many of its apps, as well as other Microsoft apps like Microsoft Office.

But what about everything else?

The reality is a mishmash of applications that install update checkers that run all the time, apps that check for updates each time you run them, apps that check for updates every so often as you run them, and, of course, apps that don’t check for updates at all.

UniGetUI is a great solution for all that.

Read more

Should I Use RAID for Backup?

You could make things worse.

RAID might sound like a clever backup shortcut, but it’s not. In fact, relying on it could make things worse. Learn what RAID does, how it helps (and doesn’t), and why it still won’t save your data when disaster, malware, or mistakes strike.
A RAID Array
(Image: canva.com)
Question: Do you think RAID 1 is a viable alternative for backing up?

No. No. No. Absolutely not.

And, by the way, NO! Smile

RAID is not backup technology and should never be considered a replacement for backing up.

I’ll review what RAID is and, most importantly, what it is not.

Read more

The Wrong Way to Change Your Email Address

The easy way is the wrong way.

Emailing your entire contact list with a notice that you've changed your email address is NOT the way to change your email address. I'll show you what to do instead.
A cheerful but overwhelmed cartoon character at their computer as hundreds of flying paper emails burst out of the screen, addresses visible everywhere.
(Image: ChatGPT)

From time to time, I get emails like this one:

Hello everyone,
Just letting you know we have changed our email address to {email address removed}.
Our old address, {email address removed}, was compromised. Please delete it.
We will stop using our old address immediately.
Thanks, 
{name removed}
{new email address removed}

On one hand, this is an easy way to let your friends and family know that your email address has changed.

On the other hand, there are serious drawbacks to this approach. Let’s review the most common and what you should do instead.

Read more

Can I Delete Pagefile.sys?

It’s mysterious, hidden, and sometimes very large.

Pagefile.sys is the paging file that contains Windows' virtual memory. You can easily remove it, but you need to understand the ramifications.
Disk & RAM working together.
(Image: copilot.com)

Pagefile.sys is a file (along with swapfile.sys) created by Windows to manage memory usage.

It takes special steps to remove it, but it’s not difficult. I have instructions.

The catch: you probably don’t want to, and even if you do, it won’t make much of a difference unless you’re really low on RAM.

Read more

How to Back Up Outlook.com Email

You need a safety net.

Outlook.com accounts are hacked into and lost every day. Here's how to ensure you won't lose email or contacts if it happens to you.
email flowing from an Outlook.com cloud icon into a desktop PC displaying an email program
(Image: ChatGPT)
Question: How do I back up the email I have hosted on Outlook.com? Contacts, too.

Most people don’t back up their online Outlook.com accounts. All their email is stored in exactly and only one place: in that account stored on Microsoft’s online servers. When the account is hacked or lost for any reason, all that email disappears, often forever.

Remember: if it’s only in one place, it’s not backed up.

To avoid the possibility of losing everything, backing up your Outlook.com account — or any online email account — is critical.

Read more

Scammers’ Three Common Lies

Too many people believe the lies.

Scammers' favorite tricks include old lies told in new ways. I’ll show you how these scams work, how to spot them before it’s too late, and the simple steps you can take to protect yourself, your money, and even your identity.
A hand reaching out of a computer screen to pick up a wallet lying next to the computer's keyboard.
(Image: ChatGPT)

It’s no secret that scams are rampant and that older folks (which these days includes me) are being targeted heavily.

The US Federal Trade Commission recently posted False alarm, real scam: how scammers are stealing older adults’ life savings. It details some of the techniques scammers are using and steps you can take to stay safe.

I want to highlight some of what they said because too many people still aren’t getting the message.

Read more

Why I Cringe When I Hear People Are Using ChatGPT to Look Things Up

It’s not that you use AI; it’s how.

AI tools like ChatGPT sound smart and sure of themselves. I’ll explain why blind trust in AI answers can be risky, how its confidence can fool you, and what simple habits will keep you from being misled while still getting the most from this amazing technology.
Confidently Wrong
 (Image: ChatGPT)

Don’t get me wrong: used properly, AI is an amazing tool. I use it myself daily for everything from idea generation to image creation to summarization and more.

I also use it for search and Q&A. Mostly. Sometimes. With a great deal of trepidation and skepticism.

When I hear people “just” use AI now in place of more traditional tools and techniques, I get worried… really worried.

Read more

Does Whole-disk Encryption Impact Computer Performance?

Theoretically, but not practically.

Does whole-disk encryption slow your computer? You might be surprised. The bigger risk is losing access to your data if you’re not careful with your encryption keys and backups.
Padlocked disk
(Image: depositphotos.com)
Question: Does whole-disk encryption only affect performance while the computer is starting, or does it have a constant effect on the computer’s overall performance?

Neither… and both.

Encryption in general, and whole-disk encryption specifically, has come a long way since it was first introduced many years ago. One of the most striking changes is its impact on performance.

I’ll put it this way: I would not let performance concerns hold you back from using whole-disk encryption.

Read more