Think a VPN makes online banking safer? Banking is already protected by strong encryption, but a VPN adds a twist. I’ll explain what’s really protected, what isn’t, and where the real risks lie when you bank on the go.
(Image: canva.com)
Question: Is it safe for me to use a VPN for online banking while I’m on the road?
Online banking these days is relatively safe to begin with. HTTPS connections, for example, mean your conversation with the bank is encrypted between your computer and the bank’s servers, regardless of whether or not you use a VPN.
There are a couple of things that a VPN kinda/sorta makes slightly safer.
With USB-A and USB-C, things have gotten simpler, but not always obvious. I’ll walk you through what cables really do, how devices and chargers “talk,” and why missing charger blocks isn't a big deal.
(Image: canva.com)
Question: So many devices come with only the charging cable and not the actual charger (plug/block) itself, which has the label on it stating what voltage & amperage ratings it has. I have yet to find charging cables that come with such labeling on them. So how do you know what that particular charging cable is capable of — or are they all universal charging cables whether or not they come with the plug?
USB standardization has made all of this much simpler.
For the most part, if the cables fit, your device will charge safely. Slowly, perhaps, but safely. There are exceptions, but when talking about portable devices, it’s rare.
Worried that staying signed in leaves you open to hackers? I’ll explain why your router, firewall, and smart habits protect you, what the real risks to your accounts are, and the simple steps you can take to stay safe online.
(Image: ChatGPT)
Question: Is it possible for hackers to hack an account that has not been logged out from the Internet?
There are two ways to take your question:
Can hackers hack into my computer from the internet to access accounts that I’ve signed into?
or
Can hackers hack into my online account on the internet because I haven’t signed out of the account on my computer?
Both answers are basically “no”. But because there are never any absolutes when it comes to security, the true answer for both is that it’s extremely unlikely.
Possibly being labeled a spammer is another reason not to forward political and other emails. Do it enough, and your normal email may not get delivered.
(Image: canva.com)
As I write this, thousands of people have my email address. It’s right there on the “From:” line of every newsletter I send.
Naturally, some of them forward me jokes, political messages, hoaxes, or urban legends. I know they mean well and do so with the best of intentions.
But I mark them all as spam. It seems harsh, but I feel I have to.
Because that’s exactly what they are.
Even if I don’t, others may, and because of that, there’s a very important lesson here in making sure that the rest of your email keeps getting delivered.
Worried you need a new rescue disc every time your backup program updates? Relax. I’ll explain when it matters, why it usually doesn’t, and how you can get one at the last minute.
(Image: ChatGPT)
Question: Hi Leo, I’ve been using the Macrium Reflect program to back up my Windows computer. However, I’m finding that when I try to do an image or a clone backup, I’m prompted each time to update the software. This requires making a new rescue disc, which can be fairly time-consuming as I’m using Macrium Reflect to back up my desktop PC and my laptop, too. I’m concerned that if I don’t make a rescue disc each time the software asks me to update (which is every time I open it), my backups won’t work and I’ll be “you know what” out of luck! Can you advise?
You don’t need to make the rescue media every time you back up.
You don’t even need to make new rescue media each time Reflect updates itself.
Heck, you may not even need to make rescue media at all until you need it.
There are times it’s appropriate to make a new one, but even then, it’s not a disaster if you don’t.
Think those old files on your hard drive are gone forever? Maybe not. I’ll walk you through what affects your chances of recovery, the tools you can try, and why sometimes, it all comes down to luck.
(Image: ChatGPT)
Question: Is it possible to recover data that was deleted a year ago from an external hard drive?
This is another question that earns my most common answers: “Maybe” and “It depends”.
As long as a few conditions are met, it may be possible to recover old data from a hard drive. I’ll review what those are and recover some files from a drive I formatted.
If your computer refuses to start, the problem might be the Master Boot Record (MBR). Fixing it isn’t as scary as it sounds. I’ll show you how to use Windows’ built-in Startup Repair and a couple of handy command-line tools to get your machine running again.
(Screenshot: askleo.com)
Question: Can you tell me how to fix the MBR?
The MBR, or Master Boot Record, is the first sector of MBR-configured hard disks. (GPT-configured hard disks have something similar, but I’ll be referring to MBR unless the difference matters.) In either case, it tells the BIOS or UEFI where on the hard disk to locate the software to be loaded when you boot the computer.
Without an MBR, or with a damaged MBR, your machine won’t boot (power up and load the operating system).
There’s a lot more to booting than just the MBR. Fortunately, recent versions of Windows have made the distinction between these various pieces fairly transparent, referring to all of them as “Windows Startup”.
I’m not sure what led you to ask about fixing the MBR, but repairing Windows Startup will address MBR problems as well as others.
Accidentally run or opened something suspicious? We've all done it. I’ll walk you through the options from scans to resets, and consider what to learn from the experience.
(Image: ChatGPT)
Question: I have a question. I recently downloaded a wrong file after being redirected. I even allowed the .exe to run the cmd (I didn’t see it type anything in it before closing, though) after allowing the threat in Windows Security. I did a full scan afterwards, and it said everything was fine. Should I still be worried and consider a factory reset?
Worried? Probably.
This is exactly the scenario security folks warn against so strenuously: running or opening something you shouldn’t and bypassing warnings from your security software.
What’s the difference between your email service, account, address, and program? I'll break it down so you’ll know what each term means, why it matters, and how not to get tripped up next time you want to change your email or ask a question.
(Image: canva.com)
Question: I want to change my email program from Hotmail to something else. How to do?
I’m going to use this as an opportunity to clear up some confusion I see all the time. You might not believe me, but the confusion is extremely common. (And Microsoft isn’t helping any, as we’ll see.)
An email program is not at all the same thing as an email service, or an email account, or even an email address.
In technology, terminology is important. Time for some definitions, so you won’t be confused.
Wondering why Microsoft charges for Extended Security Updates when Windows Defender will get updates through 2028? They're not the same. I'll explain the difference between malware database updates and actual Windows fixes, and what you really need to know to stay protected on Windows 10.
(Image: ChatGPT)
Question: If Windows still has “security” until 2028, why is there a fee for Extended Security?
There’s no shortage of confusion around Windows 10’s end-of-support date. This question has been asked a few times: What’s the deal with paying for ESU until 2026 if Windows Security will continue to be updated through 2028?
It’s an apples-and-oranges kind of comparison. Even though they have similar names, they’re two different things.
Worried about your data if your computer goes missing? Whole-disk encryption can keep prying eyes out. I’ll show you simple, practical ways to encrypt your entire drive so your information stays safe even if your computer doesn’t.
(Image: canva.com)
Whole-disk encryption is an important aspect of security for many people. If you encrypt a disk properly and your computer falls into the wrong hands, those hands won’t be able to access your data.
The average computer user may or may not need to use whole-disk encryption; it depends on the type of data they store and their level of concern. However, encryption is an important tool for business and government users, particularly for portable computers such as laptops and tablets.
Passkeys promise more security and less hassle, but is syncing them across devices safe? Learn how password managers handle passkeys and what happens if a device is stolen.
(Image: ChatGPT)
Question: If one passkey is synced across multiple devices, what happens if one (like a laptop) is stolen?
Passwords are easy. We understand what it takes to make them more (or less) secure. Passkeys are a little harder to understand, partly because they depend more on behind-the-scenes security measures we don’t see.
Fortunately, the benefits and risks of sharing passkeys across multiple devices via a password manager are almost identical to doing the same with passwords.
Not sure if your Windows network should be public or private, or even what that means? I’ll show you what each means, when to use them, and the simple steps to switch.
(Image: Gemini)
One of the most confusing aspects of Windows networking is the concept of private and public networks. When you set up a network (typically when installing Windows or the first time you make a connection on a new network adapter), Windows makes an assumption about which you want.
Sometimes that assumption is wrong.
Depending on what you do later, Windows may offer to change it. Or not.
I’ll review what these network types mean and how to switch from one to the other.
People want to know if someone’s opened their email. I’ll explain why features and tools claiming to do that can't work most of the time. I'll share the only way to know for certain your message was read.
(Image: ChatGPT)
Question: I sent an email to a friend, and he claims never to have gotten it. I don’t believe him; things he’s said led me to believe that he did get it and that he did read it. Is there a way I can tell for sure?
I’m amazed at the number of questions I get that boil down to people not trusting each other. Not that there isn’t cause, I suppose, with spam, phishing, and malware running all over the place. But this seems like the simplest case of all: was your email read or not?
The answer to your question is no, there is no way to tell for sure that your email was delivered, opened, or read. You might as well have dropped it into a black hole.
Ever notice that the same file can show up as different sizes depending on where you look? It’s not a mistake; it’s how disks and online services handle storage. I’ll explain why your files can look bigger or smaller, what clusters have to do with it, and why it’s nothing to worry about.
A one-byte file shown in Command Prompt. (Screenshot: askleo.com)
Question: When backing up online, my pictures only take up ~65 GB, but ~88 GB are reported on my computer. Why?
This is something that’s confused computer users for many years: the same file can show as taking up a different amount of space depending on where you look and the characteristics of different disk drives.
Copy that file online and things get even more confusing.
This is not something to worry about. Fortunately, no matter where it’s stored or how much space it’s reported to be taking up, your file is still your file.
Want to keep your folders private? This article shows three ways to encrypt everything inside a folder. Each method has pros and cons, so you’ll learn which one best protects your files while balancing ease of use.
(Image: canva.com)
Sometimes encrypting a single file isn’t enough. Sometimes you want to encrypt all the files in a folder and its subfolders.
As you might imagine, there are several solutions, depending on your particular needs.
I’ll review some alternatives, as well as their pros and cons.
It's frustrating when email previously marked as "not junk" continues to get sent to the Junk folder. Let's look at your options.
(Image: ChatGPT)
Question: A newsletter subscription I have had for YEARS recently started going into junk mail! I have had it all along on the junk mail “safe senders” list. Now I added it as a full contact using the exact email from which it is sent. The daily newsletter still goes to junk mail! It is addressed to my Hotmail address, so not a generic address. What gives??
Outlook.com does not make this fix obvious, but it is fairly easy. In fact, it’s gotten easier in recent years.
Let’s take some steps in Outlook.com to stop emails we want from going to the junk mail folder.
Windows 10 support ends October 14, 2025. Should you move to Windows 11? I’ll walk you through the pros, cons, and options: upgrade now, wait for new hardware, or even stick with Windows 10 safely. The choice is yours, but it’s time to decide.
Is your once-speedy computer crawling? From hidden malware to too many background apps, there are plenty of reasons your PC might feel sluggish. I’ll walk you through the most common causes and what you can do to get things running smoothly again.
(Image: canva.com)
Perhaps when you purchased it, your computer ran like a champ and quickly did everything you needed. Now, well, not so much. Perhaps it takes forever to boot. Or starting applications is slower than molasses. Or maybe the machine just acts sluggish when you try to use it for just about anything.
Regardless of the specifics, the underlying theme is simple: It’s slow.
There are so many reasons a machine could slow down. I’ll list a few of the most common reasons here, along with some advice on what steps to take.
Been asked to spot bicycles or click “I’m not a robot”? That’s CAPTCHA at work. Here’s why websites use them, how they’re changing, and what it means to be asked to prove you’re human.
(Image: ChatGPT)
We’ve all seen them and been frustrated by them. Click on all the images that contain a bicycle. Or a bridge. Or stairs. Or click this slider and move it to the right until the image is properly aligned. Or pick the two things shown in different orientations that are the same.
Those are all CAPTCHAs, which is an acronym for Completely Automated Public Turing test to Tell Computers and Humans Apart. It’s even trademarked by Carnegie Mellon University.
As frustrating as they are, they exist for an important reason.
Want to send a file safely by email? I’ll show you how to use the simple .zip format with a strong passphrase so your private documents stay protected across Windows, Mac, or Linux platforms.
(Image: ChatGPT)
Sending an encrypted document as an attachment is a reasonable approach to securely sending information in what is otherwise an insecure medium: email. Even though there are approaches to encrypting email messages themselves, they’re either obscure or complex (or both), and not widely known.
Encrypting individual files can also be an important step in secure data management.
I have a specific recommendation that should be easy and work just about everywhere.
Want to know what’s really going on in your PC? Process Explorer is a free, powerful tool that digs deeper than Task Manager. I’ll show you how it works, what you can discover, and why it’s one of the best utilities you should have on your computer.
(Screenshot: askleo.com)
You may not need, or even want, to know what’s going on under the hood in Windows. Most computer users shouldn’t have to. Computers are supposed to just work, and you should never need to be bothered with things like processes or resource utilization.
And yet, there are times when we want, or even need, to know.
This is where Process Explorer comes in. Process Explorer — also called “procexp” — provides a window into all the programs running on your computer at a level of detail that Task Manager doesn’t.
Worried about Windows 10 after support ends? Don’t be. I'll show you the simple steps -- good habits and reliable security software -- that will allow you keep using your Windows 10 computer safely.
(Image: ChatGPT)
Question: You keep saying we can keep using Windows 10 safely after support ends. How is that even possible?
I know it’s a controversial position that not everyone agrees with, but I believe it’s quite possible to keep using Windows 10 safely after Microsoft ends its official support of the operating system.
There are two things you need to do. Both are things you should be doing already.
Tired of changing your email every time a service shuts down or your ISP changes? Learn the smartest way to secure an email address that’s truly yours for life, and why relying on free or “lifetime” promises could leave you stranded.
(Image: ChatGPT)
Question: I’ve used {now defunct service redacted} for several years in order to avoid notifying my contacts that I’ve changed my email address. They promised me a single email address I could keep forever. Except I now find that the site is working, but it doesn’t allow me to view my account. The page merely says, “It works! This is the default web page for this server. The web server software is running, but no content has been added yet.” Are you able to help me?
Help you get your account back? No.
Help you avoid this situation again in the future? Absolutely.
It’s frustrating when a service promising to provide something forever goes away. Apparently, “forever” isn’t what it used to be, and “lifetime” turns out to be the company’s lifetime, not yours.
Frustrated when a window just flashes and disappears when you use Start-Run? It’s not an error; it’s how Windows handles certain programs. I’ll explain what’s happening, why it’s confusing, and show you the simple trick that lets you see what’s going on.
(Video: askleo.com)
Question: When I try to use “Start” and then “Run” to run a command, the DOS screen flashes momentarily, then vanishes. Am I overlooking something obvious?
Not really. It’s only obvious if you’ve been using PCs since before there was Windows and its graphical user interface, or GUI.
Start-Run is incredibly useful, but it’s not appropriate for everything. The good news is, there’s a simple trick that fixes what you’re seeing.
Losing access to Gmail can mean losing years of email, contacts, and memories. Learn the most common pitfalls, from outdated recovery info to ignored warnings, and how to avoid them so you never risk losing your account.
(Image: ChatGPT)
By far the most common topic throughout the history of Ask Leo! has been account loss and recovery. Originally, it was all about Hotmail, but these days, it’s Google. People lose access to Google and Gmail accounts all too often.
The result, of course, is the loss of years of email, contacts, files, and whatever other Google services they used along the way.
Lockouts and loss happen not because Google’s broken (even though thinking so is a common knee-jerk reaction), but because of preventable mistakes and oversights.
Let’s review what can go wrong and how you can prevent losing your account forever.