How Do Spam Filters Work?

Mysteriously.

Spam filters can be sophisticated or simple. I'll look at some of the characteristics of email that spam filters check.
A bright, well-lit mail room with shelves filled with letters and packages. In the center, a person wearing a casual outfit is holding a letter up and examining it closely using a magnifying glass. The person has a focused expression, with the magnifying glass highlighting the details of the letter. The background includes various mailroom elements such as labeled boxes, a sorting table, and some open envelopes. The overall scene is modern and tidy, with a focus on the letter and the magnifying glass.
(Image: DALL-E 3)

Someone commented to me that his spam filter was pretty useless since the spam he was receiving kept coming from different email addresses. The implication was that this person believed that the “From:” address is the only thing that spam filters check.

While that’s possible, it’s also rare.

These days, spam filters are complex and sophisticated pieces of software that check much more than you might think.

Read more

Six Signs of a Phishing Attack

Don’t be fooled.

A friend received a fairly convincing phishing attempt. I'll cover the signs that showed it was spam.

A friend recently asked me to look at an email they’d received to confirm if it was legitimate.

It was not.

It was a good attempt, though, and it probably fooled many people into clicking through and potentially handing over their sign-in credentials to a crook.

I’ll review some signs in this email that flagged it as fake.

Read more

Can I Trust Cloud Backups?

It depends on what you’re backing up. In general, it’s unlikely to be enough.

Backing up data using an online backup service can be an important part of an overall strategy, but it's important to understand its limitations.

Question: I keep hearing about online backup services that will back up your data to the cloud. Assuming it’s secure, why shouldn’t I do that and skip the hassle of doing backups to an external hard drive or whatever?

Online backup services can be a useful component of a broader backup strategy, but they are not enough. There are several factors to consider, including security, completeness, speed, and cost, before deciding if online backup is the right thing for you.

Read more

Does the Recycle Bin Take Up Space, and Where Is It?

Mysterious and hidden.

The Recycle Bin is your friend. I'll show you where it lives and how to control the space it uses.
Recycle Bin
(Image: DALL-E 3)

When you delete a file using Windows File Explorer, that file is placed in the Recycle Bin. The Recycle Bin in Windows has saved many a person from grief, I’m sure.

But where exactly is it, and do the deleted files still take up space?

Let’s look.

Read more

Can I Delete Temporary Files in Windows?

Why are so many left undeleted?

Temp files can pile up. Why is that, and do you need to worry about them?

Question: Why are there so many temporary files left behind each time the computer is shut down and restarted?

There are indeed many temporary files. As I write this, my primary machine has 322 files in its temporary folder that total 58 megabytes. My example PC, which isn’t used nearly as heavily, has 134 files taking up 78 megabytes.

Just as there are many files, there are also many reasons they get left behind.

Read more

How Do I Find My Downloads on My PC?

Several factors to consider.

Downloading a file from the internet is easy, but controlling where downloads go takes a little more understanding.
A a Windows PC screen with a 'Downloads' folder open, displaying various file types like PDFs, images, and software. The surrounding workspace is tidy, with a coffee mug, notepad, and pens. The setting is modern and well-lit, highlighting the simplicity of managing downloads on a computer.
(Image: DALL-E 3)
Question: When I download files like ebooks off the internet, I can never find them. Where do they go on my computer?

It depends on how you download them. We’ll look at four scenarios.

  • Typically, they go into your Downloads folder.
  • They may also go into the same folder as the last download.
  • There’s another place downloads can end up that’s kind of dangerous, as it gets “cleaned up” every so often (meaning you could eventually lose your download).
  • We’ll also look at how to find your file regardless of where it landed.

Read more

Help! Someone Is Inside My Computer, Controlling It!

What to do if you suspect someone else is in control of your computer.

Question: My computer is being controlled and I cannot load anything I have purchased. Seems like when I change my password it asks several times — not good. Also, when I do it is intercepted and blocked. Why ? This my personal home computer.
When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Most of those people are wrong.

I get variations on this question often.

Someone believes their computer is being controlled remotely without their consent, or they believe their activities are being monitored in detail, or they believe their files and other information are being stolen or manipulated by others with malicious intent.

The bottom line is, they’re convinced someone is spying on them — or worse.

What happens next is… complicated.

Read more

What’s a QR Code, and Can You Trust Them?

Why you shouldn’t scan them recklessly.

A QR Code.
A QR code. (Image: askleo.com)
QR codes are a nifty way to encode web addresses and other text in a way that's easy for your smartphone to decode, but they are not without risk.

During a televised sporting event, a company spent a lot of money to run an advertisement that was nothing more than a QR code (like the one displayed above).

Apparently, against all common sense and with no regard for security, millions of people used it.

Why? What did it mean? What are you supposed to do with QR codes, and how do they relate to security?

They’re pretty cool.

But they can also be weaponized, and you’d never know.

Read more

Privacy and Searching for Phone Numbers Online

It’s not easy to find a phone number online, and may not even be possible.

You have an email address and you want the associated phone number. It's unlikely you'll find it, but there are a few things to try.

Searching for phone number

Question: I have the email of a person I want to talk to, but they won’t share their phone number. Can I find it another way?

Maybe.

There’s no public directory or phone book you can look at that maintains a list of phone numbers and email addresses.

You’re going to have to do a little legwork and be a lot lucky.

Read more

How Do I Tell If an Email Address Is Fake?

There may be clues. Or not.

It's hard to determine whether an email address is fake.
Illustration in a popular 3D animation style showcasing a detailed email envelope icon. Over the envelope, there's a large, clear magnifying glass zooming in on a generic email address (e.g., user@example.com) written on the envelope, set against a light gradient background.
(Image: DALL-E 3)
Question: How can you tell if an email address is fake? How do scammers make fake emails?

While it can be helpful to identify fake email addresses — they’re a great clue as to whether the email you’re looking at is a scam or worse — you might not be able to. A phony email address can easily be made to look like a valid one.

Sometimes there are clues, and I’ll review a few of those, but some of those clues also apply to legitimate email addresses.

Read more

How to Deal with Spam

You can’t stop it, but you can take steps to avoid getting more.

Spam is inevitable; just don't ask for more.
Stop Spam!
(Image: canva.com)

Imagine a world without spam. What a nice, quiet place, right? Many services would be more efficient and cost less.

Unfortunately, that utopia is not to be. Spam exists and can’t be completely prevented.

But you can take steps to prevent getting more spam.

Read more

Four Risks With Free Wi-Fi

It can be fine, and probably is, but there’s always risk.

Freely accessible Wi-Fi is almost everywhere, and most systems are set up to use it safely. There are a few things to pay attention to in order to stay safe.
Free Wi-Fi
(Image: canva.com)
Question: How come connecting to a trusted public hotspot is not a BIG security issue since multiple devices can be connected to that same Wi-Fi? If even one of the connected devices has malware, then isn’t my device also under threat ??

This question was asked in response to a Ask Leo! Tip of the Day suggesting that you look out for “fake” public hotspots.

The issue is that even if the hotspot itself is the correct and trusted hotspot, what about all the other users?

Read more

Backups Are GREAT Security

They protect you from failure as well as malware.

Don't overlook backing up as part of your computer security. When the worst happens, it's your backup that will save you.

We tend to think of backing up as separate from keeping our computers secure.

Nothing could be further from the truth.

To misquote the cereal commercial: backups are an important part of a healthy, secure breakfast.

Read more

What to Do When Your Outlook.com Storage Is Full

Microsoft changed how they allocate storage.

Microsoft changed the free storage allocation for Outlook.com and OneDrive.

In 2023, I started hearing from people who suddenly could not send or receive email via Outlook.com, or were seeing warnings that they’d soon be unable to unless they took action.

The action? Buying more OneDrive space.

What does OneDrive have to do with Outlook.com? Until 2023, not much. Now, though, they’re attached1 at the hip.

Read more

Will Google Delete Inactive Accounts?

The answer is YES.

Google deletes accounts that are inactive for two years -- including Gmail, Drive, Photos, and even YouTube content. I’ll explain what “inactive” means, how to keep your accounts safe, and why this change could erase important cultural history.
Google Logo
Google Logo (Screenshot: askleo.com)

At the end of 2023, Google announced that the company would start deleting inactive accounts.

Let’s review what it means to be “inactive”, what you need to do, and why this might be a serious blow to our cultural history.

Read more

Backing Up a New Computer

Chicken, meet egg. Or maybe say hello to Heisenberg.

Backing up your new computer on arrival can be an important safety net. But there are degrees of what's good enough.

Question: I’m supposed to receive a new laptop tomorrow and don’t quite understand how to make your suggested system image backup before connecting to internet without connecting to get the software. Can I download it to an external drive and then run software directly onto the new machine (offline)?

Creating an image backup of a brand-new machine boils down to a chicken-and-egg scenario: you want to back up the unmodified machine, but you must modify the machine by installing software to back it up.

Or do you?

There are a couple of approaches to this. One is practical and easy, and the other is technically more accurate.

Read more

7 Ways to Increase Internet Speed in Windows

We all feel the need for speed.

Internet speed: we all want it. Here's how to improve yours.

In a previous article about speeding up Windows, I mentioned that sometimes a computer can appear to be slow, but the fault may be in your internet speed.

That raises the question, of course: how do you increase internet speed in Windows?

I have some suggestions.

Read more

Why I Rarely Panic

Perhaps it’s why I still have my hair.

Don't Panic

So much of we hear about just isn't panic-worthy, even if news reports make it seem like it is.

As I watched a “major” security issue2 unfold a few years ago, I read the media reports seeming to claim that the end of the world (or at least the internet) was upon us. I felt like I was supposed to be panicking.

I didn’t, and neither the world nor the internet ended.

It’s not in my nature to panic. That’s just the kinda guy that I am. Panic may occasionally be called for, but usually it does more harm than good.

Read more

Do I Really Need a Recovery Email?

Yes, you do.

Alternate email addresses can allow you to regain access to your account if it's hacked or you forget your password.

Question: OK, I’m confused. How does the recovery email on Google work? Where do I get the messages? Do we really need a recovery email?

Yes, you need a recovery email for every account that offers the ability to set one.

Recovery email is one of those concepts that is easy to take for granted and assume everyone understands. Even if you do, you might want to review the concepts and ensure that the recovery email addresses you have are set up properly.

Read more

Two Reasons to NOT Reuse Passwords

Hackers keep track of your passwords if they find ’em.

Reusing passwords -- even strong ones -- is risky. If one site gets hacked, attackers try that same password elsewhere. Worse, once exposed, it’s saved bv hackers and reused in future attacks. I’ll discuss why this matters, how to check if your password’s out there, and what to do instead.

A reader recently commented:

Question: It’s a good idea to get a feel for how strong your password is. There are plenty of password-strength tools online. You don’t need to put your password into some random website (I wouldn’t ever recommend that), but having a good sense of the strength or weakness of your password is really important.

I disagree.

You don’t need a password-strength tester.

You should, however, use a password-found tester. And while it’s not “some random website”, there is a website I suggest you use.

Read more

Are You Afraid of Tracking Cookies

They don’t worry me, but others feel differently.

Cookies are placed on your machine by websites -- often more websites than you realize. We'll review cookies and how third parties use them.
A person walking through a dense forest, leaving a trail of cookies behind them.
(Image: DALL-E 3)

In two other articles — What Can a Website I Visit Tell About Me? and What Are Browser Cookies and How Are They Used? — I discussed how websites gather information about the people who visit them.

What I didn’t talk about in much detail is that through clever use of cookies — typically associated with advertising — some services gather and use more information about you.

We need to talk about tracking and third-party cookies.

Read more

What Happens When Applications Die?

If you rely on them, it pays to prepare.

Apps don’t last forever, and when one you rely on disappears, it can take your data with it. I'll show you how to protect yourself so you stay in control.
1Password CSV Export
Exporting data from a password vault. (Screenshot: askleo.com)
Question: While I am not particularly concerned about my privacy (all that stuff on the internet was out there before the internet, it was just a little harder to find), I am not particularly trusting. I realize that TrueCrypt was open source and Lastpass etc. are all paid services, but what happens if they go belly up? What happens if they hire some idiot and all of their software goes up in smoke? I have a hard time trusting these services, or any others for that matter, and these are things I want under my control.

What you describe happens more often than one might think.

There are people who use an application for some time and suddenly find that the company is no longer in business, and there’s no way to get an update. Sometimes that means they can’t migrate to current versions of their operating system if they want to keep running that now-unsupported software.

It’s something I consider when selecting important software. Depending on what programs we’re talking about, there are approaches you can use to back up your data and protect yourself from potential software obsolescence or disappearance.

Read more

How Do I Print Pictures From Websites so They Look Good?

You might not be able to.

Trying to print a cute photo from a website and wondering why it looks fuzzy on paper? I'll explain why that happens, what you can do, and when high-quality results are possible.
Different resolutions, stretched.
(Image: askleo.com)
Question: I would like to know the simplest way to print a small to medium image from a webpage and have it print out as a crisp picture to fit an 8-1/2″ by 11″ sheet.

This question has one simple and one complex answer.

The simple answer is that most of the time, you can’t.

The complex answer, of course, is: it depends.

Read more

Do Complex Passwords Still Matter If You Use 2FA Everywhere?

Yes.

Do you think your passwords don’t matter because you use 2FA everywhere? I'll break down why weak passwords still put you at risk, how attackers work around 2FA, and the steps that keep your accounts safe.
A warm, colorful door with two locks and corresponding keys—one labeled “Password,” the other “2FA”—both needed to open it.
(Image: Gemini)
Question: If I’m using 2FA everywhere possible, do complex passwords matter as much? Doesn’t 2FA protect me against compromised passwords?

2FA (Two-Factor Authentication) adds a strong safety net, but it doesn’t replace the need for good passwords. As the first factor, passwords work together with 2FA to protect you from different kinds of attacks.

Read more