Are VPNs Safe for Online Banking?

Safe? Sure. Safer? Probably not much.

Think a VPN makes online banking safer? Banking is already protected by strong encryption, but a VPN adds a twist. I’ll explain what’s really protected, what isn’t, and where the real risks lie when you bank on the go.
VPN
(Image: canva.com)
Question: Is it safe for me to use a VPN for online banking while I’m on the road?

Online banking these days is relatively safe to begin with. HTTPS connections, for example, mean your conversation with the bank is encrypted between your computer and the bank’s servers, regardless of whether or not you use a VPN.

There are a couple of things that a VPN kinda/sorta makes slightly safer.

Let’s examine the differences.

Read more

USB Charging and Cables Explained: Safe and Simple

At worst, slower than it could be, but that’s fixable too.

With USB-A and USB-C, things have gotten simpler, but not always obvious. I’ll walk you through what cables really do, how devices and chargers “talk,” and why missing charger blocks isn't a big deal.
Several USB charging bricks plugged into a power strip.
(Image: canva.com)
Question: So many devices come with only the charging cable and not the actual charger (plug/block) itself, which has the label on it stating what voltage & amperage ratings it has. I have yet to find charging cables that come with such labeling on them. So how do you know what that particular charging cable is capable of — or are they all universal charging cables whether or not they come with the plug?

USB standardization has made all of this much simpler.

For the most part, if the cables fit, your device will charge safely. Slowly, perhaps, but safely. There are exceptions, but when talking about portable devices, it’s rare.

Read more

Can My Computer or Signed-In Account Be Hacked from the Internet?

Never say never… but it’s pretty close to never.

Worried that staying signed in leaves you open to hackers? I’ll explain why your router, firewall, and smart habits protect you, what the real risks to your accounts are, and the simple steps you can take to stay safe online.
A computer keeps running securely while the user sleeps.
(Image: ChatGPT)
Question: Is it possible for hackers to hack an account that has not been logged out from the Internet?

There are two ways to take your question:

Can hackers hack into my computer from the internet to access accounts that I’ve signed into?

or

Can hackers hack into my online account on the internet because I haven’t signed out of the account on my computer?

Both answers are basically “no”. But because there are never any absolutes when it comes to security, the true answer for both is that it’s extremely unlikely.

Read more

Why Am I Being Labeled a Spammer?

You might be collateral damage in the war against spam.

Possibly being labeled a spammer is another reason not to forward political and other emails. Do it enough, and your normal email may not get delivered.
Spam Bin
(Image: canva.com)

As I write this, thousands of people have my email address. It’s right there on the “From:” line of every newsletter I send.

Naturally, some of them forward me jokes, political messages, hoaxes, or urban legends. I know they mean well and do so with the best of intentions.

But I mark them all as spam. It seems harsh, but I feel I have to.

Because that’s exactly what they are.

Even if I don’t, others may, and because of that, there’s a very important lesson here in making sure that the rest of your email keeps getting delivered.

Read more

Do I Need to Make a New Rescue Disc Every Time My Backup Software Updates?

Not really.

Worried you need a new rescue disc every time your backup program updates? Relax. I’ll explain when it matters, why it usually doesn’t, and how you can get one at the last minute.
someone on a boat throwing a life ring to a desktop PC floating in the water
(Image: ChatGPT)
Question: Hi Leo, I’ve been using the Macrium Reflect program to back up my Windows computer. However, I’m finding that when I try to do an image or a clone backup, I’m prompted each time to update the software. This requires making a new rescue disc, which can be fairly time-consuming as I’m using Macrium Reflect to back up my desktop PC and my laptop, too. I’m concerned that if I don’t make a rescue disc each time the software asks me to update (which is every time I open it), my backups won’t work and I’ll be “you know what” out of luck! Can you advise?

You don’t need to make the rescue media every time you back up.

You don’t even need to make new rescue media each time Reflect updates itself.

Heck, you may not even need to make rescue media at all until you need it.

There are times it’s appropriate to make a new one, but even then, it’s not a disaster if you don’t.

Read more

How to Recover Deleted Data from Your Disk — Maybe

Resurrecting old files.

Think those old files on your hard drive are gone forever? Maybe not. I’ll walk you through what affects your chances of recovery, the tools you can try, and why sometimes, it all comes down to luck.
A glowing external hard drive sits on a desk, with beams of light shining out as if it holds hidden treasure.
(Image: ChatGPT)
Question: Is it possible to recover data that was deleted a year ago from an external hard drive?

This is another question that earns my most common answers: “Maybe” and “It depends”.

As long as a few conditions are met, it may be possible to recover old data from a hard drive. I’ll review what those are and recover some files from a drive I formatted.

Read more

How Do I Fix the Master Boot Record (MBR)?

There are a couple of different ways.

If your computer refuses to start, the problem might be the Master Boot Record (MBR). Fixing it isn’t as scary as it sounds. I’ll show you how to use Windows’ built-in Startup Repair and a couple of handy command-line tools to get your machine running again.
Startup Repair
(Screenshot: askleo.com)
Question: Can you tell me how to fix the MBR?

The MBR, or Master Boot Record, is the first sector of MBR-configured hard disks. (GPT-configured hard disks have something similar, but I’ll be referring to MBR unless the difference matters.) In either case, it tells the BIOS or UEFI where on the hard disk to locate the software to be loaded when you boot the computer.

Without an MBR, or with a damaged MBR, your machine won’t boot (power up and load the operating system).

There’s a lot more to booting than just the MBR. Fortunately, recent versions of Windows have made the distinction between these various pieces fairly transparent, referring to all of them as “Windows Startup”.

I’m not sure what led you to ask about fixing the MBR, but repairing Windows Startup will address MBR problems as well as others.

Read more

I Opened Something I Shouldn’t Have — Now What?

If it’s malware, it’s not good.

Accidentally run or opened something suspicious? We've all done it. I’ll walk you through the options from scans to resets, and consider what to learn from the experience.
A laptop glowing with a big red exclamation mark on the screen, while a worried person hovers nearby, coffee cup in hand.
(Image: ChatGPT)
Question: I have a question. I recently downloaded a wrong file after being redirected. I even allowed the .exe to run the cmd (I didn’t see it type anything in it before closing, though) after allowing the threat in Windows Security. I did a full scan afterwards, and it said everything was fine. Should I still be worried and consider a factory reset?

Worried? Probably.

This is exactly the scenario security folks warn against so strenuously: running or opening something you shouldn’t and bypassing warnings from your security software.

Let’s look at your options.

Read more

Windows Security to 2028? Why ESU Still Costs Extra

Two different things, two different dates, and two different costs.

Wondering why Microsoft charges for Extended Security Updates when Windows Defender will get updates through 2028? They're not the same. I'll explain the difference between malware database updates and actual Windows fixes, and what you really need to know to stay protected on Windows 10.
Split view showing Defender updates through 2028 and ESU updates through 2026.
(Image: ChatGPT)
Question: If Windows still has “security” until 2028, why is there a fee for Extended Security?

There’s no shortage of confusion around Windows 10’s end-of-support date. This question has been asked a few times: What’s the deal with paying for ESU until 2026 if Windows Security will continue to be updated through 2028?

It’s an apples-and-oranges kind of comparison. Even though they have similar names, they’re two different things.

Let me explain.

Read more

How Do I Encrypt a Disk?

Encrypt the whole thing.

Worried about your data if your computer goes missing? Whole-disk encryption can keep prying eyes out. I’ll show you simple, practical ways to encrypt your entire drive so your information stays safe even if your computer doesn’t.
Hard disk chained and locked.
(Image: canva.com)

Whole-disk encryption is an important aspect of security for many people. If you encrypt a disk properly and your computer falls into the wrong hands, those hands won’t be able to access your data.

The average computer user may or may not need to use whole-disk encryption; it depends on the type of data they store and their level of concern. However, encryption is an important tool for business and government users, particularly for portable computers such as laptops and tablets.

Read more

Is Syncing Passkeys Across Devices Safe?

As safe as syncing passwords.

Passkeys promise more security and less hassle, but is syncing them across devices safe? Learn how password managers handle passkeys and what happens if a device is stolen.
One key, multiple devices.
(Image: ChatGPT)
Question: If one passkey is synced across multiple devices, what happens if one (like a laptop) is stolen?

Passwords are easy. We understand what it takes to make them more (or less) secure. Passkeys are a little harder to understand, partly because they depend more on behind-the-scenes security measures we don’t see.

Fortunately, the benefits and risks of sharing passkeys across multiple devices via a password manager are almost identical to doing the same with passwords.

Read more

Public or Private? Picking and Changing the Windows Network Setting

Learn which you want when.

Not sure if your Windows network should be public or private, or even what that means? I’ll show you what each means, when to use them, and the simple steps to switch.
a computer screen showing a balance scale which has the word "Public" on one side and "Private" on the other
(Image: Gemini)

One of the most confusing aspects of Windows networking is the concept of private and public networks. When you set up a network (typically when installing Windows or the first time you make a connection on a new network adapter), Windows makes an assumption about which you want.

Sometimes that assumption is wrong.

Depending on what you do later, Windows may offer to change it. Or not.

I’ll review what these network types mean and how to switch from one to the other.

Read more

Can I Tell If Email I Sent Has Been Read by the Recipient?

Not with 100% certainty.

People want to know if someone’s opened their email. I’ll explain why features and tools claiming to do that can't work most of the time. I'll share the only way to know for certain your message was read.
A man dropping an email into a black hole.
(Image: ChatGPT)
Question: I sent an email to a friend, and he claims never to have gotten it. I don’t believe him; things he’s said led me to believe that he did get it and that he did read it. Is there a way I can tell for sure?

I’m amazed at the number of questions I get that boil down to people not trusting each other. Not that there isn’t cause, I suppose, with spam, phishing, and malware running all over the place. But this seems like the simplest case of all: was your email read or not?

The answer to your question is no, there is no way to tell for sure that your email was delivered, opened, or read. You might as well have dropped it into a black hole.

I always get a lot of pushback on that.

Read more

Why Is the Same File a Different Size in Different Places?

There’s size, and then there’s size.

Ever notice that the same file can show up as different sizes depending on where you look? It’s not a mistake; it’s how disks and online services handle storage. I’ll explain why your files can look bigger or smaller, what clusters have to do with it, and why it’s nothing to worry about.
A one byte file displayed in Command Prompt
A one-byte file shown in Command Prompt. (Screenshot: askleo.com)
Question: When backing up online, my pictures only take up ~65 GB, but ~88 GB are reported on my computer. Why?

This is something that’s confused computer users for many years: the same file can show as taking up a different amount of space depending on where you look and the characteristics of different disk drives.

Copy that file online and things get even more confusing.

This is not something to worry about. Fortunately, no matter where it’s stored or how much space it’s reported to be taking up, your file is still your file.

Read more

How Do I Encrypt a Folder?

Three approaches.

Want to keep your folders private? This article shows three ways to encrypt everything inside a folder. Each method has pros and cons, so you’ll learn which one best protects your files while balancing ease of use.
Locked Folder concept
(Image: canva.com)

Sometimes encrypting a single file isn’t enough. Sometimes you want to encrypt all the files in a folder and its subfolders.

As you might imagine, there are several solutions, depending on your particular needs.

I’ll review some alternatives, as well as their pros and cons.

Read more

How Do I Stop Email from Going to Junk in Outlook.com?

It’s a never ending struggle

It's frustrating when email previously marked as "not junk" continues to get sent to the Junk folder. Let's look at your options.
a balance scale with one side labeled "Junk", the other labeled "Not Junk" and an arm coming in from off camera putting a thumb on the Not Junk side to make it lower
(Image: ChatGPT)
Question: A newsletter subscription I have had for YEARS recently started going into junk mail! I have had it all along on the junk mail “safe senders” list. Now I added it as a full contact using the exact email from which it is sent. The daily newsletter still goes to junk mail! It is addressed to my Hotmail address, so not a generic address. What gives??

Outlook.com does not make this fix obvious, but it is fairly easy. In fact, it’s gotten easier in recent years.

Let’s take some steps in Outlook.com to stop emails we want from going to the junk mail folder.

Read more

Should I Update to Windows 11? (October 2025 update)

If you can, probably.

Windows 10 support ends October 14, 2025. Should you move to Windows 11? I’ll walk you through the pros, cons, and options: upgrade now, wait for new hardware, or even stick with Windows 10 safely. The choice is yours, but it’s time to decide.
Windows 11
(Screenshot: askleo.com)

Updated September/October 2025.

The time is here. October 14, 2025, is upon us. Windows 10’s end of support is imminent.

With Windows 10 support coming to an end, it’s time to consider what you want to do.

Read more

Why Is My Machine Slowing Down?

Maybe it’s not just tired or overworked.

Is your once-speedy computer crawling? From hidden malware to too many background apps, there are plenty of reasons your PC might feel sluggish. I’ll walk you through the most common causes and what you can do to get things running smoothly again.
Computer screens showing progress bar, and a frustrated user.
(Image: canva.com)

Perhaps when you purchased it, your computer ran like a champ and quickly did everything you needed. Now, well, not so much. Perhaps it takes forever to boot. Or starting applications is slower than molasses. Or maybe the machine just acts sluggish when you try to use it for just about anything.

Regardless of the specifics, the underlying theme is simple: It’s slow.

There are so many reasons a machine could slow down. I’ll list a few of the most common reasons here, along with some advice on what steps to take.

Read more

Why CAPTCHA?

Are you human? Prove it.

Been asked to spot bicycles or click “I’m not a robot”? That’s CAPTCHA at work. Here’s why websites use them, how they’re changing, and what it means to be asked to prove you’re human.
a robot standing behind a sign that says "I am not a robot."
(Image: ChatGPT)

We’ve all seen them and been frustrated by them. Click on all the images that contain a bicycle. Or a bridge. Or stairs. Or click this slider and move it to the right until the image is properly aligned. Or pick the two things shown in different orientations that are the same.

Those are all CAPTCHAs, which is an acronym for Completely Automated Public Turing test to Tell Computers and Humans Apart. It’s even trademarked by Carnegie Mellon University.

As frustrating as they are, they exist for an important reason.

Read more

How Do I Encrypt a File?

Sharing files securely may be easier than you think.

Want to send a file safely by email? I’ll show you how to use the simple .zip format with a strong passphrase so your private documents stay protected across Windows, Mac, or Linux platforms.
Computer screen showing a concept of a document with a padlocl.
(Image: ChatGPT)

Sending an encrypted document as an attachment is a reasonable approach to securely sending information in what is otherwise an insecure medium: email. Even though there are approaches to encrypting email messages themselves, they’re either obscure or complex (or both), and not widely known.

Encrypting individual files can also be an important step in secure data management.

I have a specific recommendation that should be easy and work just about everywhere.

Read more

Process Explorer, a Powerful Free Replacement for Task Manager

When you want to see what’s really going on.

Want to know what’s really going on in your PC? Process Explorer is a free, powerful tool that digs deeper than Task Manager. I’ll show you how it works, what you can discover, and why it’s one of the best utilities you should have on your computer.
About Process Explorer
(Screenshot: askleo.com)

You may not need, or even want, to know what’s going on under the hood in Windows. Most computer users shouldn’t have to. Computers are supposed to just work, and you should never need to be bothered with things like processes or resource utilization.

And yet, there are times when we want, or even need, to know.

This is where Process Explorer comes in. Process Explorer — also called “procexp” — provides a window into all the programs running on your computer at a level of detail that Task Manager doesn’t.

Read more

How to Keep Using Windows 10 Safely after Support Ends

Yes, it can be done.

Worried about Windows 10 after support ends? Don’t be. I'll show you the simple steps -- good habits and reliable security software -- that will allow you keep using your Windows 10 computer safely.
A desktop computer with a Windows 10 screen bathed in bright morning sunlight.
(Image: ChatGPT)
Question: You keep saying we can keep using Windows 10 safely after support ends. How is that even possible?

I know it’s a controversial position that not everyone agrees with, but I believe it’s quite possible to keep using Windows 10 safely after Microsoft ends its official support of the operating system.

There are two things you need to do. Both are things you should be doing already.

Read more

How Do I Get an Email Address for Life?

Never change your email address again.

Tired of changing your email every time a service shuts down or your ISP changes? Learn the smartest way to secure an email address that’s truly yours for life, and why relying on free or “lifetime” promises could leave you stranded.
A glowing golden key unlocking a bright envelope icon, set against a vibrant blue sky with rays of light, symbolizing control and permanence in email.
(Image: ChatGPT)
Question: I’ve used {now defunct service redacted} for several years in order to avoid notifying my contacts that I’ve changed my email address. They promised me a single email address I could keep forever. Except I now find that the site is working, but it doesn’t allow me to view my account. The page merely says, “It works! This is the default web page for this server. The web server software is running, but no content has been added yet.” Are you able to help me?

Help you get your account back? No.

Help you avoid this situation again in the future? Absolutely.

It’s frustrating when a service promising to provide something forever goes away. Apparently, “forever” isn’t what it used to be, and “lifetime” turns out to be the company’s lifetime, not yours.

Read more

When I Use Start-Run, Why Does a Window Just Flash and Disappear?

Something happened, but what?

Frustrated when a window just flashes and disappears when you use Start-Run? It’s not an error; it’s how Windows handles certain programs. I’ll explain what’s happening, why it’s confusing, and show you the simple trick that lets you see what’s going on.
Animation of a Command Prompt Windows flashing
(Video: askleo.com)
Question: When I try to use “Start” and then “Run” to run a command, the DOS screen flashes momentarily, then vanishes. Am I overlooking something obvious?

Not really. It’s only obvious if you’ve been using PCs since before there was Windows and its graphical user interface, or GUI.

Start-Run is incredibly useful, but it’s not appropriate for everything. The good news is, there’s a simple trick that fixes what you’re seeing.

Read more

7 Reasons You Could Lose Your Google Account Forever

Let’s look at the most common ways.

Losing access to Gmail can mean losing years of email, contacts, and memories. Learn the most common pitfalls, from outdated recovery info to ignored warnings, and how to avoid them so you never risk losing your account.
A glowing Gmail inbox filled with colorful emails fading into a digital dust cloud. A worried person sits at their desk, reaching out as the emails slip away.
(Image: ChatGPT)

By far the most common topic throughout the history of Ask Leo! has been account loss and recovery. Originally, it was all about Hotmail, but these days, it’s Google. People lose access to Google and Gmail accounts all too often.

The result, of course, is the loss of years of email, contacts, files, and whatever other Google services they used along the way.

Lockouts and loss happen not because Google’s broken (even though thinking so is a common knee-jerk reaction), but because of preventable mistakes and oversights.

Let’s review what can go wrong and how you can prevent losing your account forever.

Read more