How Do I Decrypt Files Encrypted by Ransomware?

Unless you are either lucky or prepared, your options are few.

Prevention and preparation are the best solutions to ransomware.
a computer screen with a ransomware warning
Sadly, it’s never cookies. (Image: Gemini)
Question: … some of my files are gone, saying they have been encrypted with a public key. Files like my photos and so on. Of course, they have a high fee in order for me to get them back. Do you have a solution?

My morning email brought this question from a friend.

While there are a few straws to grasp at, the odds are not good. The whole point of ransomware is that there’s no easy way to undo the damage. If there were, ransomware wouldn’t be a thing.

I’ll look at the few options you have, and more importantly, how prevention can give you peace of mind.

Read more

Can You Recommend a Cordless Keyboard and Mouse?

Yes, but not exactly.

Tired of keyboards that fail too soon or slow you down? I’ll share what I think matters when choosing a keyboard and mouse, what I do, and why “wireless” may not be your friend.
an individual typing/pounding hard on a computer keyboard
(Image: Gemini)
Question: Do you have any suggestions on a cordless keyboard and mouse that is under $100?? I can’t even believe how many keyboards I have gone through that wind up slowing me down and then stop working, particularly the space bar and shift key with capitalizing.

Maybe.

I’ll share two approaches to keyboard and mouse selection — and why at least one aspect of your request is something I’d advise you to avoid.

Read more

Managing Windows File Explorer’s Navigation Pane

Flexible… yet confusing.

File Explorer’s messy left side driving you crazy? I'll show you how to clean up the navigation pane, remove clutter, and pin only the folders you actually use.
a Windows File Explorer window, with the left-hand navigation pane overflowing with shorcuts and icons
(Image: ChatGPT)

The navigation pane — that left-hand pane in Windows File Explorer — can be a cluttered mess. In fact, I suspect that for whatever reason, “cluttered mess” is the default setting.

Fortunately, you have more control over what goes there than you might realize.

Let’s examine what we can do with Windows File Explorer’s navigation pane to make it more useful.

Read more

How Do I Get a Program to Auto-start When I Sign In to Windows?

The right shortcut in the right place.

Want a program to start automatically every time you sign in to Windows? There’s a simple, built-in way to do it.
a Windows 11 desktop displaying the message "Starting..."
(Image: Gemini)
Question: Leo, I’m trying to find out how to add a program to autostart on boot up in Windows. Do you know?

There are many ways to start programs automatically when Windows boots or when you sign in. Most of them are obscure registry settings used by applications when they’re installed. Fortunately, there’s one easy approach.

Read more

Has My Computer Been Hacked?

Clues to look for, steps to take.

It's easy to jump to the conclusion your computer has been hacked, but it's usually not the case. Regardless, preventing a hack is easier than recovering from one.
a computer display with a hacker inside it
(Image: Gemini)
Question: How can I tell if my computer is being hacked?

You can’t. Not in any absolute sense.

Almost every sign of a hack can just as easily — perhaps even more easily — be explained by other things. There are some clues to look for, which I’ll review, but none of them are guaranteed signs of actually being hacked.

This is one reason I talk so much about prevention.

Read more

The For-Pay Email Providers I Recommend

When your email is important enough to pay for.

People often use free email providers only to lose everything when a problem occurs. So what should you look for in a paid email provider?
Email Everywhere!
(Image: canva.com)
Question: I get that you strongly recommend against using free email accounts for important stuff. But that begs the question: which paid email providers do you recommend?

A fair question. I recommend several approaches depending on your situation.

I need to explain what I’m looking for first. It’s possible that you already have what you need.

Read more

Unexpected Authenticator Alerts: Annoying, Scary, or Harmless?

All three, but mostly harmless.

Random authenticator requests can be unsettling. Are you being hacked, or is something else going on? I'll discuss why these alerts might happen, what they really mean, and what to do.
a mobile phone displaying a message "Password Reset Request: Is This You?" with Yes No buttons beneath
(Image: Gemini)
Question: I recently received a steady flow of authenticator requests, but I can’t figure out why and for which account these log-in attempts came from. Of course, I deny these authenticator requests, but it bothers me that I get so many of them. There is obviously someone trying to hack one of my accounts that uses the authenticator verification process.

I’m not convinced that someone is trying to hack your account, but it’s certainly one possibility.

The good news is that denying them is exactly the right thing to do.

The bad news is that denying them is basically the only thing you can do.

Read more

The Top Five Small Business Security Risks

How to keep your business data secure.

Running a small business, especially from home, puts your data at risk in ways you might not expect. I'll discuss what I see as the five biggest security threats facing small teams.
A split scene showing a personal laptop and phone on one side and business files on the other, connected by a dotted line, with warning icons fading into shields.
(Image: Gemini)
Question: I run a small accounting firm with six employees who all work from home, and I am struggling to feel confident that I have set up reasonable security measures for my firm. I am required to collect and use my client’s personally identifiable information in the work that we do, and have to follow IRS and potentially FTC regulations (I am not 100% sure about this one). But regardless, our reputation is very important, and I don’t need it tainted by a security breach.

So I am interested in what you would consider my top five risks are and what should be done to mitigate those risks in a cost-effective way that doesn’t severely impede team functionality.

Let me start by saying I am in no way qualified to provide advice that is guaranteed to be IRS, FTC, or any three-letter-agency-compliant. If that’s key, you’ll want to seek out more qualified sources.

However, I’ve been a small business owner with contractors and employees working from home for multiple decades — even before Ask Leo!. So I have practical experience as well as a few opinions on the topic.

The #1 risk may not be the one you expect.

Read more

The Recycle Bin You Might Not Know About (Perhaps Holding Data You Thought You’d Lost)

You might have more Recycle Bins than you realize.

Think the Recycle Bin on your PC is the last stop for deleted files? Not always. I'll show you a second, often-overlooked Recycle Bin hiding in your cloud storage. It might rescue files you thought were gone for good.
You may have another Recycle Bin.
(Image: canva.com)

When we talk about the Recycle Bin, what usually comes to mind is the one on your computer’s desktop. When you delete a file in Windows File Explorer, it’s moved to the Recycle Bin rather than being immediately and permanently deleted. If you change your mind, you can restore files from the Recycle Bin. Conversely, you can empty the Recycle Bin, permanently deleting the files.

That’s not the Recycle Bin I’m talking about. Smile

If you use almost any online cloud storage, you have another Recycle Bin. The catch? It applies only to your cloud storage.

Read more

Is Private Browsing Really Private?

In a word: no.

Private browsing sounds safer than it really is. I'll explain what Incognito mode actually hides, what it absolutely doesn’t, and when it’s still worth using. If you think private mode keeps your online activity secret, you’ll want to see where the real limits are.
(Image: DALL-E 3)
Question: I use private browsing mode in my web browser to keep my online activities private. I mentioned that to a friend and he said it wasn’t private at all. If he’s right, what’s the point?

You’re both right, and you’re both wrong.

Private browsing, also known as Incognito mode, protects your privacy only to a point. And it’s typically not the point most people think it is.

Beyond that point, private browsing does exactly nothing to keep you more private.

Read more

Why Didn’t Microsoft Fix My Pet Peeve?

Don’t take it personally.

Ever wonder why Microsoft never fixes that one thing that drives you crazy? It’s not personal. I'll break down why some annoyances stay put, how Windows chooses what to fix, and why even simple changes can be surprisingly risky.
Frustrated with computer
(Image: canva.com)
Question: I have a question that no one has been able to answer so far. Over the years and the last few versions of Windows that I’ve used, Windows Explorer still shows file sizes in KB, and folders no size. I’m currently dealing with files that are between 300MB to 3GB+. I was hoping that when the latest version came out they would have fixed this problem and I could see my file sizes in KB, MB, or GB. All the other non-Windows operating systems I’ve played with automatically show files in their proper notation. Is this a bug in windows or is MS to lazy to fix this program and give us only this second rate software? If you could help clear this up I would greatly appreciate it.

This is a common question.

Not the file-size-display issue, but the more general question: “Why didn’t Microsoft fix this?” where “this” is a person’s pet peeve or a system bug.

In most cases, asking “Why?” is an exercise in frustration; it rarely gets you a straightforward answer. But I can theorize many legitimate reasons for not addressing something like this.

Read more

How You Can Avoid Social Media Algorithms

You can take control.

Social media often shows you what it wants you to see, not what you asked for. I'll explain how those algorithms work and the steps you can take to see more of what matters to you.

Social Media Cascade
(Image: Gemini)

A lot has been written in recent years about social media — specifically, the algorithms social media companies use when choosing what to show you.

To say it’s controversial is an understatement. It’s been blamed for everything from increasingly short attention spans to the looming downfall of democracy.

Let’s review what those algorithms mean, how they work, why they work, and some ways you can avoid them — or at least take back more control.

Read more

How Does My Computer Know Where I Am?

Lots of educated guesses.

Ever wonder how your computer or phone “knows” where you are, and why it sometimes gets it wrong? I'll break down the clues your devices use, why location mistakes happen, and what you can do when websites think you’re somewhere else entirely.
a globe with a location pin on it that says "You are here"
(Image: Gemini)
Question: My computer and phone seem to know where I am. How do they do that? Sometimes they get it wrong — as in placing me in another country — and deny access to things I think I should be able to see.

Location identification is… complicated.

It’s a mix of various inputs from various places. While I’m not 100% knowledgeable on all the possibilities that can factor into location, here’s a sense of how things work (more or less).

To begin with, it depends on how you’re “looking at” your location, or perhaps who is looking at it.

Read more

Why Am I Seeing So Many CAPTCHAs?

The rise of the bots.

Tired of being asked if you're human? I'll explain what site owners like me are dealing with behind the scenes and why you’ll probably be clicking “I’m not a robot” a lot more often.
I'm not a robot.
(Screenshot: askleo.com)

CAPTCHAs — Completely Automated Public Turing test to tell Computers and Humans Apart — seem to be popping up everywhere, even on sites where you wouldn’t think they’d be needed.

I’ve been tempted to add a CAPTCHA to Ask Leo!. Seriously tempted.

Let me explain what leads to that temptation. I’ll also explain why it’s unlikely to happen, even though the costs of not doing so can be high.

Read more

Is it Safe to Put Two-Factor Codes in My Password Vault?

Technically, there may be an issue. Practically, not really.

Storing 2FA codes in your password vault might slightly reduce security, but the risk is minimal compared to the convenience.
A formidable fortress stands under a clear sky, its design a blend of medieval strength and modern mystery. The large, wooden door at the fortress's entrance is secured with a robust lock, symbolizing protection and secrecy. Above this door, a sign boldly proclaims "Passwords," hinting at the digital fortification concepts within. Emblazoned on the door is a shield, an emblem of defense and security. Beside the main entrance, a small, quaint ticket kiosk offers a juxtaposition to the fortress's grandeur. This kiosk sports a sign that reads "2FA," and another says "PASS", suggesting a modern, technological gateway requirement akin to two-factor authentication. The entire scene merges the aesthetic of ancient castles with contemporary cybersecurity themes, illustrating a unique intersection of the past and present security measures.
(Image: DALL-E 3)
Question: Surely having 2FA in 1Password along with your username/password is asking for trouble. If 1Password is compromised, the hacker then has login details and 2FA all set waiting for them.

This was in response to a recent article discussing how you can use your password vault — 1Password, in my case — to replace Authy as your second factor. (Authy is discontinuing PC support, whereas 1Password works everywhere.)

Your concern is based on an exceptionally unlikely event.

Read more

Find Your Microsoft Account Recovery Email

Be sure to set it up before you need it.

Your Microsoft account recovery email address is an important part of making sure you never lose access to your account.

A realistic digital illustration of a PC computer screen. The screen displays a user interface with a prominent, centered prompt that reads "Enter recovery email address:". The background of the screen is a simple, user-friendly design, suggesting a security or account settings page. The entire setting conveys a modern, technological environment, focusing on the importance of security and account recovery.

One of the important aspects of keeping your Microsoft account secure is to set up account recovery methods in case you ever lose access.

Your recovery email address is one of those things.

I’ll show you how to find out if you have one set already, add it if you don’t, and change it if you need to.

Read more

An Unexpected Way Videos Can Expose Your Location

It’s probably not what you think.

Something many people do every day may expose their location in ways they aren't aware of.
A realistic hand holding a smartphone displaying a map, with recognizable landmarks in the background..
(Image: DALL-E 3 and askleo.com)

I ran across a TikTok channel a while back that got my attention. No, no dancing teenagers; this was a channel dedicated to showing how easy (or hard) it can be for someone with enough time and resources to locate someone else.

Not just anyone, though. They have to have done something very specific.

But it’s something people often do without thinking.

Read more

How Can I Tell If a Web Address Is Safe?

What to look for and what to check.

URLs are simple in concept, but can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.
(Image: DALL-E 3)
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up, but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times, I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.

This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.

The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.

I’ll try to make some sense of it all.

Read more

How Do Spam Filters Work?

Mysteriously.

Spam filters can be sophisticated or simple. I'll look at some of the characteristics of email that spam filters check.
A bright, well-lit mail room with shelves filled with letters and packages. In the center, a person wearing a casual outfit is holding a letter up and examining it closely using a magnifying glass. The person has a focused expression, with the magnifying glass highlighting the details of the letter. The background includes various mailroom elements such as labeled boxes, a sorting table, and some open envelopes. The overall scene is modern and tidy, with a focus on the letter and the magnifying glass.
(Image: DALL-E 3)

Someone commented to me that his spam filter was pretty useless since the spam he was receiving kept coming from different email addresses. The implication was that this person believed that the “From:” address is the only thing that spam filters check.

While that’s possible, it’s also rare.

These days, spam filters are complex and sophisticated pieces of software that check much more than you might think.

Read more

Six Signs of a Phishing Attack

Don’t be fooled.

A friend received a fairly convincing phishing attempt. I'll cover the signs that showed it was spam.

A friend recently asked me to look at an email they’d received to confirm if it was legitimate.

It was not.

It was a good attempt, though, and it probably fooled many people into clicking through and potentially handing over their sign-in credentials to a crook.

I’ll review some signs in this email that flagged it as fake.

Read more

Can I Trust Cloud Backups?

It depends on what you’re backing up. In general, it’s unlikely to be enough.

Backing up data using an online backup service can be an important part of an overall strategy, but it's important to understand its limitations.

Question: I keep hearing about online backup services that will back up your data to the cloud. Assuming it’s secure, why shouldn’t I do that and skip the hassle of doing backups to an external hard drive or whatever?

Online backup services can be a useful component of a broader backup strategy, but they are not enough. There are several factors to consider, including security, completeness, speed, and cost, before deciding if online backup is the right thing for you.

Read more