Prevention and preparation are the best solutions to ransomware.
Sadly, it’s never cookies. (Image: Gemini)
Question: … some of my files are gone, saying they have been encrypted with a public key. Files like my photos and so on. Of course, they have a high fee in order for me to get them back. Do you have a solution?
My morning email brought this question from a friend.
While there are a few straws to grasp at, the odds are not good. The whole point of ransomware is that there’s no easy way to undo the damage. If there were, ransomware wouldn’t be a thing.
I’ll look at the few options you have, and more importantly, how prevention can give you peace of mind.
Tired of keyboards that fail too soon or slow you down? I’ll share what I think matters when choosing a keyboard and mouse, what I do, and why “wireless” may not be your friend.
(Image: Gemini)
Question: Do you have any suggestions on a cordless keyboard and mouse that is under $100?? I can’t even believe how many keyboards I have gone through that wind up slowing me down and then stop working, particularly the space bar and shift key with capitalizing.
Maybe.
I’ll share two approaches to keyboard and mouse selection — and why at least one aspect of your request is something I’d advise you to avoid.
File Explorer’s messy left side driving you crazy? I'll show you how to clean up the navigation pane, remove clutter, and pin only the folders you actually use.
(Image: ChatGPT)
The navigation pane — that left-hand pane in Windows File Explorer — can be a cluttered mess. In fact, I suspect that for whatever reason, “cluttered mess” is the default setting.
Fortunately, you have more control over what goes there than you might realize.
Let’s examine what we can do with Windows File Explorer’s navigation pane to make it more useful.
Want a program to start automatically every time you sign in to Windows? There’s a simple, built-in way to do it.
(Image: Gemini)
Question: Leo, I’m trying to find out how to add a program to autostart on boot up in Windows. Do you know?
There are many ways to start programs automatically when Windows boots or when you sign in. Most of them are obscure registry settings used by applications when they’re installed. Fortunately, there’s one easy approach.
It's easy to jump to the conclusion your computer has been hacked, but it's usually not the case. Regardless, preventing a hack is easier than recovering from one.
(Image: Gemini)
Question: How can I tell if my computer is being hacked?
You can’t. Not in any absolute sense.
Almost every sign of a hack can just as easily — perhaps even more easily — be explained by other things. There are some clues to look for, which I’ll review, but none of them are guaranteed signs of actually being hacked.
This is one reason I talk so much about prevention.
People often use free email providers only to lose everything when a problem occurs. So what should you look for in a paid email provider?
(Image: canva.com)
Question: I get that you strongly recommend against using free email accounts for important stuff. But that begs the question: which paid email providers do you recommend?
A fair question. I recommend several approaches depending on your situation.
I need to explain what I’m looking for first. It’s possible that you already have what you need.
Random authenticator requests can be unsettling. Are you being hacked, or is something else going on? I'll discuss why these alerts might happen, what they really mean, and what to do.
(Image: Gemini)
Question: I recently received a steady flow of authenticator requests, but I can’t figure out why and for which account these log-in attempts came from. Of course, I deny these authenticator requests, but it bothers me that I get so many of them. There is obviously someone trying to hack one of my accounts that uses the authenticator verification process.
I’m not convinced that someone is trying to hack your account, but it’s certainly one possibility.
The good news is that denying them is exactly the right thing to do.
The bad news is that denying them is basically the only thing you can do.
Google quietly removed the Gmail feature that let you pull all your email into one inbox. If you relied on Gmail as your central hub, it’s time to rethink your setup. Here’s what no longer works and the options that still do.
(Image: askleo.com)
Question: You’ve mentioned that you use Gmail as your spam filter even though your email address is not a Gmail address. Can you describe how you do that?
Running a small business, especially from home, puts your data at risk in ways you might not expect. I'll discuss what I see as the five biggest security threats facing small teams.
(Image: Gemini)
Question: I run a small accounting firm with six employees who all work from home, and I am struggling to feel confident that I have set up reasonable security measures for my firm. I am required to collect and use my client’s personally identifiable information in the work that we do, and have to follow IRS and potentially FTC regulations (I am not 100% sure about this one). But regardless, our reputation is very important, and I don’t need it tainted by a security breach.
So I am interested in what you would consider my top five risks are and what should be done to mitigate those risks in a cost-effective way that doesn’t severely impede team functionality.
Let me start by saying I am in no way qualified to provide advice that is guaranteed to be IRS, FTC, or any three-letter-agency-compliant. If that’s key, you’ll want to seek out more qualified sources.
However, I’ve been a small business owner with contractors and employees working from home for multiple decades — even before Ask Leo!. So I have practical experience as well as a few opinions on the topic.
Think the Recycle Bin on your PC is the last stop for deleted files? Not always. I'll show you a second, often-overlooked Recycle Bin hiding in your cloud storage. It might rescue files you thought were gone for good.
(Image: canva.com)
When we talk about the Recycle Bin, what usually comes to mind is the one on your computer’s desktop. When you delete a file in Windows File Explorer, it’s moved to the Recycle Bin rather than being immediately and permanently deleted. If you change your mind, you can restore files from the Recycle Bin. Conversely, you can empty the Recycle Bin, permanently deleting the files.
That’s not the Recycle Bin I’m talking about.
If you use almost any online cloud storage, you have another Recycle Bin. The catch? It applies only to your cloud storage.
Private browsing sounds safer than it really is. I'll explain what Incognito mode actually hides, what it absolutely doesn’t, and when it’s still worth using. If you think private mode keeps your online activity secret, you’ll want to see where the real limits are.
(Image: DALL-E 3)
Question: I use private browsing mode in my web browser to keep my online activities private. I mentioned that to a friend and he said it wasn’t private at all. If he’s right, what’s the point?
You’re both right, and you’re both wrong.
Private browsing, also known as Incognito mode, protects your privacy only to a point. And it’s typically not the point most people think it is.
Beyond that point, private browsing does exactly nothing to keep you more private.
Ever wonder why Microsoft never fixes that one thing that drives you crazy? It’s not personal. I'll break down why some annoyances stay put, how Windows chooses what to fix, and why even simple changes can be surprisingly risky.
(Image: canva.com)
Question: I have a question that no one has been able to answer so far. Over the years and the last few versions of Windows that I’ve used, Windows Explorer still shows file sizes in KB, and folders no size. I’m currently dealing with files that are between 300MB to 3GB+. I was hoping that when the latest version came out they would have fixed this problem and I could see my file sizes in KB, MB, or GB. All the other non-Windows operating systems I’ve played with automatically show files in their proper notation. Is this a bug in windows or is MS to lazy to fix this program and give us only this second rate software? If you could help clear this up I would greatly appreciate it.
This is a common question.
Not the file-size-display issue, but the more general question: “Why didn’t Microsoft fix this?” where “this” is a person’s pet peeve or a system bug.
In most cases, asking “Why?” is an exercise in frustration; it rarely gets you a straightforward answer. But I can theorize many legitimate reasons for not addressing something like this.
Social media often shows you what it wants you to see, not what you asked for. I'll explain how those algorithms work and the steps you can take to see more of what matters to you.
(Image: Gemini)
A lot has been written in recent years about social media — specifically, the algorithms social media companies use when choosing what to show you.
To say it’s controversial is an understatement. It’s been blamed for everything from increasingly short attention spans to the looming downfall of democracy.
Let’s review what those algorithms mean, how they work, why they work, and some ways you can avoid them — or at least take back more control.
Ever wonder how your computer or phone “knows” where you are, and why it sometimes gets it wrong? I'll break down the clues your devices use, why location mistakes happen, and what you can do when websites think you’re somewhere else entirely.
(Image: Gemini)
Question: My computer and phone seem to know where I am. How do they do that? Sometimes they get it wrong — as in placing me in another country — and deny access to things I think I should be able to see.
Location identification is… complicated.
It’s a mix of various inputs from various places. While I’m not 100% knowledgeable on all the possibilities that can factor into location, here’s a sense of how things work (more or less).
To begin with, it depends on how you’re “looking at” your location, or perhaps who is looking at it.
Tired of being asked if you're human? I'll explain what site owners like me are dealing with behind the scenes and why you’ll probably be clicking “I’m not a robot” a lot more often.
(Screenshot: askleo.com)
CAPTCHAs — Completely Automated Public Turing test to tell Computers and Humans Apart — seem to be popping up everywhere, even on sites where you wouldn’t think they’d be needed.
I’ve been tempted to add a CAPTCHA to Ask Leo!. Seriously tempted.
Let me explain what leads to that temptation. I’ll also explain why it’s unlikely to happen, even though the costs of not doing so can be high.
Storing 2FA codes in your password vault might slightly reduce security, but the risk is minimal compared to the convenience.
(Image: DALL-E 3)
Question: Surely having 2FA in 1Password along with your username/password is asking for trouble. If 1Password is compromised, the hacker then has login details and 2FA all set waiting for them.
This was in response to a recent article discussing how you can use your password vault — 1Password, in my case — to replace Authy as your second factor. (Authy is discontinuing PC support, whereas 1Password works everywhere.)
Your concern is based on an exceptionally unlikely event.
Something many people do every day may expose their location in ways they aren't aware of.
(Image: DALL-E 3 and askleo.com)
I ran across a TikTok channel a while back that got my attention. No, no dancing teenagers; this was a channel dedicated to showing how easy (or hard) it can be for someone with enough time and resources to locate someone else.
Not just anyone, though. They have to have done something very specific.
But it’s something people often do without thinking.
URLs are simple in concept, but can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
(Image: DALL-E 3)
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up, but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times, I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.
This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.
The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.
By far the number one topic on Ask Leo! (as measured by page and video views) is what to do if you’ve lost your password and can’t log in to a service you rely on. Google tops the list, but the problem applies equally to other online services like Outlook.com, Facebook, and more.
There are several reasons you might find yourself in that position, but they’re all made worse by the desperation that can result when account recovery mechanisms don’t seem to work.
And there are many scammers out there ready to take advantage of your panic.
Spam filters can be sophisticated or simple. I'll look at some of the characteristics of email that spam filters check.
(Image: DALL-E 3)
Someone commented to me that his spam filter was pretty useless since the spam he was receiving kept coming from different email addresses. The implication was that this person believed that the “From:” address is the only thing that spam filters check.
While that’s possible, it’s also rare.
These days, spam filters are complex and sophisticated pieces of software that check much more than you might think.
A friend received a fairly convincing phishing attempt. I'll cover the signs that showed it was spam.
A friend recently asked me to look at an email they’d received to confirm if it was legitimate.
It was not.
It was a good attempt, though, and it probably fooled many people into clicking through and potentially handing over their sign-in credentials to a crook.
I’ll review some signs in this email that flagged it as fake.
Backing up data using an online backup service can be an important part of an overall strategy, but it's important to understand its limitations.
Question: I keep hearing about online backup services that will back up your data to the cloud. Assuming it’s secure, why shouldn’t I do that and skip the hassle of doing backups to an external hard drive or whatever?
Online backup services can be a useful component of a broader backup strategy, but they are not enough. There are several factors to consider, including security, completeness, speed, and cost, before deciding if online backup is the right thing for you.