Is Private Browsing Really Private?

In a word: no.

Private browsing sounds safer than it really is. I'll explain what Incognito mode actually hides, what it absolutely doesn’t, and when it’s still worth using. If you think private mode keeps your online activity secret, you’ll want to see where the real limits are.
(Image: DALL-E 3)
Question: I use private browsing mode in my web browser to keep my online activities private. I mentioned that to a friend and he said it wasn’t private at all. If he’s right, what’s the point?

You’re both right, and you’re both wrong.

Private browsing, also known as Incognito mode, protects your privacy only to a point. And it’s typically not the point most people think it is.

Beyond that point, private browsing does exactly nothing to keep you more private.

Read more

Why Didn’t Microsoft Fix My Pet Peeve?

Don’t take it personally.

Ever wonder why Microsoft never fixes that one thing that drives you crazy? It’s not personal. I'll break down why some annoyances stay put, how Windows chooses what to fix, and why even simple changes can be surprisingly risky.
Frustrated with computer
(Image: canva.com)
Question: I have a question that no one has been able to answer so far. Over the years and the last few versions of Windows that I’ve used, Windows Explorer still shows file sizes in KB, and folders no size. I’m currently dealing with files that are between 300MB to 3GB+. I was hoping that when the latest version came out they would have fixed this problem and I could see my file sizes in KB, MB, or GB. All the other non-Windows operating systems I’ve played with automatically show files in their proper notation. Is this a bug in windows or is MS to lazy to fix this program and give us only this second rate software? If you could help clear this up I would greatly appreciate it.

This is a common question.

Not the file-size-display issue, but the more general question: “Why didn’t Microsoft fix this?” where “this” is a person’s pet peeve or a system bug.

In most cases, asking “Why?” is an exercise in frustration; it rarely gets you a straightforward answer. But I can theorize many legitimate reasons for not addressing something like this.

Read more

How You Can Avoid Social Media Algorithms

You can take control.

Social media often shows you what it wants you to see, not what you asked for. I'll explain how those algorithms work and the steps you can take to see more of what matters to you.

Social Media Cascade
(Image: Gemini)

A lot has been written in recent years about social media — specifically, the algorithms social media companies use when choosing what to show you.

To say it’s controversial is an understatement. It’s been blamed for everything from increasingly short attention spans to the looming downfall of democracy.

Let’s review what those algorithms mean, how they work, why they work, and some ways you can avoid them — or at least take back more control.

Read more

How Does My Computer Know Where I Am?

Lots of educated guesses.

Ever wonder how your computer or phone “knows” where you are, and why it sometimes gets it wrong? I'll break down the clues your devices use, why location mistakes happen, and what you can do when websites think you’re somewhere else entirely.
a globe with a location pin on it that says "You are here"
(Image: Gemini)
Question: My computer and phone seem to know where I am. How do they do that? Sometimes they get it wrong — as in placing me in another country — and deny access to things I think I should be able to see.

Location identification is… complicated.

It’s a mix of various inputs from various places. While I’m not 100% knowledgeable on all the possibilities that can factor into location, here’s a sense of how things work (more or less).

To begin with, it depends on how you’re “looking at” your location, or perhaps who is looking at it.

Read more

Why Am I Seeing So Many CAPTCHAs?

The rise of the bots.

Tired of being asked if you're human? I'll explain what site owners like me are dealing with behind the scenes and why you’ll probably be clicking “I’m not a robot” a lot more often.
I'm not a robot.
(Screenshot: askleo.com)

CAPTCHAs — Completely Automated Public Turing test to tell Computers and Humans Apart — seem to be popping up everywhere, even on sites where you wouldn’t think they’d be needed.

I’ve been tempted to add a CAPTCHA to Ask Leo!. Seriously tempted.

Let me explain what leads to that temptation. I’ll also explain why it’s unlikely to happen, even though the costs of not doing so can be high.

Read more

Is it Safe to Put Two-Factor Codes in My Password Vault?

Technically, there may be an issue. Practically, not really.

Storing 2FA codes in your password vault might slightly reduce security, but the risk is minimal compared to the convenience.
A formidable fortress stands under a clear sky, its design a blend of medieval strength and modern mystery. The large, wooden door at the fortress's entrance is secured with a robust lock, symbolizing protection and secrecy. Above this door, a sign boldly proclaims "Passwords," hinting at the digital fortification concepts within. Emblazoned on the door is a shield, an emblem of defense and security. Beside the main entrance, a small, quaint ticket kiosk offers a juxtaposition to the fortress's grandeur. This kiosk sports a sign that reads "2FA," and another says "PASS", suggesting a modern, technological gateway requirement akin to two-factor authentication. The entire scene merges the aesthetic of ancient castles with contemporary cybersecurity themes, illustrating a unique intersection of the past and present security measures.
(Image: DALL-E 3)
Question: Surely having 2FA in 1Password along with your username/password is asking for trouble. If 1Password is compromised, the hacker then has login details and 2FA all set waiting for them.

This was in response to a recent article discussing how you can use your password vault — 1Password, in my case — to replace Authy as your second factor. (Authy is discontinuing PC support, whereas 1Password works everywhere.)

Your concern is based on an exceptionally unlikely event.

Read more

Find Your Microsoft Account Recovery Email

Be sure to set it up before you need it.

Your Microsoft account recovery email address is an important part of making sure you never lose access to your account.

A realistic digital illustration of a PC computer screen. The screen displays a user interface with a prominent, centered prompt that reads "Enter recovery email address:". The background of the screen is a simple, user-friendly design, suggesting a security or account settings page. The entire setting conveys a modern, technological environment, focusing on the importance of security and account recovery.

One of the important aspects of keeping your Microsoft account secure is to set up account recovery methods in case you ever lose access.

Your recovery email address is one of those things.

I’ll show you how to find out if you have one set already, add it if you don’t, and change it if you need to.

Read more

An Unexpected Way Videos Can Expose Your Location

It’s probably not what you think.

Something many people do every day may expose their location in ways they aren't aware of.
A realistic hand holding a smartphone displaying a map, with recognizable landmarks in the background..
(Image: DALL-E 3 and askleo.com)

I ran across a TikTok channel a while back that got my attention. No, no dancing teenagers; this was a channel dedicated to showing how easy (or hard) it can be for someone with enough time and resources to locate someone else.

Not just anyone, though. They have to have done something very specific.

But it’s something people often do without thinking.

Read more

How Can I Tell If a Web Address Is Safe?

What to look for and what to check.

URLs are simple in concept, but can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.
(Image: DALL-E 3)
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up, but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times, I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.

This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.

The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.

I’ll try to make some sense of it all.

Read more

How Do Spam Filters Work?

Mysteriously.

Spam filters can be sophisticated or simple. I'll look at some of the characteristics of email that spam filters check.
A bright, well-lit mail room with shelves filled with letters and packages. In the center, a person wearing a casual outfit is holding a letter up and examining it closely using a magnifying glass. The person has a focused expression, with the magnifying glass highlighting the details of the letter. The background includes various mailroom elements such as labeled boxes, a sorting table, and some open envelopes. The overall scene is modern and tidy, with a focus on the letter and the magnifying glass.
(Image: DALL-E 3)

Someone commented to me that his spam filter was pretty useless since the spam he was receiving kept coming from different email addresses. The implication was that this person believed that the “From:” address is the only thing that spam filters check.

While that’s possible, it’s also rare.

These days, spam filters are complex and sophisticated pieces of software that check much more than you might think.

Read more

Six Signs of a Phishing Attack

Don’t be fooled.

A friend received a fairly convincing phishing attempt. I'll cover the signs that showed it was spam.

A friend recently asked me to look at an email they’d received to confirm if it was legitimate.

It was not.

It was a good attempt, though, and it probably fooled many people into clicking through and potentially handing over their sign-in credentials to a crook.

I’ll review some signs in this email that flagged it as fake.

Read more

Can I Trust Cloud Backups?

It depends on what you’re backing up. In general, it’s unlikely to be enough.

Backing up data using an online backup service can be an important part of an overall strategy, but it's important to understand its limitations.

Question: I keep hearing about online backup services that will back up your data to the cloud. Assuming it’s secure, why shouldn’t I do that and skip the hassle of doing backups to an external hard drive or whatever?

Online backup services can be a useful component of a broader backup strategy, but they are not enough. There are several factors to consider, including security, completeness, speed, and cost, before deciding if online backup is the right thing for you.

Read more

Does the Recycle Bin Take Up Space, and Where Is It?

Mysterious and hidden.

The Recycle Bin is your friend. I'll show you where it lives and how to control the space it uses.
Recycle Bin
(Image: DALL-E 3)

When you delete a file using Windows File Explorer, that file is placed in the Recycle Bin. The Recycle Bin in Windows has saved many a person from grief, I’m sure.

But where exactly is it, and do the deleted files still take up space?

Let’s look.

Read more

Can I Delete Temporary Files in Windows?

Why are so many left undeleted?

Temp files can pile up. Why is that, and do you need to worry about them?

Question: Why are there so many temporary files left behind each time the computer is shut down and restarted?

There are indeed many temporary files. As I write this, my primary machine has 322 files in its temporary folder that total 58 megabytes. My example PC, which isn’t used nearly as heavily, has 134 files taking up 78 megabytes.

Just as there are many files, there are also many reasons they get left behind.

Read more

How Do I Find My Downloads on My PC?

Several factors to consider.

Downloading a file from the internet is easy, but controlling where downloads go takes a little more understanding.
A a Windows PC screen with a 'Downloads' folder open, displaying various file types like PDFs, images, and software. The surrounding workspace is tidy, with a coffee mug, notepad, and pens. The setting is modern and well-lit, highlighting the simplicity of managing downloads on a computer.
(Image: DALL-E 3)
Question: When I download files like ebooks off the internet, I can never find them. Where do they go on my computer?

It depends on how you download them. We’ll look at four scenarios.

  • Typically, they go into your Downloads folder.
  • They may also go into the same folder as the last download.
  • There’s another place downloads can end up that’s kind of dangerous, as it gets “cleaned up” every so often (meaning you could eventually lose your download).
  • We’ll also look at how to find your file regardless of where it landed.

Read more

Help! Someone Is Inside My Computer, Controlling It!

What to do if you suspect someone else is in control of your computer.

Question: My computer is being controlled and I cannot load anything I have purchased. Seems like when I change my password it asks several times — not good. Also, when I do it is intercepted and blocked. Why ? This my personal home computer.
When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Most of those people are wrong.

I get variations on this question often.

Someone believes their computer is being controlled remotely without their consent, or they believe their activities are being monitored in detail, or they believe their files and other information are being stolen or manipulated by others with malicious intent.

The bottom line is, they’re convinced someone is spying on them — or worse.

What happens next is… complicated.

Read more

What’s a QR Code, and Can You Trust Them?

Why you shouldn’t scan them recklessly.

A QR Code.
A QR code. (Image: askleo.com)
QR codes are a nifty way to encode web addresses and other text in a way that's easy for your smartphone to decode, but they are not without risk.

During a televised sporting event, a company spent a lot of money to run an advertisement that was nothing more than a QR code (like the one displayed above).

Apparently, against all common sense and with no regard for security, millions of people used it.

Why? What did it mean? What are you supposed to do with QR codes, and how do they relate to security?

They’re pretty cool.

But they can also be weaponized, and you’d never know.

Read more

Privacy and Searching for Phone Numbers Online

It’s not easy to find a phone number online, and may not even be possible.

You have an email address and you want the associated phone number. It's unlikely you'll find it, but there are a few things to try.

Searching for phone number

Question: I have the email of a person I want to talk to, but they won’t share their phone number. Can I find it another way?

Maybe.

There’s no public directory or phone book you can look at that maintains a list of phone numbers and email addresses.

You’re going to have to do a little legwork and be a lot lucky.

Read more

How Do I Tell If an Email Address Is Fake?

There may be clues. Or not.

It's hard to determine whether an email address is fake.
Illustration in a popular 3D animation style showcasing a detailed email envelope icon. Over the envelope, there's a large, clear magnifying glass zooming in on a generic email address (e.g., user@example.com) written on the envelope, set against a light gradient background.
(Image: DALL-E 3)
Question: How can you tell if an email address is fake? How do scammers make fake emails?

While it can be helpful to identify fake email addresses — they’re a great clue as to whether the email you’re looking at is a scam or worse — you might not be able to. A phony email address can easily be made to look like a valid one.

Sometimes there are clues, and I’ll review a few of those, but some of those clues also apply to legitimate email addresses.

Read more

How to Deal with Spam

You can’t stop it, but you can take steps to avoid getting more.

Spam is inevitable; just don't ask for more.
Stop Spam!
(Image: canva.com)

Imagine a world without spam. What a nice, quiet place, right? Many services would be more efficient and cost less.

Unfortunately, that utopia is not to be. Spam exists and can’t be completely prevented.

But you can take steps to prevent getting more spam.

Read more

Four Risks With Free Wi-Fi

It can be fine, and probably is, but there’s always risk.

Freely accessible Wi-Fi is almost everywhere, and most systems are set up to use it safely. There are a few things to pay attention to in order to stay safe.
Free Wi-Fi
(Image: canva.com)
Question: How come connecting to a trusted public hotspot is not a BIG security issue since multiple devices can be connected to that same Wi-Fi? If even one of the connected devices has malware, then isn’t my device also under threat ??

This question was asked in response to a Ask Leo! Tip of the Day suggesting that you look out for “fake” public hotspots.

The issue is that even if the hotspot itself is the correct and trusted hotspot, what about all the other users?

Read more

Backups Are GREAT Security

They protect you from failure as well as malware.

Don't overlook backing up as part of your computer security. When the worst happens, it's your backup that will save you.

We tend to think of backing up as separate from keeping our computers secure.

Nothing could be further from the truth.

To misquote the cereal commercial: backups are an important part of a healthy, secure breakfast.

Read more

What to Do When Your Outlook.com Storage Is Full

Microsoft changed how they allocate storage.

Microsoft changed the free storage allocation for Outlook.com and OneDrive.

In 2023, I started hearing from people who suddenly could not send or receive email via Outlook.com, or were seeing warnings that they’d soon be unable to unless they took action.

The action? Buying more OneDrive space.

What does OneDrive have to do with Outlook.com? Until 2023, not much. Now, though, they’re attached1 at the hip.

Read more