Articles in Category: ask-leo.com

These are articles that have been migrated from the old “ask-leo.com” site but have NOT yet been cleaned up or otherwise updated. They’re here primarily as a reference. We’ll be updating the more important and popular ones over time.

How can I archive email that uses remote content?

HTML email can use elements fetched from remote servers at display time. If those elements are removed from the server they disappear from your email.

Why can't I get the volume louder in Windows Vista and Windows 7?

Windows has several volume controls. Add to those a couple of additional volume controls and making things louder can quickly get confusing.

Why am I getting spam with my email address but with a different name?

Spammers use many techniques to fool you into opening and acting on their messages. I’ll look at what they do to your email address.

Will not using the keyboard fool key loggers?

It sounds counter-intuitive, but avoiding your keyboard will not bypass keyloggers. I’ll look at why, and what you need to do instead.

So just how sneaky can spyware be?

Much of what we call spyware, like adware, can be relatively benign. But more and more there’s a more intrusive, damaging kind of spyware as well, better called “malware”.

Can a recovery partition be infected?

A recovery partition is often just another visible area on your hard drive, and is at risk for several types of issues including malware infections.

How do I keep my laptop safe at the airport?

Traveling with a laptop brings with it certain risks, mostly centered around loss. We’ll look at the risks and steps you can take.

What's the difference between a "quick" and a "full" scan, and which do I want?

Many anti-malware products offer both a “quick” and “full” scan. I’ll examine the common difference, and outline what I generally suggest you do.

How do I make something run automatically when I log in to Windows 7?

Windows has several mechanisms for having something start automatically when you log in. I’ll walk through one of the simplest.

Why are emailed attachments larger than the original file?

Email attachments are always larger than the original file being attached. I’ll look at why, how it works, and why it matters.

What are (and how do I get rid of) "Antivirus 2010" and "Vista Spyware 2010"?

Antivirus 2010 and similar are malware that tries to fool you into installing viruses or spyware, and then charges you for the promise of removal.

When do I actually need to run a virus scan?

There are two types of virus scans: continuous or periodic. Which and how many you need and how often they’re needed depends on your situation.

It's About Helping: Your Recommendations

Ask Leo! is looking for your recommendations for programs supporting English and Computer literacy.

Why did you tell people you weren't going to be home?

When I left on a three week vacation I did not hide the fact, and in fact mentioned it publicly in the weeks leading up to it. Was that advisable?

Why is email between Hotmail accounts lost?

I’m seeing an increase in reports of email sent but never received, often relating to Hotmail accounts. I’ll look at possible reasons.

How do I remove Windows Media Player from being the default media player?

There are lots of media players with varying capabilities, strengths and weaknesses. Even if you don’t like Windows Media Player you’ll need something.

Does my ISP really connect to the internet through only a single router?

Most ISPs and data centers take care to use a high degree of equipment redundancy to transparently handle almost any failure. Almost. Usually.

Is it worth upgrading to Windows 7?

Now that Windows 7 has been out for some time we’ll revisit the exceptionally common question: should I upgrade?

Can just opening an email download both viruses and spyware?

It’s extremely unlikely to get a virus by just looking at an email these days. The same applies to spyware.

So do I need the Windows Firewall or not?

You do need a firewall and particularly if you aren’t behind a router the Windows Firewall is one option.

What does "Notification of Limited Account Access" mean?

“Limited Account Access” is a common phrase you’ll find in many phishing scams. Occasionally, though, it’s a legitimate notification from PayPal.

What are some other popular tech newsletters?

The results of my reader survey of popular tech newsletters that you might be interested in.

How do I see what's happening on my machine's network connection?

It’s not at all uncommon for your network to be busy even if you’re not. We’ll look at why, and what you might do to investigate should you need to.

Will I need to install drivers after reinstalling Windows?

Windows comes complete with an extensive set of drivers that will get your machine running, but you may need more to enable your hardware’s features.

How do I keep MSN Messenger / Windows Live Messenger from starting up?

Windows Messenger often starts automatically because it’s been configured to. There’s another way it can show up unexpectedly as well.

Does just looking at a file leave a trail?

While simply viewing a file seems like a benign thing to do, there are many ways that the file itself or the fact that you viewed it might be recorded.

What's the difference between AppData and Application Data folders? (And why have both?)

In Windows Vista, and Windows 7, several common folders have been moved or renamed. The old names remain for compatibility (and confusion).

Can hackers see data going to and from my computer?

In some instances, it might be possible for hackers to see data going to and from one’s computer. Sometimes it matters, but sometimes it doesn’t.

Where does Outlook Express put my mail folders?

Outlook Express, Windows Mail and Windows Live Mail store your email in a user-specific location that can be difficult to locate. We’ll find it.

How do I fix this problem uninstalling Microsoft Office 2010 (Beta)?

Installing Beta software comes with real risks, including the inability to uninstall. Often there are few options unless you’ve prepared beforehand.

How do I remove the sender's address before forwarding an email?

Removing information from an email you forward is as simple as editing the message prior to hitting send. And yet, sometimes not quite that easy.

How do I create a disk image using DriveImage XML?

DriveImage XML is a free (for home use) backup and imaging program. I’ll walk through the steps of creating a complete hard drive backup image.

How do I get rid of toolbars in my browser?

It’s all too easy for browser toolbars to accumulate to an almost unusable collection. We’ll look at how to prevent, and remove, browser toolbars.

Does locking my computer keep it safe?

The lock function in Windows is convenient and fast, but it’s not quite as secure as you might think. We’ll look at why.

2010 – It's About Helping People

As the new year begins, I’ve taken some time to reflect on what Ask Leo! is
about, where it’s been and where it’s headed.

2009 Most Popular Questions

A breakdown of the 10 most popular questions in 2009 as measured by visits to Ask Leo!

How long does Hotmail keep email?

Hotmail will keep your email for quite a while as long as you access it periodically. And if nothing goes wrong. Then you may have problems.

Why are there limits to attachment sizes in some places and not others?

Email providers often place limits on the size of emails and attachments you can send. We’ll look at why, and where those limitations are placed.

Should I Compress and Encrypt my backups?

Most backup programs offer the options to compress and/or encrypt the data being backed up. I’ll look at the pros and cons.

Can someone I'm IM'ing with see my machine or hard disk?

Instant messaging programs connect two machines, but typically not directly, and even then normal precautions prevent additional technical risk.

Does a BIOS password protect the contents of my laptop?

BIOS and boot menu passwords can help establish a certain level of security, but they’re not a reliable way to protect your data.

Why am I repeatedly locked out of my Hotmail account, and what can I do about it?

Hotmail will lock your account, preventing login, if it detects potential abuse or breakin attempts. Unfortunately, that’s about all we can know.

Should I use Google's new DNS services?

Google has begun offering DNS services. I’ll look at what that is, why that is, and whether or not it’s worth your looking into.

Someone I met in chat is threatening me – am I safe on my computer?

Being harassed or bullied online is frighteningly common. While threats are rarely carried out by these cowards, it can still be very unsettling.

Why is there an email block against my IP address?

One approach to prevent spam is blocking email from the IP address of known spammers. Like any spam fighting technique, there are false positives.

How do I delete cookies?

Cookies can be used to save your password, or your logged in state, when you visit some web sites. I’ll walk through clearing them.

If I move a hard disk from my old machine to my new one, can I just run my old applications from it?

Moving data from an old machine to a new is relatively easy. Moving programs to your new machine typically requires a reinstall of the application.

Can clicking "Cancel" still mean "Accept" when I get a popup?

Spyware uses almost every trick in the book to get onto your machine. Making a web page pop-up that *looks* like it has a Cancel button is just one.

Can I, or should I, use TrueCrypt for my backups?

Backup and encryption can go together depending on your needs. There are options, beginning with which comes first: the backup or the encryption?

What is Windows 7's "Windows XP Mode"? (And can I use it to get Outlook Express back?)

Windows 7 Professional and above include “Windows XP” mode. If you have programs that don’t work or aren’t available in Windows 7, XP Mode may help.