Articles in Category: ask-leo.com

These are articles that have been migrated from the old “ask-leo.com” site but have NOT yet been cleaned up or otherwise updated. They’re here primarily as a reference. We’ll be updating the more important and popular ones over time.

Why do registry errors keep coming back?

Registry cleaners will often report multiple errors on every run, even after having recently ‘cleaned’ the registry. The registry is … complicated.

Why is there more than one "My Documents"? Does that mean it's taking up extra space?

The “My Documents” folder is treated somewhat differently by Windows. While it can appear in multiple places, there’s really only one.

Creating Bootable Rescue Media using Acronis TrueImage Home

After installing the application there’s a critical step you need to take first, before even thinking about backing up.

Seagate FreeAgent Go – Portable USB External Harddrive

I currently own five of these. If that isn’t a recommendation I don’t know what is

What does "If you change a file name extension, the file may become unusable" mean?

Filename extensions are important pieces of information that Windows uses to determine what a file contains. Change it, and you could lose access.

Does the Browser Store Passwords in Cookies?

Once you’ve logged into a site cookies are often used to keep you logged in for some period of time. There are risks associated with that, and more.

My ISP has placed a bandwidth cap on my connection. What should I do?

As internet usage grows ISPs are faced with problems meeting the demand for bandwidth. The result may be a bandwidth cap or limit placed on your usage.

Installing Backup Software

The first installment in our backing up series is to install backup software. We’ll install Acronis TrueImage Home 2009.

Just what service packs do I need?

SP2 or SP3 for Windows XP? SP1 or SP2 for Vista? For now, at least, which one do you need, and will that last? I’ll look at the confusing combinations.

I reinstalled Windows and now my sound doesn't work – how do I fix it?

After performing a clean install of Windows it’s not uncommon for some devices like sound to no longer work. The solution is fairly easy.

How do I get un-banned from a site?

If you’ve been permanently banned from a site there might be ways around it. But there’s really only one correct approach.

Should I switch to Windows 7?

Windows 7 is coming soon, and all reports are that it’s a better, more reasonable Windows than Vista. Should you switch?

Is leaving a website open on my computer dangerous?

It’s not uncommon to leave a website open on your computer for long periods of time. That’s not typically a problem, but you should still take care.

How Can Two Programs that Are Nearly Identical Be so Different in Size and Speed?

Software design is as much an art as a science. As a result of various decisions and requirements similarly tasked software can often vary greatly.

How do I tell what svchost is doing?

Svchost.exe is a Windows component that can do many, many things. We’ll look at how to identify exactly which services svchost is hosting.

How do I set what email program my system uses?

Applications, and Windows itself, need to know the proper program to use when sending mail – we’ll look at where that is, and how to [re]set it.

How do I keep my domain registration private?

When registering a domain you’re required to give contact information which is then made public. There are ways to retain your privacy.

How do I copy a picture out of a PowerPoint presentation?

We often see beautiful pictures being passed around in PowerPoint files. It’s not difficult to copy a single image for other purposes.

Should I allow Outlook Express to compact messages, and how do I get it to stop asking me if I don't?

Outlook Express is a very popular desktop email program. Unfortunately, it can be touchy about its files, particularly when it comes to compaction.

Why can't this trojan be removed?

Occasionally, malware will infect files that are critical to Windows own operation. Repairing these types of infections can be difficult, at best.

Can I tell if a keylogger has been installed on the machine I share?

Sharing a computer comes with a lot of potential privacy and security issues. If you don’t trust the person you share with, you shouldn’t be sharing.

What's the difference between an upgrade and an upgrade?

With all the different versions of Windows it’s easy to get confused, particularly when the term “upgrade” can actually mean two different things.

How do I access my email remotely, from more than one place?

There are several options to accessing email, but they all have various tradeoffs depending on how you like to work with your email. We’ll compare.

What does it mean if you get a warning that your hard drive is about to fail?

Most hard drives include technology to self monitor and warn of potential problems. The warnings are worth paying attention to.

How do I install programs on a drive other than C:?

Many, but not all programs allow you to specify their install location. In some, however, that ability is somewhat hidden in the install process.

Link to Leo!

Want to link to Ask Leo! ? – I really appreciate it! Here are some templates and HTML you can use or start with.

Promotional Material

I occasionally get asked for promotional material, biographical information, or other text about myself or Ask Leo!. Here’s a collection of ideas.

I closed my email account, but people are still getting email from it. Why?

Closing an email account seems like a logical solution to an account getting hacked, but unfortunately it doesn’t address all the possible issues.

Why does my computer crash after adding RAM?

Adding RAM can be a cost effective upgrade, but if your computer crashes after doing so, it’s time to double check a few things. Like the RAM added.

Does the Flash Player store things in my computer? Is that safe?

Flash Player can store information on your computer much like your browser stores cookies. We’ll look at the risk, and how to manage the settings.

Twitter Starter Pack

Resources for people trying to understand just what Twitter is all about.

My Windows Live Hotmail account was closed for a "Terms of Use Violation" – I did nothing wrong, what do I do?

Some Windows Live Hotmail users are seeing accounts closed for a “Terms of Use Violation” – we’ll look at what that is, and what to do.

How much does my encrypted wireless connection protect me?

Wireless encryption is important, but it’s not as far-reaching as some might believe. We’ll look at how far, and what additional steps you might need.

Did I really get a critical update notification for Outlook Express in my email?

Emails that look like a critical update from Microsoft are scams. We’ll look at exactly what makes the scam obvious.

My old computer is too slow for anti-virus software. What should I do?

Extending the life of older computers can be a challenge, especially when current versions of important tools like anti-malware scanners fail to run.

How are upload and download speeds related, and why are they different?

Upload and download speeds quoted by your ISP aren’t as directly related as you might imagine. It’s easier to think of them as two separate things.

How can I password protect a desktop shortcut?

Passwording a desktop shortcut, while theoretically possible, wouldn’t really accomplish the goal of securing information. We’ll look at alternatives.

I let a stranger send email from my computer, what could that have done?

It’s tempting and even noble to want to help, but letting a stranger access your computer without strict supervision is asking for trouble.

Why am I getting a network attack from China?

Internet connected computers are constantly probed for vulnerabilities. Many come from China, but safety steps are the same no matter where from.

How do I move my Windows Live Hotmail account from one computer to another?

It’s not uncommon to want to move your email access from an old to a new computer. Web mail is easy, but there are things to watch for.

What's the best thing to do when my hard drive fills up?

Once you start running out of disk space, it’s time to look at options. We’ll cover a couple of approaches to dealing with a full hard drive.

Did someone really send me photos on Tagged?

Many people are getting messages from Tagged indicating that a friend has posted photos. Here’s a clue: they didn’t.

Can I tell when someone logged into my machine, and what they did?

It may be possible to determine when someone has logged into your machine, but knowing exactly what they did while there is more difficult.

Why do some web pages not update like they should?

Every so often we run into web pages that don’t stay up to date, displaying old information. We’ll look at causes and possible solutions.

How do I determine the subnet mask I'm supposed to use?

A subnet mask is one part of the information used to make a network connection. For most people, it’s something you need never know about.

Why do I get "This operation is canceled due to restrictions in effect on this computer"?

‘This operation is canceled …’ is an unfortunately common symptom of an all-too-common problem: a virus infection. We’ll look at your options.

How much can people find out from a photo I email them?

Photographs often include additional embedded information about the picture. Most is boring camera stuff but a couple of items are worth knowing about.

Just how do websites track or monitor our activity?

Many people are concerned about website tracking and monitoring. While it’s not something most need to be concerned about, it can get quite involved.

What if I just can't get installation media with my new machine?

You should always get installation media with a new machine. Period. If you can’t, or it’s too late, we’ll look at one partial alternative.

How do I remove uninstalled software "leftovers"?

It’s not uncommon for uninstallers to leave behind “leftovers” after they complete. Sometimes intentional, sometimes not. How to deal with leftovers.