Articles in Category: ask-leo.com

These are articles that have been migrated from the old “ask-leo.com” site but have NOT yet been cleaned up or otherwise updated. They’re here primarily as a reference. We’ll be updating the more important and popular ones over time.

Can I create a backup image of Linux using Macrium or Acronis?

Backing up Linux computers with Windows backup programs (such as Macrium
Reflect or Acronis) is possible, but not necessarily practical.

How do I backup a website?

Backing up a website is an important step in web development. The best
method is to design locally.

Where can I best register an anonymous domain?

Registering an anonymous domain will hide your personal information from the
easily accessible public records, but it does not insure complete anonymity.

Why are there so many odd certificates listed in my browser?

Understanding certificates in your browser is tricky and deleting them not recommended. They are “by definition” supposed to be secure.

My touchpad stopped supporting multi-touch features. How do I re-enable them?

Touchpad multi-touch features are enabled through the drivers installed on
your computer. The place to go is the manufacturer’s website.

Are there problems if you put too many large files on your desktop?

Putting files on your desktop isn’t a good idea in general. While it can cause a few technical problems, there are certainly more efficient ways to organize your computer.

Can I use a USB 3 drive on a computer that supports only USB 2?

Using USB 3 on a USB 2 computer is absolutely an option! There is a lot of
compatibility built into the way USB is designed.

What’s a Good, Inexpensive VoIP Solution for People in the US to Call Me Overseas?

A good inexpensive VoIP can be hooked up in several ways to a fast internet
connection. We look at a few popular VoIP services.

What should I do first with my new computer?

First steps with a new computer would be to insure it is set up just the way
you like, and then take recovery images of the new machine.

How can I share contacts between two email accounts?

Sharing email contacts is not as easy as you might think. I’ll walk through
a few ways it might be set up.

How do I remove documents listed on the Adobe Reader menus?

Adobe Reader drop-down menus are actually a “recently viewed documents” list.
There are a few ways to update the list.

Pages I visit are being obscured by a survey; how do I fix it?

Pages obscured by a survey might be legitimate ads… or it may be a virus.
Time for a thorough scan.

Is sending an encrypted attachment a reasonable approach to email security?

Encrypted attachments in email can increase the level of security for
sensitive communications, but only if done right.

Can I prevent a machine from ever sending mail?

Blocking all email on a machine is going to be tricky. There are some other
ways to do online banking securely.

Can I determine which of my contacts gave me a virus?

Which contact gave a virus can be hard to guess unless you can follow the clues from the
email or instant message that delivered it.

Can I use a Universal Printer Driver to connect to my printers?

Universal printer drivers may or may not work. The best bet is to go to the
printer’s website and see what drivers they have available.

Microsoft Security Essentials got a bad rating. Should I switch?

The Microsoft Security Essentials rating recently released was testing the
tool in a way that ignored basic security practices. You can draw your own
conclusions.

How do ISPs control my bandwidth?

ISPs control bandwidth with very extensive routers. The equipment owned by
the ISP keeps track of exactly what data is being sent to and from your
internet connection.

What are the security ramifications of moving a file to another disk?

When data security is important, such as when file encryption vaults are used, it’s equally important to understand that something as simple as a file move might leave unexpected file remnants.

Which is better for computer longevity, turning it off when not in use, or leaving it on?

Computer longevity from turning it off or leaving it on is a question
without a real consensus of opinion. Not dropping it is really the best
plan!

How often do I need to run complete anti-malware scans?

How often you run scans for malware depends on the type of person using the
computer. You don’t want too many automatic programs running.

How can I read an epub formatted book on a Kindle?

Reading Epub books on Kindle is possible after conversion to Kindle’s MOBI
format.

Can I backup TrueCrypt volumes with my backup software?

Backing up TrueCrypt volumes should be possible with any backup software,
especially when backing up the unmounted volume.

If I upgrade to Windows 7 will restoring a backup made in XP cause problems?

Restoring an XP backup to a partition of Windows 7 running virtually on a Mac can be
complicated. One way or the other, back up everything to start!

Can I get my Windows 7 unsupported hardware to work by using Windows XP in a virtual machine?

Hardware unsupported by Windows 7 will have a hard time running in a virtual
machine. There currently is no good solution.

If I have Windows preinstalled on a machine and I get a new machine how do I move Windows to it?

Moving Windows to a new machine is (mostly) not possible unless you’ve
purchased a retail version of the operating system.

Can I take the old hard drive out of a failed laptop, put it in an enclosure and connect it to my new laptop?

Taking an old hard drive to a new computer can easily be done with a USB
hard drive enclosure. There are a few things to watch out for.

Where can I get a copy of Windows 8 to download and try?

Trying out Windows 8 does not seem to be the same as trying out Windows 7.
There is currently no link available for a trial download.

How should I protect my equipment from power outages?

Protecting equipment from power outages can be done with a large battery
called an Uninterruptible Power Supply.

Can I Network Two PCs Without Network Cards?

Networking without network cards is a reverse hack. You’ll be much more
successful in the long run using established networking equipment.

Do tablets need anti-malware software?

Anti-malware software for tablets is not needed… yet. We may see a rise in
necessity in the coming months and years.

Does "Do not track" work?

Do not track means different things to different people. Ultimately, you are
relying on the receiving server to honor this ambiguous term.

Are hibernate and standby easier on a computer than rebooting it from scratch?

Hibernate and standby vs. rebooting to start your computer is pretty much
equal. It all has a slight wear and tear on your machine’s hardware and
software.

Can magnets cause problems for external hard drives?

Magnets damaging hard drives is not something you and I need to worry about
on a day-to-day basis, as long as you are not putting bulk-erasers next to your
disks!

How long after an email account is abandoned is its email address available for a new account?

Abandoned email account addresses can be difficult to recover. It will be
quite a while before they are returned to the pool of available addresses, if
ever!

How do I stop my computer from turning itself on overnight?

Computer turning itself on at night could be the result of a faulty switch.
It might not be an easy fix mechanically although there is one easy
solution.

How do I recover my lost files and folders in email?

Recovering lost files and folders is easy if they were backed up. If not,
it’s going to be a long process and your technician will need to know all the
details about how the files were lost.

Is there a way to bulk erase emails?

Bulk erasing emails can be done in several ways depending on what type of
program you are using to read your email.

Can I transfer software from one machine to another using an external drive?

Transferring software to an external drive usually doesn’t work unless
that software is portable and does not need to be installed into the registry
to run.

Hotmail displays wrong under Safari. Is there anything I can do?

If Safari displays Hotmail pages wrong, it could be a problem with Safari
itself. There are a couple of steps to take to clear the problem.

How do I control what shows in the Windows 7 taskbar notification area?

The Windows 7 taskbar notifications area can be arranged in several ways by
right-clicking in the taskbar “Notification Area.”

Will it cause a problem if I choose a different name for my backup than that recommended by Macrium Reflect?

Changing backup file names is easy and safe to do. It’s only an identifier
for Macrium.

What’s the difference between repairing Office and reinstalling it?

Repairing Microsoft Office will usually preserve your settings. If you
uninstall and then reinstall it, you will be back to the factory default
settings.

How do I make this browser-based online game bigger?

Enlarging online games can be tricky, depending on how they were written. If
browser zoom functions don’t work, you may have to change your monitor’s
DPI.

What’s a “starter capacity” cartridge for a printer?

Starter capacity ink cartridges for many printer brands come with a
fraction of the ink available in full-sized ink cartridges. They are just for
starting.

Why can’t I burn an ISO to this blank DVD?

If you can’t burn to a blank DVD, you’ll need to narrow down exactly what’s
causing the problem. The failure may be in the media or the drive.

How can I see what websites a person has been to on my computer, even if they deny it?

Seeing what websites a person has been to is easy to view unless the person is highly
tech savvy and knows how to cover their tracks.

Is there a downside to storing files in Recycle Bin?

Storing files in the Recycle Bin is not the proper way to organize a
computer! It’s better to create a system of folders and keep them there.

Did we learn anything from the recent email scandal?

Hiding emails online in the Drafts folder does not add a layer of security.
It can still be accessed by the authorities.

Can compressing files reduce the chances of its being infected?

Compressing files for security can give you just a little bit of gain if
done with proper compression software. A better strategy is to have a good
security process in place.