Articles in Category: Administration
Items related to Leo, Ask Leo! and overall website and related operations and administrivia.
Sites download information onto your hard drive to create a smooth user
experience. There is a simple action that will solve the whole problem.
Traces of malware could be left in various places on a computer after a
virus or spyware infection. First thing: don’t panic!
Android app sometimes legitimately need services from your phone. But it’s always good to use some caution in giving out permissions.
Improving data security is best done by keeping anti-malware scans up to
date, and practicing safe internet policy.
An internet connection is not required for anti-malware scans and backups,
but it is required to keep your software up-to-date.
Routers have several usernames and passwords. One is very important to
change for network security.
Bigger RAM sticks only matter if they help add up the overall total internal
RAM in a computer. Get the most you can!
Drives are getting bigger, but are they more reliable? That’s a hard
Enabling sites in NoScript is usually done on a site-by-site basis. Each
webpage is different and will need to be checked individually.
You can’t effectively block a spammer’s ID, IP address, or “from” email
address because they’ll just change it and keep sending spam. There’s only one way to battle spam.
When the Windows sticker becomes worn it is hard to read the product key.
There is software to retrieve it from the installation, but that may not
Copying text from websites shouldn’t cause a “stopped working” error. This
will take some investigation.
That’s a lot of CDs to juggle! Backing up to that many discs can easily fail
from the mechanics of handling those CDs, or from using backup software that
An Ethernet card to connect an older computer to DSL needs the right
connectors. You may be able to find one secondhand.
A screen suddenly scrolling on a new laptop sounds like a touchpad problem.
There is an easy way to test for that.
Clicking email links will open the default email program on a computer. That
can be confusing if you use an online email service like Yahoo.
An external hard dive is showing full though it has a small number of
visible files. First we’ll look for hidden files.
Preventing neighbors from accessing a WiFi hotspot with a posted password
will be a little tricky. There is one solution that many motels use.
Regularly losing internet connectivity does not indicate that your router is
being hacked. Start by looking at connectivity issues.
Moving Office to a new computer is best done with the original installation
media. Other than that? You may have some problems.
Troubles emptying a camera memory card could be because the write-protect
tab is toggled, or maybe it’s time for a replacement.
Scanning for malware regularly is a good idea. Whether or not you are doing
it too much is a matter of opinion. What matters is that you are doing it!
Exotic characters can make strong passwords… if the password field accepts
them, and if you can type them in. There is a better way to get a stronger
Apple computer viruses do exist, just not in large numbers… yet. Don’t let
a false sense of security get you into trouble.
Program file extensions can sometimes be in conflict. You can’t change the
programs, but you can still run them both on your machine with an easy
Just looking at spam may be safe… if you know how to take the proper
You can group emails, in most email programs, by using the column headers. It
may take two clicks to get it in the order you want.
When a web page flashes and redraws, it’s usually a result of the code for
that page. There may not be much you can do about it.
TOR anonymity is because of the TOR network, not the browser – though the
browser certainly makes it easier to set up.
It’s hard to say, on a global basis, which is better: Cable or DSL. There
are going to be differences related to the number of users on the line and
distance from your ISP’s equipment.
Replacing the CPU for Windows 8 requirements could easily cause you to
replace much more than just the CPU. There may be other alternatives.
Paying someone to remove a virus may be okay depending on how you found that
person. If they found you… don’t!
Anti-virus tools won’t catch all malware, all the time – especially in
real-time visits of questionable sites.
Disk cleanup and CCleaner can both be run on your computer – but do you need
to keep them both?
If spam has increased in your Gmail account.. it’s just a fact of life. The
question is whether or not Gmail’s spam filter is catching it.
If you get a message, “Your computer is at risk,” it’s a scam. The solution
is to follow computer safety (so you know you are not at risk) and then
determine where the message comes from.
If your speakers don’t work, and you’ve checked all software settings, then
it might be a very simple, even silly, solution.
We’ll start with a thorough malware scan.
Cloud printing may allow you to print to your printer at home while traveling.
But is that really going to be trustworthy?
You don’t need a new recovery disc after each backup you make. Same is true
of those rescue discs you make when you first boot Windows.
WPA2 and MAC address filtering offer security to a home network. For ease of
use, however, WPA2 is probably enough.
A computer acting erratically after a clean install indicates a deeper
problem – perhaps static electric or hardware.
A computer locked by cyber cops means a virus is on your machine. In this
case it’s ransomware and specific steps need to be taken to free the
It’s not surprising to have an email account hack after your computer is
stolen. There are several ways the hackers could have gained access.
Anti-malware doesn’t always stop infection – especially if it is not
up-to-date. It’s all about keeping yourself safe on the
Deleting cookies will make online accounts forget who you are and cause you
to answer all your security questions again.
If you’ve lost your original product installation product key for Windows XP
you may be out of luck. There are a few work-arounds you might try
You can save Yahoo email to DVD in relatively simple steps, depending on
what part of the email you are wanting to save. The good news is that this gets you backed up!
It’s fine to turn off your router when gone, and equally fine to leave it
on. There are advantages to both.
Copy/paste vs. copy-to-folder are only two ways to move files around in
Windows. But which is better?