Articles in Category: Administration

Items related to Leo, Ask Leo! and overall website and related operations and administrivia.

If I get this particular backup device, can I then use it to restore my entire system?

Having a device on which to backup data is only half the battle. If you want it to be able to restore your entire machine, additional steps are needed.

How many failed product key attempts do I get before I have to call Microsoft to install Windows?

Your product key must be entered when you install Windows, and can be wrong as many times as you like. Activation happens separately and later.

Can I backup multiple machines to the same drive?

With multiple machines connected to a local area network, it’s often reasonable to have some of them backup over the network to a shared backup drive.

Can I upgrade Windows XP to Windows 7 by upgrading to Windows Vista first?

There’s no direct upgrade path from Windows XP to Windows 7, but upgrading to Windows Vista first works, in theory. In practice? It’s risky.

Should I buy my own DSL modem?

DSL modems are typically provided by your ISP. Most people don’t realize that you can often purchase your own … but should you?

Can a virus infect my computer's BIOS?

It is possible for a virus to be written that hides itself in certain BIOS’s. The good news is that a BIOS virus is extremely rare.

What's a BIOS?

BIOS, for Basic Input Output System, is the software already built in to you computer. It’s primary job? Load other software.

Is it possible to hack an IP address?

You cannot hack an IP address, as it’s fundamental to routing data on the internet. However, there are scenarios where IP addresses can appear the same.

Does leaving my external hard drive connected put its contents at risk from malware?

An external hard drive does run certain risks when it comes to malware, but often not the ones we think of. Avoiding malware remains the best solution.

Does using a virtual machine keep me safer?

By running a non-Windows OS within Windows using a virtual machine you can avoid some issues, but only certain types.

Why should I use a different computer to send anonymous email?

Sending truly anonymous email can be tricky, and just about any piece of semi-consistent data can be used to ID you, often including your machine name.

Does private browsing or stealth mode count as anonymous surfing?

Private Browsing modes protect your privacy on your machine, while Anonymous surfing protects your identity on the internet. They’re not related.

How can I close my deceased relative's Hotmail account?

If hackers or spammers gain access to or spoof the account of a deceased individual it can be very difficult to regain control or close the account.

Ask Leo! Stickers

By popular demand, Ask Leo! stickers are now available two different ways: Buy Leo a Latte or Buy Leo a Beer. Here’s how it works: when you buy me a beverage valued at $5 or more my assistant will send you 3 stickers in the mail. Direct Purchase: you can purchase additional stickers in my … Read more

How should I protect my computer from theft when I leave home?

Keeping your home computer safe from theft and data loss is surprisingly hard. Complete protection isn’t simple and simple protection isn’t complete.

Are computers simply too unsafe to use?

With all the attention that malware and security issues keep getting it’s easy to think that there’s no hope for safe computing. There is.

Do I want to let my browser automatically detect settings?

Browsers are often configured to automatically detect settings as a convenience for networks that use proxy servers. Most of us don’t need this.

Do I want 32-bit or 64-bit Windows?

When installing or upgrading to the latest version of Windows, one of the first decisions is 32-bit or 64-bit? I’ll look at which you should choose.

How can I tell if my computer is infected?

Sometimes it seems obvious, sometimes not, but ultimately there’s no way to prove that a computer is not infected. Best we can do is increase the odds.

Why are those "retype the word" tests so twisted, faded and blurred?

“Retype the word” or more properly CAPTCHA tests are designed to prove you’re not a computer – and that difficult to read text is part of the test.

How can I archive email that uses remote content?

HTML email can use elements fetched from remote servers at display time. If those elements are removed from the server they disappear from your email.

Why can't I get the volume louder in Windows Vista and Windows 7?

Windows has several volume controls. Add to those a couple of additional volume controls and making things louder can quickly get confusing.

Why am I getting spam with my email address but with a different name?

Spammers use many techniques to fool you into opening and acting on their messages. I’ll look at what they do to your email address.

Will not using the keyboard fool key loggers?

It sounds counter-intuitive, but avoiding your keyboard will not bypass keyloggers. I’ll look at why, and what you need to do instead.

So just how sneaky can spyware be?

Much of what we call spyware, like adware, can be relatively benign. But more and more there’s a more intrusive, damaging kind of spyware as well, better called “malware”.

Can a recovery partition be infected?

A recovery partition is often just another visible area on your hard drive, and is at risk for several types of issues including malware infections.

How do I keep my laptop safe at the airport?

Traveling with a laptop brings with it certain risks, mostly centered around loss. We’ll look at the risks and steps you can take.

What's the difference between a "quick" and a "full" scan, and which do I want?

Many anti-malware products offer both a “quick” and “full” scan. I’ll examine the common difference, and outline what I generally suggest you do.

How do I make something run automatically when I log in to Windows 7?

Windows has several mechanisms for having something start automatically when you log in. I’ll walk through one of the simplest.

Why are emailed attachments larger than the original file?

Email attachments are always larger than the original file being attached. I’ll look at why, how it works, and why it matters.

What are (and how do I get rid of) "Antivirus 2010" and "Vista Spyware 2010"?

Antivirus 2010 and similar are malware that tries to fool you into installing viruses or spyware, and then charges you for the promise of removal.

When do I actually need to run a virus scan?

There are two types of virus scans: continuous or periodic. Which and how many you need and how often they’re needed depends on your situation.

It's About Helping: Your Recommendations

Ask Leo! is looking for your recommendations for programs supporting English and Computer literacy.

Why did you tell people you weren't going to be home?

When I left on a three week vacation I did not hide the fact, and in fact mentioned it publicly in the weeks leading up to it. Was that advisable?

Why is email between Hotmail accounts lost?

I’m seeing an increase in reports of email sent but never received, often relating to Hotmail accounts. I’ll look at possible reasons.

How do I remove Windows Media Player from being the default media player?

There are lots of media players with varying capabilities, strengths and weaknesses. Even if you don’t like Windows Media Player you’ll need something.

Does my ISP really connect to the internet through only a single router?

Most ISPs and data centers take care to use a high degree of equipment redundancy to transparently handle almost any failure. Almost. Usually.

Is it worth upgrading to Windows 7?

Now that Windows 7 has been out for some time we’ll revisit the exceptionally common question: should I upgrade?

Can just opening an email download both viruses and spyware?

It’s extremely unlikely to get a virus by just looking at an email these days. The same applies to spyware.

So do I need the Windows Firewall or not?

You do need a firewall and particularly if you aren’t behind a router the Windows Firewall is one option.

What does "Notification of Limited Account Access" mean?

“Limited Account Access” is a common phrase you’ll find in many phishing scams. Occasionally, though, it’s a legitimate notification from PayPal.

What are some other popular tech newsletters?

The results of my reader survey of popular tech newsletters that you might be interested in.

How do I see what's happening on my machine's network connection?

It’s not at all uncommon for your network to be busy even if you’re not. We’ll look at why, and what you might do to investigate should you need to.

Will I need to install drivers after reinstalling Windows?

Windows comes complete with an extensive set of drivers that will get your machine running, but you may need more to enable your hardware’s features.

How do I keep MSN Messenger / Windows Live Messenger from starting up?

Windows Messenger often starts automatically because it’s been configured to. There’s another way it can show up unexpectedly as well.

Does just looking at a file leave a trail?

While simply viewing a file seems like a benign thing to do, there are many ways that the file itself or the fact that you viewed it might be recorded.

What's the difference between AppData and Application Data folders? (And why have both?)

In Windows Vista, and Windows 7, several common folders have been moved or renamed. The old names remain for compatibility (and confusion).

Can hackers see data going to and from my computer?

In some instances, it might be possible for hackers to see data going to and from one’s computer. Sometimes it matters, but sometimes it doesn’t.

Where does Outlook Express put my mail folders?

Outlook Express, Windows Mail and Windows Live Mail store your email in a user-specific location that can be difficult to locate. We’ll find it.

How do I fix this problem uninstalling Microsoft Office 2010 (Beta)?

Installing Beta software comes with real risks, including the inability to uninstall. Often there are few options unless you’ve prepared beforehand.