Articles in Category: Instagram

There’s no 100% certain way to test a site before you visit it to determine if it is malicious or contains malware that will infect your machine.

There’s no 100% certain way to test a site before you visit it to determine if it is malicious or contains malware that will infect your machine.

https://askleo.com/8145 #askleo #Malware

Knowing that your email has been hacked can be very difficult to detect, particularly if you are not tech savvy.

Knowing that your email has been hacked can be very difficult to detect, particularly if you are not tech savvy.

https://askleo.com/7769 #askleo #hacked

Facebook account hacks happen. There are steps you need to take, not only to recover your account, but to prevent it ro being hacked again.

Facebook account hacks happen. There are steps you need to take, not only to recover your account, but to prevent it ro being hacked again.

https://askleo.com/7708 #askleo #facebook

When people think their machine is infected, I typically say, "Backup that machine." Yes, you are backing up a possible infection, but that’s actually okay.

When people think their machine is infected, I typically say, “Back up that machine.” Yes, you are backing up a possible infection, but that’s actually okay.

https://askleo.com/7440 #askleo #virus

If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anything from easy to impossible.

If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anything from easy to impossible.

https://askleo.com/42081 #askleo #deceased

Your password protects your account from unauthorized access, but it doesn't protect your email address from exposure.

Your password protects your account from unauthorized access, but it doesn’t protect your email address from exposure.

https://askleo.com/42075 #askleo #email

Hibernate and sleep are two optimizations to the boot/reboot process that can speed things up.

Hibernate and sleep are two optimizations to the boot/reboot process that can speed things up.

https://askleo.com/41519 #askleo #hibernate

Unless a password's been changed, it's difficult for a typical user to tell if their computer our account is being hacked.

Unless a password’s been changed, it’s difficult for a typical user to tell if their computer our account is being hacked.

https://askleo.com/3414 #askleo #hacked

Getting Microsoft Word documents to look the same everywhere means processing them into something else.

Getting Microsoft Word documents to look the same everywhere means processing them into something else.

https://askleo.com/2750 #askleo #Word

Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus.

Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus.

https://askleo.com/2734 #askleo #phishing

A MAC address and your IP address are both key components to networking, but they serve different purposes, and are visible in very different ways.

A MAC address and your IP address are both key components to networking, but they serve different purposes, and are visible in very different ways.

https://askleo.com/15399 #askleo #networking

Privacy and Security: There are five major areas in which your security and privacy can be both exposed and protected.

Privacy and Security: There are five major areas in which your security and privacy can be both exposed and protected.

https://askleo.com/25709 #askleo #privacy #security

Many installers include offers of additional software packages. If you don't pay attention, you could end up with software you don't need or want.

Many installers include offers of additional software packages. If you don’t pay attention, you could end up with software you don’t need or want.

Read the article: https://askleo.com/4906 #askleo #downloads

Email attachments are useful and convenient. They're also abused, dangerous, and responsible for many infections and data breaches.

Email attachments are useful and convenient. They’re also abused, dangerous, and responsible for many infections and data breaches.

https://askleo.com/18718 #askleo #attachments

Really? Do you know the difference between a megabyte, gigabyte, terabyte, and petabyte?

Really? Do you know the difference between a megabyte, gigabyte, terabyte, and petabyte?

https://askleo.com/18758 #askleo #terabyte

There are those who feel that technology is isolating us from the world. I couldn't disagree more.

There are those who feel that technology is isolating us from the world. I couldn’t disagree more.

https://askleo.com/18781 #askleo #technology

It's generally not possible to recover an older version of a web page, but we'll look at a couple of straws to grasp at.

It’s generally not possible to recover an older version of a web page, but we’ll look at a couple of straws to grasp at.

https://askleo.com/19765 #askleo #websites

Peer-to-peer file-sharing programs have a bad reputation because of the content they're often used to download. Is it legit?

Peer-to-peer file-sharing programs have a bad reputation because of the content they’re often used to download. Is it legit?

https://askleo.com/20560 #askleo #filesharing

Testing your backups is an easy step to overlook, but an important step to take. Make sure your backups will be there when you need them.

Testing your backups is an easy step to overlook, but an important step to take. Make sure your backups will be there when you need them.

https://askleo.com/20591 #askleo #backup

In a brazen scam attempt, you may get a phone call from someone claiming to be your ISP to "help" you with Windows. Don't fall for it.

In a brazen scam attempt, you may get a phone call from someone claiming to be your ISP to “help” you with Windows. Don’t fall for it.

https://askleo.com/4164 #askleo #scam

Linux is often a viable alternative to extend the life of older machines. Should you give it a try?

Linux is often a viable alternative to extend the life of older machines. Should you give it a try?

https://askleo.com/3222 #askleo #linux

Chkdsk checks your disk for errors at a low level, requiring exclusive access to the disk to do so. What happens when it can't run?

Chkdsk checks your disk for errors at a low level, requiring exclusive access to the disk to do so. What happens when it can’t run?

https://askleo.com/4507 #askleo #CHKDSK

The computer world is full of confusing acronyms like: POP - POP3 - IMAP - SMTP. What are they?

The computer world is full of confusing acronyms like: POP – POP3 – IMAP – SMTP. What are they?

https://askleo.com/2143 #askleo #email

Sophisticated targeted ads can sometimes seem creepy. Let’s explore how a few techniques work, and one I can’t explain at all.

https://askleo.com/34702 #askleo #privacy

Effective website security is difficult, and often an afterthought. Not all sites or services store passwords securely.

Effective website security is difficult, and often an afterthought. Not all sites or services store passwords securely.

https://askleo.com/34891 #askleo #passwords

You can change the "default program" to open files in the application of your choice.

You can change the “default program” to open files in the application of your choice.

https://askleo.com/19509 #askleo #default

A sudden black screen? This is most commonly a screen saver, but there are other possibilities.

“No Signal” does not come from your computer. This is your display device indicating that it has nothing to display.

https://askleo.com/4824 #askleo #monitor

A sudden black screen? This is most commonly a screen saver, but there are other possibilities.

A sudden black screen? This is most commonly a screen saver, but there are other possibilities.

https://askleo.com/2699 #askleo #screen

The nature of the email infrastructure means delays can happen for many reasons... if you get a "Delivery Status Notification (Delay)", your options are limited.

The nature of the email infrastructure means delays can happen for many reasons… if you get a “Delivery Status Notification (Delay)”, your options are limited.

https://askleo.com/21183 #askleo #email

If you send email to an invalid address or a closed account, usually you'll get a bounce back. Usually. But you cannot count on bounces.

If you send email to an invalid address or a closed account, usually you’ll get a bounce back. Usually. But you cannot count on bounces.

https://askleo.com/2870 #askleo #email

BitTorrent: You need to understand why last week's bootlegged theatrical movie release probably is illegal!

BitTorrent: You need to understand why last week’s bootlegged theatrical movie release probably is illegal!

https://askleo.com/21060 #askleo #bittorrent

How long you keep backups depends on your risk tolerance, as well as your personal back-up scheme. Let's explore some guidelines.

How long you keep backups depends on your risk tolerance, as well as your personal back-up scheme. Let’s explore some guidelines.

https://askleo.com/20977 #askleo #backup

It's easy to fix the recycle bin: just delete it, and Windows handles the rest... the registry is not involved.

It’s easy to fix the recycle bin: just delete it, and Windows handles the rest… the registry is not involved.

https://askleo.com/20874 #askleo #recyclebin

Once I've convinced you that image backups are important, your next question is mostly likely to be, "OK, How?"

Once I’ve convinced you that image backups are important, your next question is mostly likely to be, “OK, How?”

https://askleo.com/20797 #askleo #backup

Cleaning out cookies, especially if you clean out all cookies, will force you to verifying your bank log-in... again.

Cleaning out cookies, especially if you clean out all cookies, will force you to verifying your bank log-in… again.

https://askleo.com/6407 #askleo #cookies

SATA - PATA - IDE? Oh My! Different disk drive interfaces can be confusing.

SATA – PATA – IDE? Oh My! Different disk drive interfaces can be confusing.

https://askleo.com/4968 #askleo #harddrive

ISO files are typically exact copies of the data that would otherwise be placed onto a CD or DVD. So how do you use one?

ISO files are typically exact copies of the data that would otherwise be placed onto a CD or DVD. So how do you use one?

https://askleo.com/4808 #askleo #ISO

The concept seems simple: take a system image of one machine, restore it to another, and avoid lengthy setup time. Unfortunately, it’s not that simple.

https://askleo.com/4751 #askleo #backup

MAC address filtering is a technique that theoretically prevents unauthorized computers from accessing your network. I'll explain why the theory fails.

MAC address filtering is a technique that theoretically prevents unauthorized computers from accessing your network. I’ll explain why the theory fails.

https://askleo.com/4350 #askleo #MAC

Here's another example of why going digital enables backup safety that single originals can't achieve.

Here’s another example of why going digital enables backup safety that single originals can’t achieve.

https://askleo.com/40968 #askleo #backup

Online document conversion services can be safe, or they can represent a real privacy risk.

Online document conversion services can be safe, or they can represent a real privacy risk.

https://askleo.com/40614 #askleo #privacy

Many people are confused by the concept of a “Microsoft account”. There's a high likelihood you already have one.

Many people are confused by the concept of a “Microsoft account”. There’s a high likelihood you already have one.

https://askleo.com/23505 #askleo #Microsoft

I tested a Google Chromebook. On a business trip, can I do every task I need to do, where I need to do it, without major inconvenience?

I tested a Google Chromebook. On a business trip, can I do every task I need to do, where I need to do it, without major inconvenience?

https://askleo.com/27217 #askleo #chromebook

New computers often come with multiple partitions. While it's tempting to remove them, there's a little to be gained.

New computers often come with multiple partitions. While it’s tempting to remove them, there’s a little to be gained.

https://askleo.com/40562 #askleo #partitions

If your mouse and keyboard stop working, you may be able to repair the situation -- if you can overcome one huge obstacle.

If your mouse and keyboard stop working, you may be able to repair the situation — if you can overcome one huge obstacle.

https://askleo.com/39732 #askleo #keyboard

If your monitor suddenly goes black due to being out of RAM, it's likely that your computer has crashed.

If your monitor suddenly goes black due to being out of RAM, it’s likely that your computer has crashed.

https://askleo.com/39518 #askleo #crash

Losing access to your password vault can be a major inconvenience. Fortunately, that's all it needs to be, and there are ways to prevent even that.

Losing access to your password vault can be a major inconvenience. Fortunately, that’s all it needs to be, and there are ways to prevent even that.

https://askleo.com/39194 #askleo #password

So-called "problems" with your Microsoft account may refer to Windows, or to other applications on your system.

So-called “problems” with your Microsoft account may refer to Windows, or to other applications on your system.

https://askleo.com/37725 #askleo #microsoft

Protecting data on your computer is key. I'll look at three common encryption methods.

Protecting data on your computer is key. I’ll look at three common encryption methods.

https://askleo.com/37375 #askleo #encryption

One way privacy issues happen is through people’s own actions. Over-sharing on social media is the most common example.

One way privacy issues happen is through people’s own actions. Over-sharing on social media is the most common example.

https://askleo.com/22689 #askleo #privacy