How Do I Print Pictures From Websites so They Look Good?

2025-12-06 08:00:39

Trying to print a cute photo from a website and wondering why it looks fuzzy on paper? I'll explain why that happens, what you can do, and when high-quality results are possible.

You might not be able to.

by

Trying to print a cute photo from a website and wondering why it looks fuzzy on paper? I'll explain why that happens, what you can do, and when high-quality results are possible.
Different resolutions, stretched.
(Image: askleo.com)
Question: I would like to know the simplest way to print a small to medium image from a webpage and have it print out as a crisp picture to fit an 8-1/2″ by 11″ sheet.

This question has one simple and one complex answer.

The simple answer is that most of the time, you can't.

The complex answer, of course, is: it depends.

TL;DR:

Printing website pictures

Most pictures on websites are too small to print clearly. When you stretch a tiny image to fill a sheet of paper, it gets blurry. Unless the site provides a high-resolution version you can download, there's no way to make it look sharp, even with today's AI tools.

Unrealistic expectations: Enhance!

I often get frustrated watching TV crime shows because I know too much. They frequently take liberties with what is and is not technologically possible.

For example, a bunch of detectives look at a blurry photo of a car in the distance, and the person in charge directs the resident computer guru to "enhance it". Maybe even more than once. Like magic, the blurry photo of the car in the distance gets crisper and crisper, and the license plate becomes visible. The cops identify the criminal and save the day.

It doesn't work that way... at least not the magical "enhancement" they're talking about. If a picture is blurry, it's blurry. If a picture has low resolution, it has low resolution. Yes, there are "enhancements" of a sort, but they all involve trading off other aspects of the image — typically decreasing the image fidelity in order to, say, increase contrast, change colors, and the like. Sometimes those "enhancements" will reveal something; sometimes, they won't.

No enhancement will take a small, blurry image and turn it into a large, crisp one.

And that's what you're asking for.

Printing the puppy

Let's use an example.

200 pixel puppy
(Image: askleo.com)

This cute photograph is a 200-pixel-wide image. On my screen, it measures approximately two inches across, meaning that my screen is roughly 100 dots per inch, or DPI.

Now, if I want to print that picture on an 8-1/2-inch-wide paper, using eight inches as the printable area, that means the printing process will need to make that picture four times wider and four times higher.

Here's a small portion of that image when magnified four times:

200 pixel puppy eye
(Image: askleo.com)

You can see the image is already starting to get a little blurry. It's the same image as displayed above, just magnified four times.

Sadly, we're not done magnifying.

Most printers print at resolutions of at least 300 DPI, if not much higher. The net effect is that if you print an image that is less than that (say our 100 DPI image above), then the printer (or your printing software) must also magnify that image again. In our case, that's an additional factor of three times.

Puppy Eye, magnified 4 times, then 3 times
(Image: askleo.com)

Now you can really start to see the details of jpeg compression as well as the increased blurriness of the picture. Again, this is the same picture we started with. In fact, if you were to take a magnifying glass to that original on your screen, you'd likely see something similar to this magnified version.

High-fidelity puppy

The bottom line is that on-screen images rarely print in high fidelity.

There's just no getting around the fact that you're magnifying a small on-screen image and printing it on a device with higher inherent resolution.

Now, there's one exception, but it depends entirely on how the webpage was designed. And for reasons that will become clear, most webpages are not designed this way.

Here's our puppy, once again.

Puppy in high resolution
Click for larger image. (Image: askleo.com)

If you're on a slow internet connection, you may notice that this version of the picture was a little slower to display. It may also look slightly different from the same-sized image earlier in the article.

The first image in this article is a 200 Ă- 217 pixel image. This image is a 1153 Ă- 1249 pixel image, but I've instructed the webpage to display it in a 200 Ă- 217 rectangle. The browser automatically resized the very large image to fit in the tiny hole.

I've set it up so that if you click on that image, you'll see it in full resolution. Since the browser already had to download it to show you the smaller version, the larger version should display very quickly.

And this would be the exception. If a small image on a webpage is set up to use a high-resolution version downsized by the browser, then printing that image will probably use the high-resolution version, giving you a much better result.

Puppy Eye, magnified 4 times, then 3 times
(Image: askleo.com)
Puppy Eye, magnified 2 times
(Image: askleo.com)

In this case, the image still had to be enlarged to show the printed equivalent, but this time by a factor of two rather than 12.

The net result, of course, is a much sharper image when printed in a larger format.

AI has entered the arena

Since I originally wrote this article several years ago, something has changed. AI "enhancement" is now available.

First, here's our original, low-resolution image.

200 pixel puppy
(Image: askleo.com)

Now, here's that same image, this time enhanced by the AI tool Topaz Gigapixel.

Low resolution puppy AI enhanced by 6x.
Low resolution puppy AI enhanced by 6x. Click for larger image. (Screenshot: askleo.com)

It's not the same quality as the high-resolution original, but depending on the situation, it might be "better enough".

The difference is simple: rather than just stretching and smoothing pixels to take up more space1, AI examines the content of the image and attempts to enhance it in ways that correspond to that content. For example, eyes are made larger in a way that makes sense for eyes, fur (or hair) is made larger maintaining the characteristics of fur, and so on.

Sadly, even AI can't reconstruct license plate numbers that aren't visible in the low-resolution original, no matter what the cop shows show you. At best, it'll make something up that comes close in appearance but not in detail.

Podcast audio

Footnotes & References

1: A very crude definition of what it means to increase the size of a photo in a photo-editing app.

Do Complex Passwords Still Matter If You Use 2FA Everywhere?

2025-12-05 08:00:27

Do you think your passwords don’t matter because you use 2FA everywhere? I'll break down why weak passwords still put you at risk, how attackers work around 2FA, and the steps that keep your accounts safe.

Yes.

by

Do you think your passwords don't matter because you use 2FA everywhere? I'll break down why weak passwords still put you at risk, how attackers work around 2FA, and the steps that keep your accounts safe.
A warm, colorful door with two locks and corresponding keys'one labeled
(Image: Gemini)
Question: If I'm using 2FA everywhere possible, do complex passwords matter as much? Doesn't 2FA protect me against compromised passwords?

2FA (Two-Factor Authentication) adds a strong safety net, but it doesn't replace the need for good passwords. As the first factor, passwords work together with 2FA to protect you from different kinds of attacks.

TL;DR:

Password strength and two-factor authentication

Strong passwords still matter, even with 2FA. Two-factor helps block many attacks, but it can't stop everything. A weak or reused password can still be guessed, stolen, or misused in ways 2FA won't catch. Using both a strong password and 2FA gives you the most reliable protection.

Why people ask

I get it, I really do. Account security is not only overly complex, but a moving target. What was good enough a few years ago is considered "asking to be compromised" today. People are tired of juggling long, complicated passwords and hearing that they should be longer and more complicated than ever.

There's also a fallacy that two-factor means hackers just can't get in, so why bother with the other parts?

And, of course, the whole move to a promised "passwordless" future sheds doubt on the importance of passwords as we move forward.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

"Even if they know your password"

I've often said that two-factor authentication of any sort is powerful security because it protects your accounts from attack even if "they" know your password. Without your second factor, they still can't get in.

That's true whether your password is "password", "FLd*Wd2bJM%LvG7xjE$TiWB", or something in between.

So, in that sense, you're correct: 2FA protects you regardless of the strength of your password. Two-factor authentication stops someone who knows your password from signing in.

How did they get your password?

With two-factor in place, when signing in on a computer you haven't signed into before, the attacker has to provide the second factor. Presumably, they cannot, and thus you're protected.

What 2FA Does Not Protect You From

Two-factor is important, but it's not perfect. Someone who knows (or can guess) your password can still cause mischief in a number of ways.

Choosing a weaker password weakens your security against all these attacks.

Passwordless?

Password authentication is not perfect by any means, and there are moves to reduce or even eliminate passwords in various ways, including passkeys and passwordless accounts.

Passkeys are great where they are supported. Even so, you need to be able to sign in some other way (which may or may not involve a password) in order to set them up.

True passwordless accounts use other sign-in mechanisms like email confirmation, text message authentication, or something else.

Both cases are still single factors. 2FA can still be layered on top for additional security.

And, of course, it'll be a while before we get there. Passwords will be around for a long time.

Password strength still matters, even with 2FA

The whole point of two-factor authentication is to have two strong authentication mechanisms that work in tandem to secure your account. Weakening either weakens your overall security. By reducing your password complexity, you're choosing to allow your second factor to be, in effect, the single factor.

Consider this sequence:

This is also the psychology behind so-called MFA fatigue. You tire of these annoying 2FA prompts, so you just say yes to make them stop.

Done properly, strong passwords plus two-factor authentication is like having both a doorknob lock and a deadbolt on your front door. Either keeps a certain level of intruder out, but using both makes it that much harder for anyone to get in.

Podcast audio

Tip of the Day: Use Slmgr to View Your Windows License

2025-12-05 08:00:02

Slmgr.vbs is an obscure, geeky little tool for managing Windows activation from the command line.

slmgr.vbs
(Screenshot: askleo.com)

There are several ways to query Windows for activation and product key information. Some time ago, I stumbled onto another (somewhat geeky) tool included in Windows: slmgr.vbs.2

Run an administrative command prompt and then enter slmgr.vbs (followed by the Enter key). The result will be a usage pop-up similar to that shown above. It's the first in a series of pop-ups that detail the options you can specify.

Enter slmgr.vbs /dli for a summary of information about your Windows license.

slmgr.vbs showing license info.
slmgr.vbs showing license info. (Screenshot: askleo.com)

Enter slmgr.vbs /dlv for an even more complete display.

You can use slmgr.vbs to change your product key, force the activation process to run, and several other handy activation-related activities.

And in case you're wondering, ".vbs" means it's Visual Basic Script. You can examine the file (normally in C:\Windows\System32) to view the actual Visual Basic code it contains.

Footnotes & References

2: The second letter is a lowercase ˜L'.

Tip of the Day: Remember Your Password

2025-12-04 08:00:43

It seems so obvious, yet it happens every single day: people forget their passwords.

I know, I know, this sounds like the most basic of tips ever. I mean, who doesn't remember their password? That you need to remember it is so obvious!

You. Would. Be. Amazed.

I believe it's because of the different ways we try to make frequent logins easier. You can tell Windows not to require a password. You can have your browser remember passwords for you. You can tell websites to remember you. There are lots of ways to sidestep the need to enter your password over and over again.

I do it myself.

The downside is that by never entering it, you're not reinforcing your memory of that password. Eventually, you forget it.

And then one or more of the techniques you've used fails, and you need to enter it.

I won't lecture you on the best ways to remember your password. Just do something, somehow, somewhere, so that when — not if — the time comes that you need it, you have it. The consequences of not having it can be as severe as needing to reformat a machine or having to abandon an online account.

Do something safe.

But do something.

Did Microsoft Lie About Windows 10?

2025-12-04 08:00:11

Windows 11 proved the old “Windows 10 is the last version” claim wrong, but was it that claim a lie? I'll look at where it came from, what Microsoft actually said, and how headlines can twist a message.

Applies to Windows: 11, 10

The dangers in believing sound bites and clickbait.

by

Windows 11 proved the old "Windows 10 is the last version" claim wrong, but was it that claim a lie? I'll look at where it came from, what Microsoft actually said, and how headlines can twist a message.
Windows 11
(Screenshot: askleo.com)

With the end of support for Windows 10 having passed (or been extended, or something), I've heard from many people complaining, "But Microsoft said Windows 10 was the last version of Windows!", often followed by some form of "neener neener!"

In my opinion, Microsoft did not lie when "they" said, "Windows 10 will be the last version of Windows." Let me don my asbestos underwear and explain what I think happened.

TL;DR:

The last version of Windows?

No, Microsoft didn't lie about Windows 10 being "the last version." A single comment got turned into a big headline, people ran with it, and Microsoft left it all unclear. Eventually, plans changed, branding changed, and we now have Windows 11. It's a reminder not to trust catchy sound bites or get angry over something that was likely a stupid mistake.

A lie is intentional deception

For something to be a lie, the person must know it to be false. A lie is a falsehood told on purpose.

The person who said Windows 10 would be the last version of Windows would have to have known that there would someday be a version after Windows 10.

I don't believe that to be the case. I believe that wherever it came from, the person who said it believed it.

That's not a lie.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Scenario 1: It was a person, not the company

It was apparently a tech evangelist by the name of Jerry Nixon who said that Windows 10 would be the last version of Windows. It's unclear whether he was speaking for himself or the company.

Regardless, the press took it to be the company. As just one example, consider Why Microsoft is calling Windows 10 ‘the last version of Windows', published by TheVerge.com in 2015. The headline, which is quite attention-grabbing, attributes the statement to the company even though in the article it's clearly quoted as coming from Nixon.

So, it could have been just him making an attention-grabbing and quotable statement.

Not a lie. A mistake; perhaps a stupid mistake, but at worst, just a mistake.

Unfortunately, the company did not help matters.

Scenario 2: The corporate position

When questioned about the statement, Microsoft is quoted at the time as saying:

Recent comments at Ignite about Windows 10 are reflective of the way Windows will be delivered as a service bringing new innovations and updates in an ongoing manner, with continuous value for our consumer and business customers. We aren't speaking to future branding at this time, but customers can be confident Windows 10 will remain up-to-date and power a variety of devices from PCs to phones to Surface Hub to HoloLens and Xbox. We look forward to a long future of Windows innovations.

Classic corporate-speak: neither a yes nor a no. Or both.

I suspect that it was closer to the latter. They didn't want to dilute the hype they were generating about Windows 10 by admitting so soon that there might be a Windows 11.

In either case, it was a non-answer wrapped in corporate-speak, but also not a lie.

Changing your mind is not a bad thing

We live in a society where changing your mind is considered a bad thing. Politicians are regularly raked over the coals if they dare take a new position in light of new or updated information — even if changing their position is exactly the right thing to do.

The same seems to be true elsewhere as well. Make a statement, and ever afterwards, changing your mind is seen as inherently deceitful.

It's not. Changing your mind due to new information or changing times, or realizing what you said before was in error, is a good thing. John Maynard Keynes is quoted as saying, "When the facts change, I change my mind. What do you do, sir?"

Regardless of whether it was believed to be true or not, Windows 10 as the last version of Windows seemed iffy from the start. Never say never, and all that.

I'm certain there are plenty of folks at Microsoft who regret the way that statement has taken off. (Though the marketing folks no doubt loved the exposure it got them... perhaps to this day.)

Podcast audio

Tip of the Day: Show the Desktop with a Click

2025-12-03 08:00:39

Hide what you're doing or expose your desktop with a single mouse click.

Windows Desktop Corner
Windows desktop corner. (Screenshot: askleo.com)

If you look carefully at the bottom right of your Windows screen, at the far right edge of the taskbar, you'll see a narrow vertical bar that doesn't look like anything useful.

Click on it. It will hide all the active windows on your computer, exposing the desktop. Click it again, and everything is restored.

You can use this in either of two ways:

Either way, a quick move of your mouse to the lower-right corner followed by a click is a quick way to access this feature.

Bonus Tip #1

+ M is a keyboard shortcut to do the same thing.

Bonus Tip #2

Immediately clicking the lower right taskbar corner after using it to minimize everything may (sadly, may) bring all the windows back, though possibly not in the same order they were originally.

UniGetUI – Keep (Almost) All Your Apps Up to Date Automatically

2025-12-03 08:00:25

Tired of chasing updates for all your programs? This tool pulls all of them into one place and keeps them up to date for you. I'll show you how UniGetUI can save you time, reduce clutter, and make managing your apps almost effortless.

So many apps. So many updates.

by

Tired of chasing updates for all your programs? This tool pulls all of them into one place and keeps them up to date for you. I'll show you how UniGetUI can save you time, reduce clutter, and make managing your apps almost effortless.
UniGetUI webpage.
UniGetUI. (Screenshot: askleo.com)

It's common advice to keep your system and all your installed applications as up to date as possible. Windows Update takes care of Windows and many of its apps, as well as other Microsoft apps like Microsoft Office.

But what about everything else?

The reality is a mishmash of applications that install update checkers that run all the time, apps that check for updates each time you run them, apps that check for updates every so often as you run them, and, of course, apps that don't check for updates at all.

UniGetUI is a great solution for all that.

TL;DR:

Keeping your apps up to date with UniGetUI

UniGetUI makes it easy to keep almost all your apps updated in one place. Instead of juggling lots of update tools, it gathers everything into one list and updates them with a click. It runs in the background, alerts you when updates are ready, and saves you time and hassle.

Origins of UniGetUI

There's no central repository of applications for Windows. The Microsoft Store is a start, but it's nowhere near complete. You probably have applications installed from a variety of sources around the internet.

Microsoft created3 a command-line tool and infrastructure called "WinGet" to address this. It's already installed in your Windows 10 or 11 PC.

WinGet is essentially a large database of information about Windows applications, where they live, how they're versioned, and what one needs to do to install, uninstall, or update them.

Run "winget list" in a command prompt, and you'll get a list of all the apps installed on your machine that WinGet knows about (which is most, these days).

Winget list results.
Winget list results. Click for larger image. (Screenshot: askleo.com)

The problem, though, is that WinGet is a command-line tool. It works, it's handy, and it solves a needed problem, but it's a little much for the average user.

UniGetUI is, in a sense, a graphical user interface wrapper for WinGet — plus more4.

Installing UniGetUI

While UniGetUI has an official website (shown at the top of the page), it's easy to install from the Microsoft Store. Search for unigetui.

UniGetUI in the Microsoft Store.
UniGetUI in the Microsoft Store. Click for larger image. (Screenshot: askleo.com)

Click on Install, and the tool will be downloaded and installed. Click on Open to run it.

UniGetUI: Listing your installed apps

Click on the computer icon in the left-hand pane for a list of all the apps UniGetUI "knows about" that are installed on your machine.

UniGetUI listing installed applications.
UniGetUI listing installed applications. Click for larger image. (Screenshot: askleo.com)

You can scroll through this list to explore what you have. You can also right-click on any item you find for more information, as well as a few actions you can take on that item. Of course, be sure you know what will happen before making any changes. For example, uninstalling a recognized application is one thing, but uninstalling things you're not sure of could cause problems later.

As you'll see, it's a long list. It's probably the best inventory of what's installed that I've seen to date.

UniGetUI: Updating your installed apps

Click on the update icon in the left pane, and the list of applications will be filtered to those with available updates.

UniGetUI showing available updates.
UniGetUI showing available updates. Click for larger image. (Screenshot: askleo.com)

In the example above, you can see several updates are available on my machine. In this example, I could rely on each of those update mechanisms happening independently.

However, the first time you run UniGetUI, you're likely to have a long list of available updates.

Click on Update selection, and all of them will be updated immediately. The updates are run sequentially, one after the other. Some may require that you confirm a UAC prompt. When complete, your applications will be up to date.

UniGetUI, no updates found!
UniGetUI reporting that no updates were found. Click for larger image. (Screenshot: askleo.com)

UniGetUI: automation

Once installed, UniGetUI runs a small program in the background to monitor for updates.

UniGetUI icon in notification area.
UniGetUI icon in the notification area. (Screenshot: askleo.com)

Every so often, you will get a notification from UniGetUI that one or more apps have updates available. You can choose to dismiss that notification, or you can instruct it to install all available updates. You can also click on the notification icon to open the program and choose to update manually.

You may be surprised at how often software is updated. I'm an extreme case, of course; my list of applications has 273 entries on my primary computer. But even my "simple" example machine shown here has 95. It's rare that a day goes by without one or more of those applications having an available update.

It's your choice, of course: update every time, wait until a few have accumulated, or turn UniGetUI's notifications off completely and just fire it up periodically to run a manual check on your own schedule.

UniGetUI: failures

I've been running UniGetUI for several months. Shortly after I installed it, I realized that it was having difficulty with one application. The attempt to update that app would never succeed from within UniGetUI.

One of the right-click options is to have UniGetUI ignore that specific package.

UniGetUI and Discord.
Telling UniGetUI to ignore Discord. (Screenshot: askleo.com)

This particular app does a fine job of updating itself regularly, so rather than try to track down a solution, I just told UniGetUI to ignore it.

Out of the 273 items in my list, that's the only one I've had an issue with. I don't know if the issue is the program's, UniGetUI's, or if it's something about my system. As I said, I didn't bother to explore further.

Podcast audio

Footnotes & References

3: There is some controversy over the relationship to an independently developed "AppGet".

4: UniGetUI also understands a couple of other app and component repositories, but for this introduction, I'm focusing on WinGet and the applications it's aware of.

Tip of the Day: Help and More

2025-12-02 08:00:09

The Command Prompt has a number of commands and tools. One of them lists available commands and tools.

Windows Command Line Tip

Help piped into More
Results of the Help command in Command Prompt. (Screenshot: askleo.com)

Three tips in one for the Command Prompt.

The Help command

In the Windows Command Prompt, type Help followed by the Enter key. What you'll see fly by is a list of nearly 100 different commands you can use in the Command Prompt.

Some are actual stand-alone programs. For example, the second item on the list is called "ATTRIB". That corresponds to the program file C:\Windows\system32\attrib.exe. (Command Prompt commands are case-insensitive.)

Some are what are called "built in" commands — you won't find them anywhere on the machine. An example is the first on the list: "ASSOC". This command is implemented within the Command Prompt itself.

You can get help on individual commands by typing "Help" followed by the name of the command. You can even type "Help Help".

The More command

The list output generated by Help is much longer than your Command Prompt window, so much of the output gets lost as it scrolls past the top. This is a common problem in command-line programs, and there's a simple solution: the "More" program.

"More" displays input one screen at a time, pausing for a key press after each. This way, you can read the contents of one screen and then press a key (I recommend the space bar) to see the next.

You can exit the program early by pressing the Q key (or Ctrl-Break, in earlier versions of Windows).

The question, then, is how to get the output of the Help command to be the input for the More command.

Piping

Piping is exactly that: taking the output of one program and providing it as input to another. For example, in Command Prompt, type:

Help | More

where "|" is the vertical bar character, often referred to as the "pipe" character. This instructs the first program to "pipe" its output into the second. Now the list provided by Help will be displayed one screen at a time, controlled by More.

More help

Finally, you can get Help on More.

Help More

Note that there is no pipe character in that command: the word "More" was provided as a parameter to the Help command, asking it to display information about the command "More".

If that's longer than your window is tall, you can pipe that output into More so you can see it a screen at a time:

Help More | More

In English, that means running the Help program, asking for help on "More", and piping that output through the program "More" to display one screenful at a time.

Related Video

Tip of the Day: There's Nothing Special About Keyloggers

2025-12-01 08:00:48

While the impact might seem particularly scary, keyloggers aren't anything special in terms of how you deal with them.

If you'll excuse me, I need to vent a little.

THERE'S NOTHING SPECIAL ABOUT KEYLOGGERS!

I get a fairly steady stream of questions related to keyloggers. Can they be detected? Can they be bypassed? How do I remove them? How do I avoid them?

Here's the reason those questions are frustrating to me: keyloggers — and ransomware, another topic that people get worried about — are just malware: nothing more, nothing less.

Just. Malware.

That means you already know the answers to your questions. You detect any kind of malware with good anti-malware tools (though there's never a guarantee). Sometimes keyloggers can be bypassed, but sometimes not, (and you can't tell) because once on your machine, malware can do anything. And you remove keyloggers just like any other malware, using anything from anti-malware tools to a complete reinstall of your system.

Yes, keyloggers (and ransomware) sound scary, because they are. They can do a lot of damage... because they're malware.

They don't require any special steps other than those you should already be taking to protect yourself from... malware.

Thanks for indulging me. I feel better now. For a moment, anyway.

Should I Use RAID for Backup?

2025-12-01 08:00:03

RAID might sound like a clever backup shortcut, but it’s not. In fact, relying on it could make things worse. Learn what RAID does, how it helps (and doesn’t), and why it still won’t save your data when disaster, malware, or mistakes strike.

The Best of Ask Leo!

You could make things worse.

by

RAID might sound like a clever backup shortcut, but it's not. In fact, relying on it could make things worse. Learn what RAID does, how it helps (and doesn't), and why it still won't save your data when disaster, malware, or mistakes strike.
A RAID Array
(Image: canva.com)
Question: Do you think RAID 1 is a viable alternative for backing up?

No. No. No. Absolutely not.

And, by the way, NO! Smile

RAID is not backup technology and should never be considered a replacement for backing up.

I'll review what RAID is and, most importantly, what it is not.

TL;DR:

RAID and its uses

RAID — Redundant Array of Inexpensive Disks — is a technology used to increase the reliability and/or speed of hard-disk access by configuring multiple disks to act as a single disk drive. RAID is not a replacement for backing up: it does not protect against other types of hardware failure, malware (including ransomware), or user error.

RAID

RAID is an acronym for Redundant Array of Inexpensive5 Disks.

RAID technology configures multiple physical disks to act as a single disk in what are called RAID arrays.

There are several ways to arrange the disks, but they all boil down to improving one or both of two things:

To manage a RAID array, you can either use a dedicated hardware RAID controller or implement it through operating-system software.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

RAID 1 can improve reliability via mirroring

RAID 1 (which is what you're asking about) uses what's called mirroring to improve the reliability (or more correctly, the fault tolerance) of a disk drive.

The multiple drives appear as a single device. For example, you might have two one-terabyte drives, one mirrored to the other and which together appear as a single terabyte of storage. Writing data to the logical (single terabyte) drive that your operating system sees (perhaps C:) writes that data simultaneously to both physical drives linked by the RAID controller.

Should either drive fail, the other is still present and available. The RAID controller will run in single-drive mode until you replace the failed drive.

Some RAID controllers allow this to happen without powering down, keeping the logical drive available even while replacing one of its component physical drives. The system is now more tolerant of drive failure; a physical drive can fail completely, and the system can keep on running.

RAID 0 can improve speed via striping

RAID 0 uses what's called striping to improve the apparent speed of your hard disk.

Striping spreads your data across two (or more) physical hard drives. You might have two one-terabyte drives that together appear as a single drive with two terabytes of storage. Data is spread out across both drives, perhaps alternating every other sector of data across two physical drives.

This increases the apparent speed of the combined drives because while one drive is returning data, the other can be locating the next sector. Alternating between the two in this fashion, the apparent data transfer rate can theoretically be doubled.

Realistically, this has the greatest impact on traditional magnetic media hard drives, where locating the next sector involves physical and time-consuming disk head movement. SSDs don't benefit from this approach much.

You should never use RAID 0 by itself, even though I've seen machines that come with it pre-configured. It increases the impact of hard drive failure because if either of the two drives fails, the entire logical drive fails.

It is, however, a basic RAID technique you can build on.

RAID can improve speed and reliability

You can combine mirroring and striping in various ways by adding additional drives.

One common technique uses both redundancy of data across multiple drives and distribution of data across multiple drives to achieve both improved speed and fault tolerance.

Consider this equation:

A + B = Z

Let's think of A and B as our data (we can also think of them as bytes or sectors — it doesn't matter), and we'll call Z a sum of A+B.

Let's say A, B, and Z are each placed on three separate one-terabyte hard drives. The RAID controller manages these three drives to look like a single two-terabyte drive.

When you write data to the drive, A and B each get written to their separate drives. The RAID controller calculates A+B and writes that to the third drive as Z.

Why?

If any of the three drives fail, the RAID controller can recalculate whatever was on it from the remaining two.

The RAID controller allows your system to continue running while you replace the failed drive. This gets you the fault tolerance that I discussed as a characteristic of RAID 1.

Your data is spread across two drives: A and B. This allows the RAID controller to stream your data off those two drives, and doing this simultaneously gets you the speed improvement of a RAID 0 configuration. (In theory, it could spread the reading load across all three drives with different data distribution algorithms, but I'm keeping it simple for example's sake.)

Best of both worlds.

There are many ways to configure RAID arrays, but these are the fundamental concepts that apply across the board.

RAID is NOT a backup

You might be tempted to look at RAID 1 and say, "Hey, my data is on two drives. That's backed up, right?"

Nope.

Your data is on one drive: C:. Your setup might be more tolerant of a hard disk failure, and that's nice, but it's not a backup.

In general, there are two rules of thumb for backups that you can apply to any backup approach.

Relying on RAID 1 as backup violates both rules.

RAID is not portable

One of the little-considered side effects of using RAID is that you cannot just grab a drive used in a RAID array, attach it to another system, and expect to extract data from it.

While the RAID array looks like a single drive that is formatted in, say, a Windows-compatible disk format like NTFS, that rarely actually happens at the physical disk level. One way that RAID controllers do what they do — be it for speed or redundancy or both — is by using proprietary physical disk layouts. These layouts are typically unique to the specific RAID controller being used.

What that means is the only way to move a RAID array disk from one machine to another is to move the entire RAID controller and all the disks attached to it. Honestly, it's probably simpler to take an image of the logical "this looks like a single Windows disk", and restore that image to disks on the other system.

Podcast audio

Footnotes & References

5: Or "independent" disks, depending on who you ask.

6: Don't laugh — it happens more often than you think. It's even happened to me.

The Wrong Way to Change Your Email Address

2025-11-29 08:00:24

Emailing your entire contact list with a notice that you've changed your email address is NOT the way to change your email address. I'll show you what to do instead.

The easy way is the wrong way.

by

Emailing your entire contact list with a notice that you've changed your email address is NOT the way to change your email address. I'll show you what to do instead.
A cheerful but overwhelmed cartoon character at their computer as hundreds of flying paper emails burst out of the screen, addresses visible everywhere.
(Image: ChatGPT)

From time to time, I get emails like this one:

Hello everyone,
Just letting you know we have changed our email address to {email address removed}.
Our old address, {email address removed}, was compromised. Please delete it.
We will stop using our old address immediately.
Thanks, 
{name removed}
{new email address removed}

On one hand, this is an easy way to let your friends and family know that your email address has changed.

On the other hand, there are serious drawbacks to this approach. Let's review the most common and what you should do instead.

TL;DR:

Changing your email address

Emailing everyone about your new address seems easy, but you risk exposing contacts, wasting effort, and being ignored by companies and mailing lists. Instead, tell friends privately (using BCC) and change your email directly in each online account. It's slower, but it works.

Problem #1: CCing everyone

You can't see it in my example above, but the individual who sent that message included all the recipients on the CC line... all 68 of them.

Honestly, I'm surprised their email provider allowed them to do that.

Not only will the message be difficult to read in some email clients (long lists of email addresses sometimes take up a majority of the space above the message itself), but the sender exposed everyone's email address to everyone else, whether or not they were okay with that.

Email addresses are funny things. While many people think them unimportant, to others, giving out someone's email address without permission is an inconsiderate breach of privacy.

Problem #2: Using this for companies

Since I could see them all, I reviewed the list of additional recipients. I saw many email addresses for companies that this person had done business with, including major drugstore chains, bookstores, and more. That may not be information this person wanted to expose to everyone.

The good news is that companies don't pay attention to this kind of email. They don't have time to handle individual email address changes this way. They won't see the lengthy list of CC'ed email addresses.

The bad news is that companies don't pay attention to this kind of email. They don't have time to handle individual email address changes in this manner. The email was probably ignored completely. More importantly, your email address with that company will not be changed.

There could be more bad news. A less-than-honest company could pay just enough attention to harvest the email addresses from the CC line and start spamming all your friends.

But they still won't change your email address.

Problem #3: Using this for mailing lists

I got this email because this person subscribes to one or more of my mailing lists.

Once again, just sending email to the mailing list owner isn't the way to change your email address. I have perhaps a dozen different lists across three different providers. I don't even know which list that email address is on.

Somewhat ironically, several of the addresses on the CC line were "do not reply" email addresses. Sending a reply to a "do not reply" email address is pointless for obvious reasons.

The solution: Take the time to do it right

Changing your email address with all the organizations, accounts, lists, and people you communicate with takes time. That's one reason that changing an email address can be painful.

But the steps are pretty simple.

For real people

Send that email as above, but:

For online accounts

Log in to your account at each of those services and change your email address yourself.

If you no longer have access to an old email address associated with the account, or you've lost your password, look up the customer support options and follow those. Do not just send email to a random email address and expect results; you won't get any.

For mailing lists

Check the most recent email you received from that list for instructions on how to change your email address, and change your email address yourself.

If there are no instructions, find the site or service where you signed up in the first place for instructions. Only if you can't find instructions to change your email address yourself should you then look for support options relating to that mailing list to ask for help. (Here's one example.)

Podcast audio

Tip of the Day: Consider Speech Recognition and Speech-to-Text

2025-11-28 08:00:44

Speech recognition on your desktop computer or the device in your pocket can be a useful alternative to typing.

Windows 11 Voice Typing Widget
The voice typing widget in Windows 11. (Screenshot: askleo.com)

I did not play type this paragraph. Instead, I used Windows voice recognition, or Speech Recognition, to type it for me. It made exactly one mistake that I have to go back and enter fix.

The second error was mine. Smile

The ability of computers to understand the spoken word has skyrocketed in recent years. You may think of voice-enabled home assistants like Amazon Echo, but in reality, your computer and smartphone are also amazingly capable.

There are two scenarios in which I rely on speech recognition.

It's not perfect — you still need to proofread what the computer has typed for you — but I encourage you to consider exploring the options available across all your devices. It may be useful in scenarios you haven't yet thought of.

Can I Delete Pagefile.sys?

2025-11-28 08:00:11

Pagefile.sys is the paging file that contains Windows' virtual memory. You can easily remove it, but you need to understand the ramifications.

It's mysterious, hidden, and sometimes very large.

by

Pagefile.sys is the paging file that contains Windows' virtual memory. You can easily remove it, but you need to understand the ramifications.
Disk & RAM working together.
(Image: copilot.com)

Pagefile.sys is a file (along with swapfile.sys) created by Windows to manage memory usage.

It takes special steps to remove it, but it's not difficult. I have instructions.

The catch: you probably don't want to, and even if you do, it won't make much of a difference unless you're really low on RAM.

TL;DR:

pagefile.sys

Pagefile.sys is the Windows paging file used to manage virtual memory. It's used when a system is low on physical memory (RAM). Pagefile.sys can be removed, but it's best to let Windows manage it for you.

Pagefile.sys

Pagefile.sys is the Windows paging file, also known as the swap or virtual memory file. Virtual memory is disk space used by Windows when it runs out of physical memory, aka RAM.

Pagefile.sys and Swapfile.sys
Pagefile.sys and Swapfile.sys as seen in Windows File Explorer. Click for larger image. (Screenshot: askleo.com)

When programs on the computer use a lot of RAM — perhaps trying to use more than the machine has — some RAM contents are written to the paging file. If the "paged out" memory is needed again, other RAM is written to disk — again in the paging file — and the previously-written information is read back in.

It's where Windows juggles and keeps track of demands for a lot of memory.

Note that pagefile.sys is a system file. To see the file in Windows File Explorer, the option to "Show hidden files and folders" must be enabled, and "Hide protected operating system files" must be disabled.

Since the file is being used by Windows even when it's not actively paging memory, you can't just delete it. It'll either tell you "permission denied", "file in use", or something similar. Extra steps are required.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Playing with virtual memory

You may notice pagefile.sys is roughly the same size as your virtual memory settings. That's a clue.

This leads to our first way to get rid of it: set your virtual memory to zero and reboot. Once you return, Windows will no longer be using the file and will let you delete it. (You may need to use an administrative command prompt to do it.)

If you have enough RAM in your system to handle the amount of memory needed to run all the programs you use at the same time, you may not need virtual memory at all. I have lots of RAM and often run with no virtual memory configured and no pagefile.sys present on my drive.

Note, however, that pagefile.sys will return if you re-enable virtual memory.

Playing with a different operating system

The other approach to deleting pagefile.sys is less useful, but I'll include it to be complete.

Boot into another operating system and delete the file.

If you boot from a Linux "Live" USB or DVD and explore your Windows hard drive, you'll find, and should be able to delete, pagefile.sys.

However, as soon as you boot Windows, as long as you have virtual memory enabled, pagefile.sys will return.

Podcast audio

Tip of the Day: Opt Out of Backup

2025-11-27 08:00:51

Backing up is a good thing unless it's the OneDrive backup "feature". Just say no.

(Video: askleo.com)

This isn't something you'd expect me to say, but not only am I saying it, but I'm saying it LOUDLY.

OPT OUT OF ONEDRIVE BACKUP.

As you can see from the sequence above, you'll be offered this backup "feature" often, usually with no clarification of exactly what it does. (Spoiler: what it does is mess things up.)

Unless you understand what the feature truly entails — The Problem With OneDrive Backup will explain — and unless you know that this is what you want, decline. Every time, no matter how often it's offered, opt out.

How to Back Up Outlook.com Email

2025-11-27 08:00:27

Outlook.com accounts are hacked into and lost every day. Here's how to ensure you won't lose email or contacts if it happens to you.

You need a safety net.

by

Outlook.com accounts are hacked into and lost every day. Here's how to ensure you won't lose email or contacts if it happens to you.
email flowing from an Outlook.com cloud icon into a desktop PC displaying an email program
(Image: ChatGPT)
Question: How do I back up the email I have hosted on Outlook.com? Contacts, too.

Most people don't back up their online Outlook.com accounts. All their email is stored in exactly and only one place: in that account stored on Microsoft's online servers. When the account is hacked or lost for any reason, all that email disappears, often forever.

Remember: if it's only in one place, it's not backed up.

To avoid the possibility of losing everything, backing up your Outlook.com account — or any online email account — is critical.

TL;DR:

Backing up Outlook.com email

If your Outlook.com account is hacked or lost, your email and contacts can vanish forever. Use a desktop email program like Thunderbird to download your messages and export your contacts. Run it regularly so new mail is always copied safely.

How to back up Outlook.com

If your email is stored in one and only one place — Microsoft's servers — you need to make a copy in some other place.

The simplest way is to use your PC.

Using an email program running on your PC downloads your email to your PC. Keeping that email on your PC creates a second copy of your email. In fact, if you're backing up your PC regularly, as you should be, you'll be creating additional backups of the email downloaded to it.

Unfortunately, the built-in email programs (confusingly now also called "Outlook"), will no longer work, as they're more like interfaces to the online account rather than a download-to-your-computer email program.

There are many different email programs that could be used. Examples include Thunderbird, Microsoft's own Outlook (classic), eM Client, Apple Mail, and many others.

I'll show you how to back up your email using Thunderbird.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Thunderbird

Thunderbird is a free, powerful, open-source email client. I prefer Thunderbird for a variety of reasons, but it can be a little more daunting to set up. My article Back Up Your Email Using Thunderbird has fairly complete step-by-step instructions for both email and contacts.

In a nutshell, the steps are:

An outlook.com account open in Thunderbird.
My hotmail.com account, which is an outlook.com account, open in Thunderbird. Click for larger image. (Screenshot: askleo.com)

Where Thunderbird (and most other email programs) comes up short is with contacts. While Thunderbird has a perfectly fine contact management system, there's no automatic synchronization for the contacts you have stored in your online Outlook.com account.

To back up your Outlook.com contacts, you need to manually export them and save that exported file somewhere on your PC. Again, Back Up Your Email Using Thunderbird has an overview of the steps required to do so.

Caveat: Aside from a few rather obvious fields, such as name, email address, etc., there is no standardization of what's included with a "contact". As long as you're backing up with the goal of restoring to the same email service in case of a problem, you should7 be OK.

Where's my email?8

Thunderbird stores all of the information in what's called a profile. That profile is a folder on your machine containing all of your email, contacts, account configuration, and more.

Generally, you'll find your profile in a somewhat randomly named subfolder in:

C:\Users\%username%\AppData\Roaming\Thunderbird\Profiles
My example Thunderbird profile location.
My example Thunderbird profile location. Click for larger image. (Screenshot: askleo.com)

You can find out more about Thunderbird profile storage locations in this support article.

Backing up

Now that you've connected a desktop email program to your online account, there's one very important final step you need to remember.

Run the program once in a while.

If the program is never run, it'll never download your email, and your email won't be backed up. If you run the program periodically — perhaps every week, as I do — and just let it run for a while, it'll also download all the updates since the last time it was run.

In Thunderbird, specifically, you should also run File -> Offline -> Download/Sync now.

Download and Sync Now
Download and Sync Now option in Thunderbird. (Screenshot: askleo.com)

This ensures that all email from all folders will be downloaded to your computer.

That's the bare minimum, as it creates a second copy of your email on your PC. Should the online account ever go away, you'll always have your local copy.

Even better: if you regularly back up your PC, as I recommend, you'll have additional copies — backups — as part of that process.

Using your desktop email program

There's nothing wrong with actually using the desktop email program to access your email if you like. You might find it more responsive or feature-rich than the online Outlook.com interface. It can also be a nice way to have a single point of access to multiple email accounts.

The connection we've made to download your email will also upload the email you send into your Sent mail folder online.

In fact, using your desktop email program is a good way to ensure that it's run "every so often", as described above, to make sure your email gets backed up.

Podcast audio

Footnotes & References

7: I have to say "should", even here, because application and online service support for contact export and import is so fundamentally poor.

Scammers' Three Common Lies

2025-11-26 08:00:28

Scammers' favorite tricks include old lies told in new ways. I’ll show you how these scams work, how to spot them before it’s too late, and the simple steps you can take to protect yourself, your money, and even your identity.

Too many people believe the lies.

by

Scammers' favorite tricks include old lies told in new ways. I'll show you how these scams work, how to spot them before it's too late, and the simple steps you can take to protect yourself, your money, and even your identity.
A hand reaching out of a computer screen to pick up a wallet lying next to the computer's keyboard.
(Image: ChatGPT)

It's no secret that scams are rampant and that older folks (which these days includes me) are being targeted heavily.

The US Federal Trade Commission recently posted False alarm, real scam: how scammers are stealing older adults' life savings. It details some of the techniques scammers are using and steps you can take to stay safe.

I want to highlight some of what they said because too many people still aren't getting the message.

TL;DR:

Scammers lie

Scammers lie about who they are, what's going on, and how serious and urgent everything is. Their goal is to scare you into reacting quickly and without thinking so they can steal your money or information. Don't believe it. Hang up, verify through real contact info, never move money "to protect it," and always stay skeptical.

Lie #1: Someone is using your accounts

Scammers lie. According to the article:

This lie might start with someone pretending to be your bank, flagging so-called suspicious activity, or pretending to be Amazon with a message about an unauthorized purchase...

These lies are all designed to get you to react emotionally without thinking. Supposedly, something is happening to your money without your knowledge or consent.

The scam is that the contact information provided — be it via email, text message, voicemail, or any other path — leads you not to someone who can help you "fix" the issue but rather to someone who'll scam you out of your money.

It's a lie. There was no suspicious activity or unauthorized purchase to begin with.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Lie #2: Your information is being used to commit crimes

Scammers lie.

This lie may come from a supposed government officer or agent, warning that your Social Security number is linked to a crime like drug smuggling, money laundering, or even child pornography...

Once again, these lies are designed to scare you into acting inappropriately without thinking. In this case, rather than your money being at risk, it's you. The wording often threatens legal repercussions, including heavy fines or even jail time.

The scam is, once again, that the contact information provided is not to some official agency that can help you clear things up, but rather to a scammer who collects information from you and uses it to either drain your bank accounts or steal your identity, leaving you with massive debt as they open accounts and take out loans in your name.

It's a lie. There is no crime associated with your name or Social Security number.9

Lie #3: There's a security problem with your computer

Scammers lie.

This lie often starts with a fake on-screen security alert that looks like it's from Microsoft or Apple with a number to call. If you call, they say your online accounts have been hacked.

These lies are designed to leverage the complexity of computers and your lack of knowledge about how things work under the hood.

As with the preceding lies, the contact information you're given leads not to a reputable company to help you "clean things up" but to a scammer. They take your information, including your credit card number. In some cases, they offer to take remote control of your computer to help and then install malicious software.

It's a lie. These messages or phone calls do not mean there's a security issue with your computer or your accounts.

Fortunately, the FTC article includes three things you can do to keep yourself and your money safe.

Don't move money to "protect it"

Never transfer or send money to anyone, no matter who they say they are, in response to an unexpected call or message. Even if they say it's to "protect it."

Scammers can be very persuasive. They love this technique because once you "move" the money — into something suggested by the scammer, of course — it's theirs. There are scams where individuals are even convinced to purchase gold that they then hand over for "safekeeping" to someone who turns out to be a scammer.

Never. Just... never.

Hang up and verify

Hang up the phone and call the company or agency directly using a phone number or website you know is real. Don't trust what an unexpected caller says, and never use the phone number in a computer security pop-up or an unexpected text or email.

I'll emphasize that last part: never use the contact information provided by the caller. Also, never use Caller-ID information for validation or for call-back, as that can be easily spoofed. Look up the real number for the company or government agency that they claim to be from, and call that number yourself.

Oh, and if you threaten to hang up and they get angry, or they call back immediately, that's a very strong sign that something's amiss.

Do not engage.

Block unwanted calls

Learn about your call-blocking options to stop many of these scammers before they reach you.

Honestly, that statement's not strong enough for me. Yes, do look into your call-blocking options, but don't assume that's enough. Instead:

And if that voicemail leaves a callback number? If it sounds like anything we've discussed above, or you're even the least bit concerned, don't call it. If they claim to represent a company or organization, look up the number for that organization instead.

Legitimate folks don't work that way

One of the more frequently overlooked realities of these situations is that legitimate organizations don't use the techniques we discussed above.

If you get contacted via email, text message, or some other digital mechanism, that contact should:

For instance, "Please sign in to your online account for an important message from Chase" is probably legitimate. "We've detected suspicious activity on your account. Please reply to this text or call us at 1-866-###-####" is extremely suspicious, and you should not follow those instructions.

Podcast audio

Footnotes & References

8: Well, unless you really are committing crimes, but then this article isn't really for you anyway. Smile

9: The only exception I'm aware of is if you have a relationship with a specific person at your local bank. Even then, make sure they call you by name, that they sound as you expect, and that they don't object to your asking them to let you call them back.

10: Yes, there's a possibility of an in-person scam, but it's much rarer than the digital/online kind.

At ftc.gov: False alarm, real scam: how scammers are stealing older adults' life savings.

Tip of the Day: Asking for Money Is Not Demanding Money

2025-11-26 08:00:05

Just because you are asked to donate doesn't mean something isn't free.

Thunderbird Donation Request
Thunderbird donation request. Click for larger image. (Screenshot: askleo.com)

Let's clarify something.

A site asking you for a donation is not demanding that you donate.

It does not mean, for example, that the software you just downloaded isn't free. It is. Your donation is entirely optional. Free software often relies on donations to fund its efforts, but the whole point of a donation is that you get to choose whether or not to donate.

I've used the current Thunderbird donation request page that comes up after a download as my example because I've had more than one person accuse me of lying when I said Thunderbird is a free program.

It's free. Use the "x" in the upper right to close the request, or just hit the ESC key.

As I've said in other tips, pay attention to what's on the screen.

Tip of the Day: When in Doubt, Ask Someone Else

2025-11-25 08:00:00

If you're uncertain about something, the safest thing to do is ask someone else.

Security Tip

Are You Sure?
(Image: ChatGPT)

This is as much philosophy as it is technology, but it's a critical component to keeping yourself safe online and off.

If you're uncertain about something — a product, service, claim, proposal, or promise — ask someone.

But here's the key thing: don't ask the person making the offer or claim! Of course, they'll confirm what they're promising.

Ask someone else.

Depending on the situation, that could be a friend or family member, a social group (online or off), an independent support organization or service, or just about anyone who might know or have experienced the offer being made.

Here at Ask Leo!, I'm often asked for my opinion of a specific technology product or service. My answers range from "Yes, I trust and use them myself" to "I don't have direct experience, but I hear they're trustworthy" to "RUN AWAY." Smile

Sometimes, a well-timed "run away" can be the most valuable advice of all.

Tip of the Day: Trivia: How One Website Could Be Four Different Websites

2025-11-24 08:00:44

HTTPS and WWW are more complex than you might think.

OK, this is a bit of mostly-useless trivia that I want to share. In rare situations, this nuance could be abused by (very inept) malicious actors, I suppose. It's worth sharing.

Using HTTP or HTTPS can lead to two different websites.

With and without "www." can lead to two different websites.

Usually, these four URLs do take you to the same website:

But they don't have to. That they are not four separate websites is convention, not technology.

If you use any of those four possibilities for askleo.com, the fact that you eventually always land on the https://askleo.com variation is something I had to configure on the askleo.com server.

"From" Spoofing: How Spammers Send Email That Looks Like It Came From You

2025-11-24 08:00:41

Ever get an email from yourself that you didn’t send? You’ve likely been spoofed. I’ll show how spammers fake your address without touching your account at all, why it happens, and what (little) you can do about it.

The Best of Ask Leo!

Annoying you in the process.

by

Ever get an email from yourself that you didn't send? You've likely been spoofed. I'll show how spammers fake your address without touching your account at all, why it happens, and what (little) you can do about it.
From: fake
(Image: ChatGPT)
Question: OK, I know that spammers can send email spoofing the "From:" address to make it look like it came from me. But how? How do they gain access to my account to do that? Have I been hacked?

No. You have not been hacked. They don't need access to your account.

"From" spoofing means faking the "From:" address on an email to make it look like it came from you. To do it, spammers don't need access to your account at all. I'd say that 99.99% of the time it has nothing at all to do with your account, which is quite safe.

They only need your email address.

While your email account and your email address are related, they are not the same thing.

TL;DR:

From spoofing

There are several ways a spammer can impersonate your email address and use it in the "From:" line of the email they send. All they need to do is craft an email with your email address listed as the sender and send it. Your account need not be involved in any way.

Accounts versus addresses

Let me say that again: your email address is one thing, and your email account is another.

The two are related only to the extent that email routed to you using your email address is placed into the inbox accessed by your email account.

To see how spammers get away with "From" spoofing, let's look at how email is sent.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Addresses, accounts, and sending email

Let's take a quick look at how you create an account in an email program. Using "Advanced" or "Custom" setup, we get a dialog asking for a variety of information.

Add an Account in the Windows Mail program
Adding an account in the Windows Mail program. Click for larger image.

I'll focus on three key pieces of information you provide.

Very often, email programs display email addresses using both the display name and email address, with the email address in angle brackets:

From: Display name <email address>

This is used when most email programs create your email, and that's what you'll then see in the "From:" line of emails you send.

"From" Spoofing

To send email appearing to be from someone else, all you need to do is create an email account in your favorite email program, and use your own email account information while specifying someone else's email address and name.

Adding a fake From: to an account configuration
Adding a fake From: to an account configuration. Click for larger image.

Look at those same three bits of information.

Email sent using this configuration would have a spoofed "From:" address:

From: Santa Claus <santaclaus@northpole.com>

And that — or its equivalent — is exactly what spammers do.

Caveats

Before you try spoofing email from Santa Claus yourself, there are a few catches.

Spammers don't care. They use so-called botnets or zombies that act more like full-fledged mail servers than mail clients (Microsoft Office Outlook, Thunderbird, and so on). They completely bypass the need to log in by attempting to deliver email directly to the recipient's email server. It's pretty close to anonymous because spam is exceedingly difficult to trace back to its origin.

Where'd they get my email address?

So you might be asking yourself: if they didn't compromise your account, where did they get your email address?

Spammers get email addresses everywhere. Data breaches, public postings, emails forwarded by friends without removing your email address, less-than-reputable companies, some kinds of public forum postings, and more.

Basically, spammers get your email address from wherever they can, but they don't need access to your account to spoof you.

Podcast audio

Footnotes & References

11: One point of confusion I'm sidestepping is that email addresses are often used as usernames. They are still two distinct things.

Why I Cringe When I Hear People Are Using ChatGPT to Look Things Up

2025-11-22 08:00:43

AI tools like ChatGPT sound smart and sure of themselves. I’ll explain why blind trust in AI answers can be risky, how its confidence can fool you, and what simple habits will keep you from being misled while still getting the most from this amazing technology.

It's not that you use AI; it's how.

by

AI tools like ChatGPT sound smart and sure of themselves. I'll explain why blind trust in AI answers can be risky, how its confidence can fool you, and what simple habits will keep you from being misled while still getting the most from this amazing technology.
Confidently Wrong
(Image: ChatGPT)

Don't get me wrong: used properly, AI is an amazing tool. I use it myself daily for everything from idea generation to image creation to summarization and more.

I also use it for search and Q&A. Mostly. Sometimes. With a great deal of trepidation and skepticism.

When I hear people "just" use AI now in place of more traditional tools and techniques, I get worried... really worried.

TL;DR:

Using and trusting AI

AI can be a powerful tool, but it doesn't always get things right. Its confidence can fool us into trusting bad answers. Use AI to explore ideas, not as your only source of truth. Stay skeptical, double-check facts, and remember: even smart tools (and people) can be confidently wrong.

AI doesn't yet deserve your trust

When I say AI here, I'm referring to large language models (LLMs) such as ChatGPT, CoPilot, Gemini, Claude, and a host of others. They're certainly artificial, but whether they're an "intelligence" is up for debate, both technical and philosophical13.

To be clear, they don't "think". As others have pointed out they're really nothing more than glorified, immensely powerful, auto-complete. The "answers" you get from AI are nothing more than the words that are most likely to follow the words in your question. There was no thought put into it, just massive amounts of statistical analysis.

Responses from Large Language Models like ChatGPT, Claude, or Gemini are not facts.
They're predicting what words are most likely to come next in a sequence.

They can produce convincing-sounding information, but that information may not be accurate or reliable.14

Nonetheless, they're amazing. It does feel like they do a much better job of understanding15 my various statements and queries than a traditional search engine. A vague, poorly worded question that might baffle traditional search, for example, can get spot-on results from an AI.

However, understanding my question is completely different from answering it correctly.

It's easy for us to evaluate what AI gives us and recognize — even be impressed with — its ability to understand what we mean or realize that it completely misinterpreted us.

It's nowhere near as easy to evaluate the response it gives us. Unless we're already familiar with the topic at hand, we have no objective way to evaluate whether the answer is correct.

This should scare you.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Its confidence is misleading

One characteristic of AI that was identified early on was the confidence it exhibited in its answers. It was humorous: AI was known for providing very confident and very inaccurate answers.

While its accuracy has certainly improved, the unwarranted confidence remains. If anything, it's taken on a new sheen of sycophancy. It not only provides answers with authority, it does so in a way that plays to our egos. It still gives confident answers couched in terms that try to please or suck up to whoever's asking it.

Sometimes it's right. I might even say that most of the time it's right. And yet, it's still often wrong. Sometimes a little, and sometimes very, very wrong.

With its confidence and eagerness to please, it's too easy to just assume it's correct and skip any kind of verification.16

This is another reason misinformation spreads: we assume the source is correct when it's not.

Where AI Q&A is helpful

I'm not saying not to use AI for questions or in place of search. I do it myself.

But.

I use it to augment what I know, not replace it. For example, I ask AI tech questions all the time. It's not uncommon for me to just copy/paste a question I've been asked into an AI — perhaps because I couldn't understand the question and AI might, but mostly because it's a quick way to generate potential answers.

I vet those potential answers. Because this is my area of expertise, I can weed out the right from the wrong, the pragmatic from the dangerous, and what's applicable from the irrelevant. If I need to, I can take what AI has provided and refine it with more queries — often in the AI, but also in more traditional searches (often including that on my site). This process often generates issues I wouldn't have thought of or that I wouldn't have thought of as quickly.

If you're not familiar with the subject to begin with, it's terribly easy for AI to lead you astray. I've heard from too many people who've made a further mess of things simply by blindly following the (no doubt very confident) instructions provided by an AI chatbot.

Skepticism is still required

If you're going to use AI to research information and answer questions, you must — MUST — remain skeptical of the information it provides. Ignore the confidence and be skeptical of the answer.

Double-check it. Check the references if they're provided. Pit two (or more) AIs against one another and see how their answers differ.

Use a completely different technique to vet the answer you've been given. That could be your own experience, common sense, or more research into the topic at hand.

Just don't take AI-generated answers at face value unless or until you have something else that would lead you to believe that the answer is correct.

Experience over time may not help

One thing humans do is build trust over time. For example, if you've gotten an answer from me that turned out to be helpful, you're slightly more trusting of me the next time you have a question. This is how trust is built.

I'm not sure trust-growing should apply to AI.

If you get a helpful answer from AI, you're more likely to go to it with your next question. Whether or not the previous answer should influence your level of trust is complicated.

If it's in an area closely related to your original question, some additional trust might be warranted. An example might include questions about how to get Windows File Explorer to display things a certain way. It could still be wrong, but the probability is less.

If it's in a different area, then no additional trust is warranted, period. That it answered a Windows File Explorer question accurately should have no bearing on the answer it might provide about something health-related. These are two completely separate areas of information. (This concept applies to the humans you might ask these questions of as well. Ask me about Windows, but not that suspicious lump on your arm.)

Here's the problem: When is it really a different area? We don't always know.

An AI might have ingested more information on Windows File Explorer than on, say, the Windows Event Viewer, device drivers, Windows 11 versus Windows 8, or many other topics. The topics might feel related — they're all about Windows, in this case — but under the hood, they're dramatically different areas of information. Once again, that includes your human resources.

It's much too easy to extrapolate accuracy in one area into areas where that trust remains unwarranted.

This isn't really new

You'll note earlier I said, "Skepticism is still required". That's because in a very basic way, this shouldn't be new behavior for us at all.

We've long been skeptical of search engine results — even more so in recent years, as those results have been skewed by various competing interests ranging from politics to advertising to sponsorships to SEO-gaming and more.

Apply the same level of skepticism — and perhaps a skosh more — to AI.

Podcast audio

Footnotes & References

12: What does it mean to be "intelligent", anyway?

13: Via Stop Citing AI

14: Whatever "understanding" might mean.

15: My theory is that when something acts "eager to please", it's more difficult to think critically about it because of our instinct not to offend... even though there's nothing here to be offended. Just my pet theory.

Tip of the Day: Save the Installation Media

2025-11-21 08:00:56

Reinstalling Windows also means reinstalling applications. What if you can't download a fresh copy?

Applies to Windows: 11, 10, 8, 7, Vista, XP

Downloading
(Image: dollarphotoclub.com)

One of the more common and pragmatic (if somewhat painful) solutions to various PC problems is to reinstall Windows from scratch. The process often resolves a variety of errors that targeted troubleshooting will not. As daunting as it seems, it can take less time than a lengthy troubleshooting process.

The problem, though, is that you'll have to reinstall more than just Windows; you'll have to reinstall all of the applications you use as well.

These days, that often means downloading it again from the application vendor. That way, you've immediately got the latest version as well.

But what happens when the vendor is no longer in business, or they only offer physical media that they're asking you to pay for?

As you purchase programs and download software, save them. Save the original media if you get media, and save the download you installed for any software you acquire that way.

When the time comes to reinstall, you'll have what you want ready to go, whether the original manufacturer is around or not.

Does Whole-disk Encryption Impact Computer Performance?

2025-11-21 08:00:03

Does whole-disk encryption slow your computer? You might be surprised. The bigger risk is losing access to your data if you’re not careful with your encryption keys and backups.

Theoretically, but not practically.

by

Does whole-disk encryption slow your computer? You might be surprised. The bigger risk is losing access to your data if you're not careful with your encryption keys and backups.
Padlocked disk
(Image: depositphotos.com)
Question: Does whole-disk encryption only affect performance while the computer is starting, or does it have a constant effect on the computer's overall performance?

Neither... and both.

Encryption in general, and whole-disk encryption specifically, has come a long way since it was first introduced many years ago. One of the most striking changes is its impact on performance.

I'll put it this way: I would not let performance concerns hold you back from using whole-disk encryption.

TL;DR:

Whole-disk encryption speed

Whole-disk encryption barely slows modern computers. It works imperceptibly when reading or writing files, and today's fast CPUs and SSDs make any speed difference negligible. The real danger isn't speed, it's losing access. Always back up your encryption key, remember your password, and keep unencrypted backups of your files safe.

"Whole disk" is about the disk

Whole-disk encryption kicks in when things are written to or read from the disk. That means the apparent performance of your disk when encryption is at play is gauged by two things: the speed of the disk itself and the speed of your CPU.

Both have been getting significantly faster over time.

While not directly impacting encryption, the speed of disks, particularly SSDs, is impressive. In general, speed is the first thing we think of when it comes to read/write performance, whether your data is encrypted or not. You're more likely to notice the impact of a slower drive than you are to notice whether the data is being encrypted.

CPU speeds, as well as the number of CPUs available on a PC, also directly influence the performance impact of most types of encryption17. Encryption is a very complex mathematical calculation. As complex as it may be, though, today's CPUs are more than capable of handling the work without breaking a digital sweat.

In comparison to the amount of time required to get data on and off the disk — which is the same whether it's encrypted or not — the additional time it takes to encrypt or decrypt that data along the way is amazingly short.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Encryption is about disk activity

There's no specific time when whole-disk encryption has more or less impact. It happens as your computer reads and writes data to and from the encrypted disk.

Startup tends to be particularly disk-intensive; the operating system and all your startup applications and data are read from (or written to) the disk. But this is the same with or without encryption.

I also can't say that it has "constant" effect on your performance, because it's only about disk operations. If your computer is idling, there can be no impact because there's no disk activity and no encryption being performed.

More important than speed

More important than any performance impact is your ability to access the data when (not if) something goes wrong. That means:

Podcast audio

Footnotes & References

16: Sometimes the encryption happens within the drive itself, which doesn't impact your CPU at all.

17: Which is kinda the point of the encryption in the first place: someone unable to log in to your machine and not in possession of the recovery key shouldn't be able to view your data.

Should I Buy My Next Computer in Person or Online?

2025-11-20 08:00:39

Buying a new computer? Whether you click Buy Now online or walk into a local store, both have perks and pitfalls. I'll help you weigh convenience, cost, and trust so you can make the best choice for your situation and know where to turn if things go wrong.

Both have pros and cons.

by

Buying a new computer? Whether you click Buy Now online or walk into a local store, both have perks and pitfalls. I'll help you weigh convenience, cost, and trust so you can make the best choice for your situation and know where to turn if things go wrong.
Online versus In-Store
(Image: copilot.com)
Question: Which is better, purchasing a laptop computer at a brick & mortar store or online?

There is no "better", I'm afraid. Either can be great and either can be a nightmare.

It really depends on you, the resources you have available, and the specific stores — online or off — where you shop.

TL;DR:

Online or in-store?

There is no single best place to buy a computer. Online stores can offer better prices and convenience; local stores give in-person support. What matters most is trust in the seller, the brand, and the resources you have for help.

Before we start

It's important to understand the resources you have on hand already.

For example, when there's trouble with your equipment, are you on your own, or do you have someone to call? That someone could be a company, I suppose, but think about friends, family, and community support. For example, you might turn to a knowledgeable (and available) family member when things aren't working.

They might also be someone you can turn to for advice when considering your next purchase — both what you need and also which businesses to gravitate towards or avoid.

Another consideration is location. Are you able to take a computer somewhere should you need help? Again, that "somewhere" could be a local computer store, but it could also include services offered by local libraries or community/senior centers.

The more support you have in place or available to you already, the less dependent you are on getting help from the place you buy the computer.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Online

Online can be good if you:

Reputation and expectations are squishy concepts, I get that. But both are important considerations.

Purchasing from an online store you've used before with good results is different than purchasing from someone you've never heard of before. Similarly, purchasing a brand-name computer that has a good reputation online is less risky than purchasing a name you've never heard of before.

Brick and mortar

Brick and mortar can be good if you:

Many of the same concerns we consider for online purchases apply here. Once again, reputation and "having confidence" are difficult terms to nail down, but they're still important.

Any store can promise the world, but what matters is whether they'll deliver it when the time comes. That boils down to reputation.

It's all about trust

In both cases, what matters most is your trust in the company.

Your local resources can make either choice a little less risky — for example, perhaps that local senior center can help when the store you purchased from suddenly goes out of business — but there needs to be a basic level of trust regardless.

Online or off, do your research. As best you can, learn from the experiences of others. There will be bad experiences no matter where you look, but take them in context: is it just a handful of negative reviews, or the majority? How did the business handle the feedback? Does what you find look like something you'd be comfortable dealing with if need be?

Podcast audio

Tip of the Day: Always Choose Custom Install (and Then Pay Attention)

2025-11-20 08:00:12

It's easy to get more than you bargained for when installing a downloaded program. Pay attention and make explicit choices.

Install additional software
Read carefully! (Screenshot: askleo.com)

PUPs (Potentially Unwanted Programs) are nothing new. They're software that are either "offered" or occasionally just installed without your knowledge when you install something else. After installing program A — the software you wanted — you might find that an unrelated, unwanted program B has also arrived.

There are three scenarios.

  1. Early in the installation, you're given the option to choose a recommended install versus a custom installation. Always choose custom. Then carefully review the options presented as part of the custom install to make sure they reflect what you want and nothing more.
  2. Regardless of whether you're given the choice, at some point along the installation, you'll be presented with something along the lines of an "install additional software" dialog not unlike the example above. UNlike the example above, the option to install the unrelated software will be checked by default. Carefully consider whether you need or want this unrelated software, and make a choice. (In my opinion, you should almost always decline the offer by unchecking the box. This is unwanted software; there's nothing "potentially unwanted" about it at all.)
  3. The unwanted software may just get installed without asking. There's little you can do in this case other than clean up after the fact and avoid installing the original software again in the future.

The most important thing to remember is to pay attention. Make sure you've displayed all available options. Install only what you want and need, and don't let the defaults dictate what else you'll get.

Tip of the Day: Keep the Originals

2025-11-19 08:00:46

Uploading your photos causes data and quality to be lost.

Before and after aggressive resizing.
Before and after. Click for larger image. (Image: askleo.com)

Regardless of where you upload your photos or how you share them, save the original images as created by your phone or camera.

By that, I mean keep the files as they exist before you upload or share. Copy them to your computer — back them up somehow — but make sure that you save the unmodified originals.

Here's the thing: when you upload a file, it is usually modified and the original is discarded.

This can happen across photo-sharing services and social media.

I was reminded of this recently when an individual who had carefully uploaded all their photos to Google Photos discovered that when they attempted to retrieve the photos via Google Takeout, metadata they cared about had been stripped from the images.

Saving the original before storing or sharing it sidesteps the issue.

My Two New PCs

2025-11-19 08:00:11

I swapped out two old computers for a pair of tiny but mighty mini-PCs, and I’m impressed. If you’ve ever wondered whether one of these small machines could replace your bulky desktop, this peek behind my setup might surprise you.

A peek behind a geeky curtain.

by

My not-really-a-NAS PC.
My NAS wannabe. (Image: askleo.com)

I recently replaced two old and very different machines with two identical, newer computers. I've become quite enamored with them.

They're not for everyone, and some of the details I'll share might be a bit geeky to digest, but if you're about to replace a desktop computer, the upshot is that this class of PC might be worth your consideration.

TL;DR:

My two mini-PCs

I replaced two computers with small, powerful Geekom mini-PCs. One now runs my home file server; the other handles my scanners. They're fast, quiet, and take up little space. For people who browse, email, and stream, these tiny PCs could easily replace bigger desktop PCs.

Mini-PCs

Not to be confused with minicomputers, mini-PCs are just that: very small PCs. You can see an example of what I mean in the image at the top of the page: the small gold box in the center is the PC. Smaller than the monitor or keyboard, it measures roughly 4.5 inches square by 2 inches high.

They pack a surprising amount of computing capability into a small box. While they're not as expandable internally as a traditional boxy desktop PC, they include USB ports to which you can connect a plethora of additional devices, HDMI ports for display, and typically an Ethernet port and wireless hardware for connectivity as well.

They've been around for a while (Apple has them as well), but this was my first realization that they might fit my needs nicely.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

My selection

I ended up getting two mini-PCs from Geekom. Specifically, the GEEKOM A5 2025 Edition Mini PC19. While I'm not usually all about detailed specs20, they include:

There's even a headphone jack and an SD card slot.

This is a middle-to-low-end offering, but it was all I needed. I paid $329 for each.

I figured they'd easily handle the jobs I had in mind.

My NAS wannabe

The computer pictured at the top of the page is my NAS (Network Attached Storage) "wannabe". Technically, it's not a NAS, but its primary job is to connect 11 external hard disks and make them available to the other machines on my home network. So it's... Storage Attached to my Network.

The mini-PC replaced an aging HP desktop machine that had seen better days.

The old machine had been running Ubuntu Linux's server edition (meaning there's no graphical interface or GUI, only the command line). While the Geekom came with Windows 11 pre-installed, my first act was to install the latest version of Ubuntu instead, followed by the Webmin server management package. This allowed me to manage the server using its interface, and more importantly, manage it from the machine in my office rather than needing to visit the basement repeatedly.

Webmin server management interface.
Webmin server management interface. Click for larger image. (Screenshot: askleo.com)

I plugged in the external drives (most notably the SABRENT 10-Bay USB 3.2 Gen 2 SATA Docking Station — ten drives via a single USB-C connection!), configured sharing in Linux21, and my new not-an-NAS was up and running and more responsive than before. It also gave me a chance to clean up the workbench on which it lived. Smile

Scanner central

I got the second mini-PC to repurpose what I called my backup laptop, an early-generation Framework. It had been dedicated to the various scanners I have in my office. After having run the Geekom above for a couple of months, it dawned on me that another one would be a perfect fit for this role.

Scanner Central
Scanner Central. Yes, a little messier. Click for larger image. (Image: askleo.com)

That's a drawer in a cabinet behind my desk. On the table above it are three scanners:

On this mini-PC, I completed the Windows 11 install and installed assorted scanning software. I also installed Dropbox, which I use to collect the scanned images, and remote-desktop software for easier access.

Removing the laptop left me with no screen. I bought a small 11.6-inch portable monitor that connects using HDMI and is powered via USB-C. (Sometimes remote desktop just doesn't cut it, and you need a real screen.)

I was impressed

I am impressed by the capabilities of these "little" machines. They'll never replace my primary desktop machine — I need more expansion capabilities for things like higher-end graphics cards and video editing — but I can see them being perfect for more typical users.

As I said, mine are medium-to-low end, and they're still quite capable.

One aspect that amused me is that they came with a mounting plate: they could be mounted to the back of a monitor, freeing up even more desk space and simulating an all-in-one computer.

If you mainly browse, do email, stream, or work in documents, a mini-PC might give you all the power you need without the clutter.

Podcast audio

Footnotes & References

18: Most links are likely to be affiliate links.

19: I find that past a point, obsessing over specs is a waste of time and effort.

20: Still not as easy as we'd like, particularly when sharing with Windows and Mac machines, as I do. Fortunately, I had the previous machine's configuration to build on.

Tip of the Day: Have a Code Word

2025-11-18 08:00:34

You can't always believe your ears.

Who's really on the phone?
(Image: ChatGPT)

With the rise of AI, and specifically AI voice cloning, malicious individuals are running scams that work like this:

The catch is that your friend or family member was never actually involved. Somehow, a recording of their voice was cloned and used by AI to say whatever the scammers want. They're counting on you believing that this is, indeed, someone you care about and that they really do need your help.

They do not.

Since we apparently can no longer believe our ears, it's important to have another way to validate who we're talking to. The simplest? A code word.23 Set it up beforehand. Make sure it's relatively obscure but easy for you both to remember. Then, when a situation comes up that involves red flags like the one above, ask for it.

If they can't provide the code word, hang up and contact them some other way. You'll likely find that they were never in any danger.

Footnotes & References

21: In the worst case, scammers position this as your family member being threatened with physical harm.

22: I'd call it a "safe word", but that has other connotations. Smile

Tip of the Day: Mark Spam as Spam and Move On

2025-11-17 08:00:31

Spam is everywhere, whether or not we like it. Stressing out doesn't help.

I'm amazed at how worked up folks get about spam.

I get that it's a problem. I get hundreds of spam messages every day. What I see, though, are people who are so upset that they waste more time trying to fix the unfixable than they would have had they just marked it as spam and moved on.

That's today's tip. It breaks down into three parts:

Don't get upset. Don't get frustrated. Don't stress out because of all that junk mail.

It's normal, it's pervasive, and there's nothing you can do to make it stop. Everyone gets spam.

Stressing out doesn't help.

Why Don't Anti-Malware Tools Work Better?

2025-11-17 08:00:12

Ever wonder why your antivirus program didn’t catch that virus? It’s not broken. Security is a race, and the bad guys are usually ahead. Learn why security tools can’t stop everything, what that means for you, and the most important step you can take to stay safe.

The Best of Ask Leo!

It's a race.

by

Ever wonder why your antivirus program didn't catch that virus? It's not broken. Security is a race, and the bad guys are usually ahead. Learn why security tools can't stop everything, what that means for you, and the most important step you can take to stay safe.
Virus Detected sign
(Image: iStock)
Question: I've been an independent computer repair tech for over 12 years now. The question I get the most (and have the hardest time answering) is this: how come my antivirus program didn't stop me from getting this virus? When you're installing AVG, the program says that only 3% of today's security problems are caused by traditional viruses. Is this true? Is it true for the other antivirus programs as well?

In other words, why don't anti-malware tools work better? Why don't they work the way we expect them to?

I fault AVG for the phrase "traditional viruses". I think that puts an unrealistic spin on your expectations. Malware is malware, and that includes viruses, spyware, ransomware, rootkits, zombies, and gosh knows what else. What they mean by "traditional" is unknown, and I have no idea where the 3% figure comes from.

But there's a kernel of truth in AVG's statement. No matter what program you run, there's still a chance your computer will get infected.

TL;DR:

Anti-malware tools don't always stop threats because it's a race. Malware writers create new tricks every day, and security software is always catching up. Updates take time, tools vary, and sometimes users ignore warnings. The best defense is still you staying alert and making smart choices.

Security software

In the past, we categorized security software by the type of malware being targeted.

We had anti-virus programs looking for files containing data patterns matching those of known viruses. Anti-spyware tools monitored for known spyware behavior. Anti-rootkit tools specifically countered advanced techniques used by rootkits to hide files.

In recent years, the lines have become so blurred as to be meaningless. As a result, we now talk in more general terms about security software and malware.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Different vendors, different techniques

Different security software vendors use different techniques to detect malware. This is one of the biggest reasons one tool might detect malware another does not.

New malware is found daily. Almost all security programs use a database of information updated daily (or even more frequently) so they can identify the latest malware by its behavior or appearance.

Another way different tools differ is in how quickly they update their database — including the research required to identify new malware strains as well as the mechanics of updating and pushing out that new malware database. Some companies are better or faster than others.

Sometimes, new malware's behavior can't be addressed by a simple database update. The security software itself must be updated in some way. Some companies are better at effective, rapid deployment than others.

How fast vendors can address these issues varies depending on everything from the day of the week to the perceived priority of the issue at hand (not always agreed on) to the technological details of the new malware and how the security software's architecture can be changed to catch it.

It's a race, and security software is always behind

Combating malware is a four-way race.

Malware writers are always in the lead. You and me? We're dead last. Hopefully close to the pack, but even so, last.

That means it's possible to be doing security as well as you can and still get infected, if:

Dancing bunnies?

I've written about The Dancing Bunnies Problem before. People will explicitly ignore, disable, and bypass all security measures to access something they've been led to believe is particularly desirable.

If an email you get says "Download the attachment to see dancing bunnies," some percentage of users will do exactly that and more, if necessary, because they want to see dancing bunnies, dammit.

Put in more relevant terms, you can have the best anti-malware and security software that could exist, and it'll do you no good if you ignore its warnings or bypass its restrictions.

Your security software "allowed" you to get malware because you told it to against its warnings and advice. It didn't matter what security software you were running or how good it might be.

What does it all mean?

There is no single best anti-malware tool or security software.

Security tool A may catch this newly released virus today, but program B might address tomorrow's new virus more effectively. Vendors know this, so they're continually working to improve the coverage of their products.

The techniques used by program C may work with little to no impact on my system yet be a major resource hog on yours. The best vendors test across a wide variety of systems and configurations, but by definition, doing so is in direct conflict with getting important updates out as quickly as possible.

And, of course, there's still the race between malware authors and anti-malware vendors. There's always a hole in the coverage, and something might slip through.

I don't mean to imply that any of this is or even should be easy. We've seen major security vendors push out updates that have failed or even crashed some customers' machines. It should never happen, but, given the rush to get updates tested and out quickly, I'm surprised these problems don't happen more often. It's difficult to get it right 100% of the time, especially when we expect anti-malware tools not to affect the performance or functionality of our computers.

Podcast audio

I've Lost My Password Vault. What Do I Do?

2025-11-15 08:00:30

Lost your password vault? You’re not locked out forever. It's just an inconvenience. With some patience and the right steps, you can reset your accounts, rebuild your vault, and protect yourself from future mishap.

Don't panic.

by

Lost your password vault? You're not locked out forever. It's just an inconvenience. With some patience and the right steps, you can reset your accounts, rebuild your vault, and protect yourself from future mishap.
Password ... ?
(Image: adobe stock photos)
Question: Do you have a general technique for creating new passwords for every single site that needs them? Yes, I did the unthinkable, I lost my password vault account, and have to start over.

The technique is simple.

The technique is also time-consuming and ponderous.

Let's review it, and what you can do to avoid this situation in the future.

TL;DR:

Losing your vault

Losing your password vault isn't a disaster by any means. You get back into most accounts by using the "Forgot password?" link. Reset each password, save it in a new vault, and back up that vault regularly. It's slow, but it works.

You are (probably) not locked out of your accounts

I need to start by pointing out that having lost access to your password vault does not automatically lock you out of all the accounts, nor does it mean you've lost access to those accounts forever.

Those "Forgot password?" prompts on login screens exist for a reason: people forget passwords. Here, the concept is the same; you've just "forgotten" a lot of them all at once by losing access to your vault.

Whether you can easily reset your password depends on having set up account recovery information for each account. Normally, that's a side effect of having an email address associated with each, but it can be more. If there's no recovery information or it's out of date, you might not be able to use "Forgot password?" on those accounts.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Losing your passwords

I'm a firm believer in using password vaults (AKA password managers) because they enable greater security.

Using a password vault, you can easily use longer, more secure passwords that are different for every site. These two actions together increase your overall online security dramatically.

If there's a downside to using a password vault, it's that, used properly, you don't know your own passwords. This is a good thing, since strong passwords are, essentially, not memorable. But it's also a bad thing in that, should you lose access to your password vault, you lose access to all the information it contains.

Good password vaults have no way to recover your master password if you lose it. They should not be able to tell you your password because they don't know your password. They know if you type in the right password, but without knowing what it is. As a result, if you forget it, they can't recover it for you.

There's really only one recourse

If you've lost all your passwords, there's really only one thing to do: set new passwords on each account through its "I forgot my password" or equivalent account recovery link.

Each account.

One at a time.

It's painful. It's ponderous. But it'll work.

It'll take some time.

And it does require that you have recovery information set (and kept current) at each account you need to recover.

Before you start

Before you start, however, I'd recommend you set up a new account with your password vault so that as you reset all those passwords, you can:

There's also no requirement for you to reset all accounts immediately.

As you go about your day and attempt to log in to an account for which you haven't reset a password, do so. Over time, you'll rebuild the database of passwords stored in your password vault.

Prevention

It's easy to say, "Don't forget your vault password," and leave it at that. But that's oversimplistic. It also doesn't account for other things that can go wrong.

Instead, fall back on my other most common recommendation: back up.

Specifically, back up the contents of your password vault. Ideally, back it up in an unencrypted form, which you then save in some different, yet secure, way. For example, I regularly back up my password vault unencrypted and save it in a different, secure location. Should I ever lose access to my vault, I'll always have that backup from which to start over.

Podcast audio

Tip of the Day: Read What's On the Screen, PLEASE!

2025-11-14 08:00:11

Something wrong? Your computer will often tell you what to do if you take the time to read the error message.

Read The Friendly Manual!
(Image: canva.com)

If this tip sounds familiar, it's because it should: it's a repeat — something I try not to do very often with The Ask Leo! Tip of the Day.

But it keeps happening. And happening. And happening.

So I'm asking you again: Please. Read. The. Screen.

I get a surprisingly large number of questions that clearly show the questioner has not taken the time to read what their computer is telling them. It's often as simple as not paying attention to an error message that clearly (and I do mean clearly) explains what went wrong and what to do next.

Instead, they panic, get frustrated, stop, or start looking for help. It's frustrating for me, of course, because the help they need is right in front of them if they take the time to read it.

Now, not all messages or help documents are clear or easy to understand. I get that; I've built a business around it. Much of what I do is to provide missing information or translate confusing concepts.

This isn't about that.

This is about not reading clear and obvious answers or instructions right there on your computer or device's screen.

Please don't be that person. When something goes wrong, take the time to pay attention to the information your computer gives you. Contrary to popular opinion, people who write software want you to succeed, and many are good at helping you do so even when things go wrong.

But it entails reading what's on the screen. Read the Friendly Message. (Besides, the first thing a helper asks you will be, "Was there an error message? What did it say?" If reading the message doesn't help you, write it down so you can answer that inevitable question.)

(P.S.: I admit to being guilty of this at times. In my rush to get things done, it's easy to quickly dismiss errors without reading them, thinking you know what's happening. It's embarrassing when I'm wrong. So don't be like me, either. Smile )

How Do I Send an Email to Many People?

2025-11-14 08:00:08

Want to email a big group without looking like a spammer or getting blocked? I'll show you why the usual tricks don’t work well and walk you through safer, smarter ways to send group emails, from simple groups to full newsletter services.

Without looking like a spammer, that is.

by

Want to email a big group without looking like a spammer or getting blocked? I'll show you why the usual tricks don't work well and walk you through safer, smarter ways to send group emails, from simple groups to full newsletter services.
an individual yelling into a megaphone with hundreds of email envelopes spewing from the megaphone as a result
(Image: ChatGPT)
Question:

1: I have been working on figuring out how to send emails to a large group of people at a time. I have an organization, and would like to send weekly emails out to them. Right now, I have 1500 people, but am actively signing people up and expect to have several times more over the next couple of months.

2: When I travel, I send e-mails to a selection of friends (all of whom have explicitly asked to be on the list of recipients, and who presumably therefore do not mark them as spam). But my ISP sees multiple addressees and an overseas IP address, assumes spam, and prevents it from being sent. I have taken it up with them, and their attitude is "Your problem, not ours."

First, thank the spammers. đŸ' Because of them, email services — the ones you use to send as well as those used by your intended recipients — have been forced to make this more difficult than it should be.

What we might do without thinking about it too hard makes us look like spammers. Hence, our messages don't get through — either bouncing, landing in spam folders, or just disappearing entirely.

And yes, it's our problem, not the email service's.

TL;DR:

Email to many

Sending email to many people isn't as easy as it looks. Using To:, Cc:, or even Bcc: can make you look like a spammer. The safer path is using groups or newsletter services like Google Groups, Groups.io, or AWeber. Always get permission, keep promises, and make unsubscribing simple.

Don't #1: multiple recipients at once

If we want to send a single message to a group of people, it's tempting to just... send a message to a group of people. By that I mean fire up your email and list everyone in the To: or Cc: lines.

From: Ask Leo! <leo@askleo.com>
To: tom@askleoexample.com, dick@askleoexample.com, harry@askleoexample.com, 
  mary@askleoexample.com, george@askleoexample.com, josie@askleoexample.com,
  fred@askleoexample.com, marcia@askleoexample.com, maxine@askleoexample.com,
  norma@askleoexample.com
Subject: My awesome vacation pics!

Email services are more likely to treat your email as spam as a result. Why? Because it's something spammers do. My example above has only 10 recipients, but some services prevent you from sending to that many at once, and even if they do allow it, the receiving service may notice the number and toss the email in the spam bucket. The actual number may be less than 10 or more; it varies from email service to email service. I start to get concerned when the number of recipients exceeds five.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Don't #2: BCC multiple recipients

One way to sidestep the privacy issue is to use Bcc instead.

From: Ask Leo! <leo@askleo.com>
To: Leo <leo@anexampleisp.com>
Bcc: tom@askleoexample.com, dick@askleoexample.com, harry@askleoexample.com, 
mary@askleoexample.com, george@askleoexample.com, josie@askleoexample.com,
fred@askleoexample.com, marcia@askleoexample.com, maxine@askleoexample.com,
norma@askleoexample.com
Subject: My awesome vacation pics!

In this case, the email is still sent to all the recipients — you, the sender, sees and fills out the Bcc: line — but that line is hidden from all the recipients. It's better email etiquette because you're not exposing everyone's email addresses to all the recipients, which is considered both rude and a violation of everyone's privacy.

Even using Bcc:, though, two problems remain.

In short, Bcc: doesn't help when it comes to getting your email delivered, and can even hurt.

Avoid: Free email services

Sending email using a free email service puts you at a disadvantage right away. A lot of spam originates from them, and as a result, if you use one, it acts as a kind of strike against you, particularly if you're sending to a large number of people.

Things have gotten better over the years. Services have made it more difficult for spammers to create large numbers of accounts they use to spam, but it's still an issue.

I know you love your free email, and you likely rarely see any problems, but it's important to realize that there can be disadvantages, particularly for sending large quantities of email.

Painful workaround: smaller batches

One of the solutions people have suggested is to send your email in multiple, smaller batches. For example:

From: Ask Leo! <leo@askleo.com>
To: Leo <leo@anexampleisp.com>
Bcc: tom@askleoexample.com, dick@askleoexample.com, harry@askleoexample.com
Subject: My awesome vacation pics!

Followed after some delay by:

From: Ask Leo! <leo@askleo.com>
To: Leo <leo@anexampleisp.com>
Bcc: mary@askleoexample.com, george@askleoexample.com, josie@askleoexample.com
Subject: My awesome vacation pics!

And, again, followed after some delay by:

From: Ask Leo! <leo@askleo.com>
To: Leo <leo@anexampleisp.com>
Bcc: fred@askleoexample.com, marcia@askleoexample.com, maxine@askleoexample.com,
norma@askleoexample.com
Subject: My awesome vacation pics!

Rather than one email to 10 people, it's three emails sent to three or four.

Does the delay matter? Maybe. If you send several emails in rapid succession, that, too, can look like a spammer at work. Whether or not it factors in is unclear, and almost certainly varies depending on the email providers involved.

It's crude, but it can be effective. If this is something you're doing rarely, it's a solution at your disposal right now.

Effective solution: Groups

Yahoo Groups is no more, but two alternatives can be used to the same effect:

In both cases, you create a group with the email addresses of the individuals you want to get your messages. They may have to confirm that they want to receive your messages, but that's just good practice to prevent being labeled a spammer.

You can then send a single message to the group email address.

The service then sends single messages to each of the members of the group.

Because it's opt-in by the recipients, and because it's from a service with a good reputation, and because individual emails are sent one-to-one rather than one-to-many, the chances of getting delivered are significantly higher.

Google Groups is free, and Groups.io has a free plan. Both have an array of additional features you might find useful for your message, such as archives, photo storage, and more.

Advanced solution: mailing list services

The best response to the questions above is a newsletter, whether it's 1500 people getting periodic emails from an organization or a collection of friends getting periodic updates from someone traveling.

Newsletter-sending services are ideal for periodic broadcast emails to many recipients.

There are many. I'm partial to AWeber, which I've been using for Ask Leo! from the start, close to 20 years ago. MailChimp is another you've probably heard of. Even something like Substack can be used for this, assuming you don't mind your content being posted publicly.

Some rules

Regardless of the solution you eventually take, there are some important rules to follow when you start mass mailing people. Most of these are common sense, and all are important to avoid being labeled a spammer. Others are actually legal requirements, at least in the U.S.

Sending bulk email, email newsletters, hosting discussion lists, and anything that results in "messages to many people at once" requires special consideration. I encourage you to think it through and do it right.

Podcast audio

Gmail Is Removing "Check Mail From Other Accounts"

2025-11-13 08:00:23

Gmail is taking away the handy “Check mail from other accounts” feature in 2026. If you use it to manage multiple email accounts in one place (Gmail), you’ll need an alternative approach. I'll cover what’s changing, why it matters, and the options you have left before your mail disappears.

Google gives, and Google takes away.

by

Gmail is taking away the handy "Check mail from other accounts" feature in 2026. If you use it to manage multiple email accounts in one place (Gmail), you'll need an alternative approach. I'll cover what's changing, why it matters, and the options you have left before your mail disappears.
International "no" symbol over "Check mail from other accounts" option in Gmail.
(Image: askleo.com)

I've recently learned that Gmail will remove the ability to check email from external accounts.

If you don't use it, you don't care. If you do use it, I'm guessing you'll care deeply.

I fall into the latter category; for years, I've used Gmail as a one-stop collection of all my email from all my email accounts.

TL;DR:

No more 'Check mail from other accounts'

In January 2026, Google will remove Gmail's "Check mail from other accounts" feature. If you've relied on it to pull in other email, you'll need to change your habits: use webmail, switch to an email program, or perhaps use a paid service. Autoforwarding isn't an option. Plan ahead so you won't miss mail.

Google changes

Google is removing this from Gmail.
Google is removing this functionality from Gmail. (Screenshot: askleo.com)

From Learn about upcoming changes to Gmailify & POP in Gmail, starting in January 2026:

The option to "Check mail from other accounts" will no longer be available in Gmail on your computer.

Using this feature has been a popular way to access email accounts. There have been two primary reasons:

It's an approach I've recommended and used myself for years.

No more.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Alternatives to "Check mail from other accounts"

There aren't any true alternatives that I'm aware of.

I know of only two approaches to use instead of checking mail from other accounts: webmail and email programs.

Webmail

Webmail involves visiting a webpage in your web browser to access your email accounts. It sounds simple, except:

Check with your other email account provider to see which bucket your situation falls into.

Email programs

Many email programs, which are installed on and run on your computer, can gather email from multiple addresses, like Outlook (classic), Thunderbird, emClient, and others. They download your email and allow you to access multiple email account(s) through their interfaces. They usually offer programs for mobile devices as well.

If you configure the programs to access your email using IMAP, you can do both: use an email program on one or more computers as well as an email app on your mobile device.

The advantage of using an email program is that you can bring all email from all of your accounts into a single place, so you don't have to switch between browser tabs or switch between an email program and a web browser to access different accounts in different places.

You can use an email program to access your existing email account and any other accounts, including Gmail, in a single place. (You can still use the Gmail interface online for Gmail only, but it's likely to get confusing because of how Gmail uses labels and not folders.)

Online Consolidation

There are three email services I'm aware of that let you pull multiple email accounts into a single web interface online:

I don't believe these are free, at least for this functionality.

Forwarding

The most common suggestion I've received from folks who've heard of this happening is this:

Why can't we just autoforward email sent to my other email address to my "real" email address (like gmail, outlook.com, or earthlink, or, or, or-.)?

The difference is subtle but important.

Forwarding forwards everything, including spam. That makes your other account look like it's sending spam. Its reputation is affected, and the email sent from that account — including the forwards — is more likely to be filtered as spam by recipient email services or not delivered at all.

Forwarding is just not an option.

Podcast audio

Tip of the Day: RAID Disk Formats Are Proprietary

2025-11-13 08:00:03

RAID arrays are great for speed and resiliency, but those qualities come at a cost.

RAID array.
(Image: dollarphotoclub.com)

RAID (Redundant Array of Inexpensive [or Independent] Disks) is a technology that allows you to use multiple disk drives as if they were a single drive. This is typically done for either or both of two reasons.

For maximum impact, RAID systems are typically implemented in hardware called a RAID controller.

RAID controllers can write to disks in any way they see fit. They're usually optimized for the speed and redundancy goals listed above. Even though a RAID array might appear as a single disk that uses a standard disk format (such as NTFS or FAT32), the actual physical disk may not; its contents are written in a way that is unique to the RAID controller.

Therein lies a problem. I'm often asked if a disk drive taken from a RAID array can be installed into a different machine for data recovery (if, say, a RAID controller has failed). The answer is almost always no. That physical drive has data stored in non-standard, proprietary methods determined by the RAID controller.

The only way to get data off a drive used in a RAID array is with the exact same kind of controller used to write data on it in the first place.

The best way to plan for that?

You already know the answer: back up your data.

(Bonus reminder: RAID is not a backup.)

What Happens If I Don't Update to Windows 11?

2025-11-12 08:00:35

Thinking of skipping or delaying Windows 11? You can keep using Windows 10 safely, but changes are inevitable. From security updates to app support, here’s what happens if you stay put. Learn how long you can expect things to keep working before problems appear.

Applies to Windows: 11, 10

An assortment of things over time.

by

Thinking of skipping or delaying Windows 11? You can keep using Windows 10 safely, but changes are inevitable. From security updates to app support, here's what happens if you stay put. Learn how long you can expect things to keep working before problems appear.
A desktop computer with a Windows 10 screen bathed in bright morning sunlight.
(Image: ChatGPT)

Staying with Windows 10 — not updating to Windows 11 — is a valid choice. I've written about how you can keep using Windows 10 safely after support ends.

But there's more to it than that, isn't there? Over time, things will change. It's important to understand what those things are and how you need to prepare.

TL;DR:

Windows 11: What happens if you don't?

Sticking with Windows 10 is fine for now, but support is ending. Security fixes stop, some apps may drop support (TurboTax already has), and Defender updates end in 2028 (probably). Most programs will keep working for years, but slowly, more will move on. Plan ahead, and don't panic.

Now: October 2025

As I write this, the official end of support date for Windows 10 has passed. This means a few things.

However, Extended Security Updates are available, and stretch support out for a year.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

October 2026

If you sign up for the ESU program — which you should still be able to do at any time — the "end of support date" changes to October 2026.

While there's been no official word on it, ESU seems to have become a free program (as long as your computer settings are backed up to your Microsoft account), so there's little reason not to sign up for it (other than that it requires a Microsoft account). This effectively gives you another year of most types of support.

After October 2026:

I believe the termination of in-person support still applies.

Now: at least one app has moved on

At least one popular software package has announced that it will no longer support Windows 10.

TurboTax Desktop 2025 will only run on Windows 11 (64-bit). You won't be able to install or use TurboTax Desktop 2025 on Windows 10.

Alternatives include not using TurboTax or switching to their online product.

This is the only software I'm aware of now that has pulled Windows 10 support. It's unusual in that it's an abnormally quick exit.

October 2028

Microsoft has promised that Windows Defender will continue to receive database updates for three years after the original Windows 10 end of support date. While they haven't said October 2028 specifically, that's what the math works out to.

If Defender updates stop in October 2028 — and I suspect they may not — you'll need to switch to a different security package for Windows 10.

The reason I suspect Defender updates may not end at that time is that this is a path they've been down before. Even though it was never promised, Microsoft continued to provide database updates for the equivalent Windows 7 tools for many years after its end-of-support date. I expect that a technical rather than a policy issue might drive the actual switch someday. For instance, perhaps wanting to change the underlying security engine or model beyond a simple database update will mean they end Defender updates.

For now: apps keep working

TurboTax aside, the apps you have installed in Windows 10 should keep working just fine. They're typically on their own update cycle. Those that use Windows Update should continue to be updated, and of course, any tools that provide their own update mechanism will keep updating as well.

For now.

Eventually: apps drop Windows 10 support

When I say eventually, I mean over several years. Most apps will keep working just fine for a long time.

Then, slowly — and sadly, unpredictably — third-party apps may announce an end-of-support date of their own for running on Windows 10. If, when, and how you're affected depends on which apps you use and what those companies decide to do.

Don't worry about this until you find out you're affected. As I said, it'll likely be a while.

Yes, some may "pull a TurboTax" and end support for Windows 10 early, but I expect that'll be a short list.

Always: Microsoft nags

Throughout all of this, there's a good chance that Microsoft will continue to "encourage" you to move past Windows 10.

Windows 10 migration options.
Windows 10 migration options. Click for larger image. (Screenshot: askleo.com)

Depending on whether your machine is capable of running Windows 11, you may be offered the upgrade (which should be free), or you may be encouraged to purchase a new Windows-11-capable machine.

You don't need to. Dismiss the messages and carry on. When they return or new ones appear, dismiss them as well.

Podcast audio

Footnotes & References

23: There are apps that still work in Windows XP just fine.

Tip of the Day: Don't Trust AI

2025-11-12 08:00:01

AIs are great an answering questions with confidence... even when the answer is complete manure.

an ai robot in a used car lot offering a clipboard with a form on it, saying "Trust me!"
(Image: ChatGPT)

People reading this likely fall into two distinct camps:

AI is evil, and I'd never use it or trust it for a moment!

or

AI understands me and gives me answers much more easily than other methods.

While I don't agree with the former group, this tip is for those falling into the latter group.

AI does do an amazing job of understanding our questions. It is certainly better than search engines and often better than real people. When I'm having trouble understanding someone's question, I often turn to AI and ask, in effect, "What the heck is this person asking?"

AI is also very good at presenting answers with authority and confidence... even when those answers are completely wrong.

It happens often. Maybe someday it'll get better, but right now, you cannot trust AI to give you a correct answer.

Here's how to use AI answers safely.

AIs are powerful and helpful. But, particularly when you're asking a question about something with which you're not familiar, never trust it blindly.

Tip of the Day: Updates (and Reboots) on Your Schedule

2025-11-11 08:00:47

You can avoid unanticipated updates and reboots with a workaround.

(Video: askleo.com)

The transition to Windows 10 included an annoying change: the amount of control we have over updates. Specifically, the ability to choose which updates would be installed when, and when a reboot would happen, was effectively removed. There were many stories of inappropriately timed reboots with unwanted consequences.

Things have gotten better, but we still don't have the control we might want.

Here's a workaround.

  1. In the Settings app, tell Windows to pause updates for some period of time.
  2. At your convenience, periodically return to the Settings app to resume and take updates, performing any needed reboots.
  3. Pause updates again.

You must remember to do this within the timeframe that Windows allows the pause to last, or Windows will unpause itself and take updates without your consent.

But it's a process that brings updates and reboots back into your control.

Tip of the Day: Try Another Computer

2025-11-10 08:00:52

Use a different machine to help diagnose problems.

Frustrated head on laptop.
(Image: depositphotos.com)

If you're having problems with something, see if the same problems show up on a different computer. This is a useful diagnostic approach for hardware, but it applies to software as well.

With hardware like USB drives or keyboards, it's easy to take the device, plug it into a different machine, and see if the problems remain. When it comes to software problems, if the same software is available on another machine, you can see if it behaves the same way there.

This helps localize the problem. If the same problem appears everywhere, you know it's the device or software. If not, you know there's something troublesome with your specific computer or situation.

This technique is valuable enough that it makes sense to borrow a friend's machine if you only have one yourself.

Why Do System Cleanup Utilities Report So Many Errors on a Supposedly Clean System?

2025-11-10 08:00:12

Some system cleaners cry wolf, showing scary error counts to pressure you into buying. Others disagree on what counts as “dirty.” I'll unpack the scare tactics, the lack of standards, and the risks of using these utilities, plus safer ways to keep your PC running smoothly.

The Best of Ask Leo!

To quote Admiral Akbar: "It's a trap!"

by

Some system cleaners cry wolf, showing scary error counts to pressure you into buying. Others disagree on what counts as "dirty." I'll unpack the scare tactics, the lack of standards, and the risks of using these utilities, plus safer ways to keep your PC running smoothly.
Free Trial
(Image: depositphotos.com)
Question: I have a couple of good cleaning programs to protect my computer, which you've recommended. But occasionally, I get suckered into running a free trial of a program (like a registry cleaner). I may have just run my cleaner and been given a clean bill of health, but when I run the free trial, I invariably get hundreds of errors. Why?

What you're experiencing leads me and many others to avoid recommending any registry or system-cleaning utility.

It's not just a few bad apples that spoil the entire bunch; in this case, it's often difficult to find an apple worth biting into at all.

TL;DR:

Utilities that cry 'Wolf!'

The scare tactic

The most common reason a free trial reports lots of errors is simple: they want to scare you into purchasing their product to clean up what they supposedly found. (Running the scan is the only part that's free.)

I say "supposedly" because the most disreputable scanners — and there are a lot of them — aren't above lying. They report errors that don't exist. Of course, when you purchase the program, suddenly those errors are no longer there. It's not because of their exceptional error-correction technology; it's because the utility did nothing at all.

More reputable utilities, which do clean things up, are still not above overstating the risk of what they find.

For example, some may claim that having a thousand cookies is a serious performance and security risk. It's neither; cookies are nothing you need to act on. But if you buy into their rhetoric, you'll be convinced you need to purchase their product to clean them all up — which they then do.

Which brings up the second problem with these cleaners.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Differences of opinion

Ask 100 tech pundits about this topic, and you'll get 100 different opinions. Maybe more.

The same is true for the creators of system-cleaning software. Even among legitimate programs, many opinions exist about what is and is not an "error", what is worthy of cleaning, and what can be cleaned safely.

You could run one legitimate program to completion and have it report that your device is now 100% clean, and then immediately run a different legitimate program and have it report that the machine is riddled with cruft.

Which one is correct? There just isn't a formal definition of what it means for a machine to be "dirty". There are things that most people would define as dirt, but once you stray from that list, things become unclear.

Even on those items that everyone considers technically "dirt", you'll find a variety of opinions about whether there's any value in cleaning it up.

Resist

The biggest piece of advice I have is to resist the temptation to try the free trial of the latest and greatest system-cleanup utility or registry cleaner. Just don't.

At a minimum, only run tools you've heard of that are recommended by people you trust.

If you've never heard of it and the only words of support about it are from the tool's own site or advertisements, walk away.

The potential for harm — or just wasting your time and money — is just too great.

Podcast audio

How Do I Boot If All I Get Is a Blue Screen?

2025-11-08 08:00:13

A blue screen that won’t go away feels like the end, but it may not be. Learn how to boot from other media, rescue your files, and figure out if it’s Windows or hardware at fault. Most importantly, backing up now saves heartbreak later.

Let's discuss alternatives.

by

A blue screen that won't go away feels like the end, but it may not be. Learn how to boot from other media, rescue your files, and figure out if it's Windows or hardware at fault. Most importantly, backing up now saves heartbreak later.
a computer on a desk displaying a Windows BSOD blue screen of death, and a person next to it with hands on either side of their face reminiscent of the scene in the movie Home Alone.
(Image: ChatGPT)
Question: How do I stop it from booting up and then immediately going to the blue screen of death? I'm so desperate to keep it, there are so many things on there I need to have.

This question has a lot to unpack, including why a blue screen may prevent a normal boot-up to the potential for data loss.

There are techniques to deal with the former, and I have strong opinions on the latter.

TL;DR:

Blue screen boot failure

A quick workaround to being unable to boot because of a blue screen is to boot from something else, like recovery media, Windows install media, or Linux live media. If repairs fail, it may be hardware trouble. As always, backups are your lifesaver.

Possible data loss?

This caught my attention before I even started thinking about dealing with the blue screen.

"There are so many things on there that I need to have."

This tells me something critically important: you're not backing up.

If your computer were to disappear — *poof* — would you lose data? Then you're not backing up.

Computers don't magically disappear, but I can tell you for certain that hard disks (as just one example) can die in an instant without warning, causing much the same effect.

And sometimes that manifests as... you guessed it... a sudden and inexplicable blue screen of death (BSOD).

I want you to start backing up. Someday, you'll thank me.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The blue (or black) screen of death

Admittedly, I've never gotten useful information from a blue screen of death (which is being redesigned, as I understand it, into a black screen of death – still BSOD). I'm sure the information is useful to someone, somewhere, but not to me.

All it tells me is that the machine won't boot. It only got through a portion of the Windows boot process, which I suppose says something, but not much.

There's typically no getting past a BSOD.24

Boot from something else

Step one, therefore, is to boot from something else.

I can't tell you exactly how you boot from these because it varies from machine to machine. You may need to change the boot order in your BIOS/UEFI, or you may need to type a key as the boot begins to enter a boot selection screen, or something else. Check with your computer's manufacturer for instructions on exactly how to boot from something other than your computer's hard disk.

Then what?

What happens next depends on many things. Without knowing more about the computer, its history, and whether there are other symptoms, I might proceed as follows.

  1. Try a "Startup Repair" from either recovery media or Windows installation media. It could be a simple startup problem.

Failing that, and knowing you don't have a backup, at this point, I would come to a complete halt and back up the hard disk completely before proceeding further (you can typically boot from the backup software's emergency disk to perform the backup). Additional steps below could further damage the data, and we want to capture and save it before moving on.

Also, the act of attempting a backup may give us more information about what kind of failure we're looking at.

Assuming the backup works, I would continue with:

  1. A repair install of Windows from the Windows installation media.
  2. Failing that, a complete reinstall of Windows.

If that fails, we are likely looking at a hardware-related issue rather than a software fix.

Hardware failure?

Again, there's not a lot to go on, but if I seriously suspect a hardware issue, I'd take additional steps.

First, if the backup attempt failed, then, depending on the failure, this likely points to a hardware issue, possibly the disk itself. I would either seek the assistance of a local tech or even a data recovery service if the information you might lose is precious to you.

If not, my first step would be to replace the hard drive. If that doesn't resolve it, then it's technician time for sure (or, depending on the age of the machine, replacement time).

One thing I would absolutely do is remove the hard disk from the machine and place it into an external enclosure. This will give you the opportunity to run recovery tools on it using a different computer and possibly recover some of the data on it. Even if the earlier backup succeeded and the drive appears to be working, this is an easy way to gain access to the disk's contents on a different machine.

Have I mentioned backing up?

Whether you successfully recover your machine and the data on its hard drive or not, I want you to learn from this experience.

And if this isn't your experience, I want you to learn from the experience of others.

Start backing up. Do not delay. Failures like this happen, and if you're not prepared, "so many things on there that I need to have" could easily become "so many things on there that I've lost forever".

Podcast audio

Footnotes & References

24: In theory, if your machine were configured to dual-boot, you could try booting into the other operating system, but few people have or need dual-booting capability.

25: That you're apparently not using, but I had to include it for completeness for others.

26: IMPORTANT: do not click on the various "Download" buttons. Those are ads. Look specifically for a link to the ISO.

What Are Those Numbers Labeled MD5, SHA, Etc., Listed With Downloads?

2025-11-07 08:00:42

Wonder what those strange strings of numbers labelled things like MD5 or SHA mean next to a download? They’re a way to double-check that a file is safe and complete. Here’s how checksums work, why they matter, and when you might want to use them.

They're about safety.

by

Wonder what those strange strings of numbers labelled things like MD5 or SHA mean next to a download? They're a way to double-check that a file is safe and complete. Here's how checksums work, why they matter, and when you might want to use them.
Checksums for Hiren's Boot CD.
Checksums for Hiren's Boot CD. (Screenshot: askleo.com)

When you go to a download website to download a large file, you might see a series of numbers displayed alongside the download link. These are commonly referred to as checksums or hashes and allow you to confirm that the download completed successfully.

The example above for Hiren's Boot CD PE shows a link for what some would consider a fairly large download: over three gigabytes. (If you're curious, Hiren's Boot CD provides diagnostic and recovery tools that run from a bootable CD, DVD, or USB drive.) We'll use it as an example as we look at why checksums exist and how to use them.

TL;DR:

Checking checksums

Checksums like MD5 and SHA are long numbers that prove a file you downloaded is complete and unchanged. By comparing the site's published checksum with one you calculate, you can confirm the file isn't broken or tampered with. It provides extra safety for important downloads.

Fragile downloads

The use of checksums has evolved. In years past, even if a large download completed, it was not unheard of for portions to have been garbled along the way27. Running a tool to calculate the checksum on what you just downloaded and comparing it to the expected checksum allowed you to determine if you'd received everything as it should be.

These days, all you really need is patience. Depending on your internet speed, you can generally count on the download eventually completing without incident.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Malicious downloads

A more recent use for checksums is to confirm that what you downloaded is what was actually provided and not some malicious imposter. Again, calculating the checksum on what you downloaded and comparing it to what you expected told you whether you'd received what you intended to download.

It's not perfect (someone capable of placing a malicious download could potentially update the checksums to match), but there are scenarios where it still adds value. For example, on mirror sites — multiple sites that share the work of hosting downloads — the official source publishes the checksums. If a single mirror is compromised by a hacker, it can be detected when the checksums are compared.

Checksums

Checksums — or more correctly, hash values — are mathematical operations that read the entire file and generate a large number based on its contents. Even a tiny (one bit!) change in the original file results in a dramatically different number, meaning they're great for change detection. If two files generate the exact same hash, we know they're the exact same file.28

So, let's say you have downloaded this version of Hiren's Boot CD PE.

First, you right-click on the file and choose Properties so you can check the filename, "HBCD_PE_x64.iso", and the exact file size: 3,291,686,912 bytes.

Hirens Boot CD file size.
Hiren's Boot CD file size. (Screenshot: askleo.com)

Next, we calculate checksums using one or more of the listed hashing algorithms: MD5, SHA1, or SHA-256. Any will do, but I'll do all three.

While I'm sure there are plenty of third-party Windows tools you can find to do this, you don't need them. Everything you need is available in the Windows Command Prompt.

The magic command is:

certutil -hashfile <filename> <hash algorithm>

To run the MD5 hash on the file we downloaded, we would type:

certutil -hashfile HBCD_PE_x64.iso MD5

Here are the results of calculating each of the three hashes provided.

Calculated hashes.
Calculated hashes. Click for larger image. (Screenshot: askleo.com)

Compared to the checksums in the image at the top of this article, the calculated values match.

MD5 – 45baab64b088431bdf3370292e9a74b0
SHA1 – a0cdff7c5ec8b1c6dade4b5b55068cffca545318
SHA-256 – 8c4c670c9c84d6c4b5a9c32e0aa5a55d8c23de851d259207d54679ea774c2498

We got the file we expected.

Technically, SHA1 and SHA-256 are more robust and secure than MD5. In practice, though, MD5 is sufficient for simple file comparisons and is usually faster.29

If the hashes don't match

When checksums don't match, life gets interesting.

My first approach is to download the file again in case there was a problem with the download. Ideally, I might do this on another machine if I have one available.30

If the hashes still don't match, then:

Most of the time, hashes match.

Hashes are for more than downloads

Hashes are great for tracking file changes — or rather, lack of change — in general. For example, a duplicate file finder might cache hashes on files it scans so as not to need to scan them again every time you run it.

I've used hashes across machines. If I want to see if the file on machine A is exactly the same as that on machine B, there are two methods I could use:

Reading the file and calculating the hash is typically much faster than copying something across a network.

Podcast audio

Footnotes & References

27: Among other things, download protocols — the methods used to transfer files from one place to another — have improved dramatically, as has the underlying internet connection; we're not using noisy dial-up modems anymore.

28: Statistically speaking. While two different files can generate the same hash value, it is so statistically improbable as to be a non-issue.

29: The difference matters much more when hashes are used in encryption, which is another common application.

30: Bonus points if you can use a different OS, such as Linux or Mac, which includes similar tools, just to rule out any Windows-specific issues. It's unlikely, but if we're ruling things out, this is an easy one if you have another computer lying about.

Tip of the Day: Play with Windows File Explorer Views

2025-11-07 08:00:02

Windows File Explorer is surprisingly capable and flexible.

(Video: askleo.com)

Windows File Explorer is a surprisingly flexible application that provides a number of ways to look at the files on your computer.

Click on the View menu and explore.

This is an example of an interface that's best discovered by simply clicking around and experimenting. You may find that when tailored to your own needs, Windows File Explorer becomes even more useful.

Tip of the Day: Remember, It's Your Company's Equipment

2025-11-06 08:00:30

Generally, it's legal for your employer to spy on you when you use their equipment.

Spying
(Image: depositphotos.com)

In most countries, it's perfectly legal for your employer to spy on you.

When it comes to technology, that's especially important to remember. Not only does your employer set the rules you must follow when using their technology, but they also have the ability and the right to monitor how you use it. That can include (but is certainly not limited to):

If those possibilities aren't acceptable to you, you need to restrict how you use their property. If you need to do something that would break the rules, do it on your own equipment and network.

Command Prompt? Power Shell? Terminal? What's the Difference? Which Do I Want?

2025-11-06 08:00:17

Ever right-click the Start button and wonder why you sometimes see Command Prompt, other times PowerShell, or maybe something called Terminal? They look similar, but each has its own role.

The evolution of command-line interfaces.

by

Ever right-click the Start button and wonder why you sometimes see Command Prompt, other times PowerShell, or maybe something called Terminal? They look similar, but each has its own role.
Right-click the Start button, and you may see any one of these. (Image: askleo.com)

There's a very good chance you'll never need a command-line interface in Windows. However, on occasion, particularly when diagnosing or tweaking your system, there are certain things that are more easily done using one. In rare cases, a command-line interface might be the only way to accomplish some obscure tasks.

Depending on your setup, you might see one of three separate options in the alternate (right-click) Start menu:

They're all command-line interfaces, but of course, they're different. Sort of.

Let's examine what they are, what you can control, and which you might want to use.

TL;DR:

Command? PowerShell? Terminal?

Command Prompt is the old, simple command line. PowerShell is newer and more powerful, mainly for advanced users. Terminal is a wrapper that can run both, plus others, in tabs. For most folks, using Terminal with Command Prompt is enough unless you need PowerShell's extra features.

Windows Command Prompt

Occasionally, inaccurately, and somewhat fondly referred to as the "DOS box" or "MS-DOS", the Command Prompt has been in Windows since the beginning. It mimics the older MS-DOS command line interface.

Windows Command Prompt
Windows Command Prompt. (Screenshot: askleo.com)

You use it by typing in commands, like "DIR" for a directory listing, among many others, followed by the Enter key to run the command you just typed. Its syntax (or language rules) and basic commands go all the way back to MS-DOS. It's been refined quite a bit since then.

The default prompt — "C:\Users\askle>" above — indicates which folder (AKA directory) is the current folder: C:\Users\askle.

You can also run Command Prompt by clicking the Start button, searching for "CMD", and clicking on the words Command Prompt.

Running the Windows Command Prompt
Running the Windows Command Prompt. Click for larger image. (Screenshot: askleo.com)

You can also type Windows Key+R and run "cmd".

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Windows PowerShell

Windows Command Prompt is powerful, but it has limits. As a result, Microsoft created a new command-line interface called PowerShell.

Windows Powershell
Windows PowerShell. (Screenshot: askleo.com)

It's a command-line interface, just like Command Prompt, meaning you type in commands and press Enter to run them. The difference is that PowerShell is similar to, but not compatible with, Command Prompt. Some things that work in Command Prompt work differently in PowerShell, and there are many things in PowerShell that you can't do in Command Prompt at all.

PowerShell lives up to its name: power. It includes a more powerful scripting (programming) language and significantly more direct access to Windows programs, settings, and other internal aspects of the OS. It's intended to run fairly advanced system configuration, maintenance, and manipulation scripts.

The default prompt — "PS C:\Users\askle>" above — is exactly like Command Prompt's, with the addition of a leading "PS" to indicate you're in PowerShell.

You can also run PowerShell by clicking the Start button, searching for "powershell", and clicking Windows PowerShell when it appears.

Running the Windows PowerShell. Click for larger image. (Screenshot: askleo.com)
Running Windows PowerShell. Click for larger image. (Screenshot: askleo.com)

You can also type Windows Key+R and type "powershell".

Windows Terminal

Terminal wraps Windows Command Prompt and Windows PowerShell together and adds even more.

Windows Terminal
Windows Terminal. Click for larger image. (Screenshot: askleo.com)

With its tabbed interface, Terminal runs either Command Prompt, Windows PowerShell, or both, as shown above. Depending on the software you have installed, there may be additional command-line interfaces available. On my computer, that list includes the following; your computer will be different.

In Terminal's settings, you can choose which tools (Command Prompt, PowerShell, or something else) open by default when you start Terminal.

Terminal default profile setting.
Terminal default profile setting. Click for larger image. (Screenshot: askleo.com)

You can also run Terminal by clicking the Start button, searching for "terminal", and clicking Terminal when it appears.

Running the Windows Terminal. Click for larger image. (Screenshot: askleo.com)
Running Windows Terminal. Click for larger image. (Screenshot: askleo.com)

You can also type Windows Key+R and run "terminal".

Controlling what's available

In current versions of Windows 11, you'll find Terminal in your alternate Start menu. In Terminal, you can use any command-line interface.

Windows 10 defaults to the Windows Command Prompt, but there's a setting that allows you to change that to PowerShell.

Switching to Windows PowerShell in Windows 10.
Switching to Windows PowerShell in Windows 10. Click for larger image. (Screenshot: askleo.com)

You can also install the Windows Terminal app from the Microsoft Store, though this may not affect the alternate Start menu. You can run it in the other ways I described above.

What to use?

I use Terminal. Since I'm old-school, I have it open the Windows Command Prompt. It's what I'm used to, and compared to other command-line processors, it's probably the simplest.

Open the wrong one? Here's a simple trick to switch.

Each will open in the existing command line window.

Running Command Prompt from within PowerShell.
Running Command Prompt from within PowerShell. (Screenshot: askleo.com)

You may have to type "exit" twice when you're done: once for each.

To Admin or not to Admin

Whichever command-line interface appears in your Start menu is listed twice.

Terminal: regular and Admin.
Terminal: regular and Admin links. (Screenshot: askleo.com)

Without "(Admin)", the tool runs with your current privilege level. Even if your account is administrator-capable, it'll run with limited privileges. Sensitive operations may fail or prompt you with the UAC dialog.

Running the "(Admin)" version will first prompt you with the UAC dialog but run with full administrative privileges thereafter.

Which one you want depends on what you're attempting to do. Unless instructed otherwise, or if you're not sure, use the non-admin version of the tool.

Podcast audio

How What I Do Is Threatened by AI

2025-11-05 08:00:43

AI is rewriting the rules of the web, and sites like Ask Leo! are feeling the squeeze of fewer clicks, more bots, and uncertain futures. What does that mean for the content you rely on? I'll look at the challenge, the irony, the fear, and what you can do to help.

I'm not alone.

by

AI is rewriting the rules of the web, and sites like Ask Leo! are feeling the squeeze of fewer clicks, more bots, and uncertain futures. What does that mean for the content you rely on? I'll look at the challenge, the irony, the fear, and what you can do to help.
A human writer under a spotlight as an AI robot arm reaches for his work.
(Image: ChatGPT)

I have a love/hate relationship with AI. Hate might be too strong a word — let's just say I have concerns. And some of those concerns relate to whether sites like Ask Leo! will survive.

AI is an existential threat. Maybe someday for humanity, I don't know; what I do know is that the threat is real and current for websites you probably rely on for content... like answers to your technical questions.

We're losing our reason to exist.

TL;DR:

The threat of AI

AI is changing the internet. Instead of sending people to sites like Ask Leo!, search engines and chatbots give instant answers, bypassing site visits and cutting site revenue. Survival? Well, right now it means video, community, and direct support from readers. The future is very uncertain and constantly evolving.

Traffic is down

I talked about this a few months ago. The original business model of Ask Leo! (and many other sites across many different topic areas) was this:

AI summaries in search engines and AI chatbots have basically tanked that model in the last 24 months. They no longer present prominent links for people to click on, but instead present summaries and answers. People do not need to click through and visit my site.

Fewer visits mean lower ad revenue. In my case, it was bad enough that I removed all third-party advertising from the site. There was no point in continuing to annoy the folks who made it here with ads that weren't helping support the site.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Yet website hits are up

Ironically, I recently had to increase the size of the askleo.com web server31 because it was getting pounded with page requests.

Not from real visitors, of course. There are two culprits at play.

Search engine spiders. Even though they're not presenting links as much, they continue to scan the site for updated and new content. How they use that information varies based on the search engine involved. Sometimes they present links to content relevant to what people are searching for, like the old days. More often, though, they use the content they find on my and related sites to generate the summaries and answers they present.

AI spiders. There are many AIs out there right now, and they're all crawling the web, slurping up content to train their large language models or provide real-time information when people ask questions of AIs. It's the same model as search engine summaries, though more extensive and complete. And while there are often references to source material, there's little incentive for people to click through.

So, yeah, I had to get a bigger (read: more expensive) server to feed my content to the various spiders and bots that are scanning the web.

Why let them?

The most obvious question is: why let them? There are various mechanisms I could use to prevent bots from accessing the content on my site. It's one reason you're seeing more "Are you human?" tests as you navigate other sites on the web yourself.

Website owners like me face two scenarios.

It's not a great choice.

And that's why I say the fundamental model of publishing useful information online may be dying. What's my incentive (other than altruism) to keep publishing? Particularly if I have to spend still more money to keep the server from being overwhelmed by bots?

What's the incentive for anyone to continue to create useful content online?

Irony: I use AI myself

I've written about this before as well: I use AI as a tool more or less constantly. I don't have it write content for me (hence the "Written by a real human" at the top of every page), but I use it to generate eye-catching images, prompt me to dig deeper into ideas, and make generating these articles easier.

And I use AI when searching for answers myself. I try to click through to references presented (I mostly use Perplexity, which is great about including references to its source material), but I don't always. Sometimes the AI-generated answer really is all I need.

I'm not complaining that the current state of affairs is wrong, nor am I saying it's right.

It is what it is, and it's having an impact.

And that impact is going to get bigger.

AI-generated content

Here's a scary concept:

The quantity of AI-generated articles has surpassed the quantity of human-written articles being published on the web.
More Articles Are Now Created by AI Than Humans – graphite.io (an SEO/AEO company)

There are questions about whether real people see those articles and whether they show up in search engine results or are used by AI. (AI being trained on AI-generated content is another, separate, scary concept.)

The fact is, it's happening.

And as some have commented, you are currently seeing the worst AI we will have going forward. AI is only going to get better.

Does it matter where the answer comes from?

This is like my customer support position of some years ago: if someone understands my problem, and I can understand their answer, and their answer actually resolves my problem, I don't care who or where they are.

Understandability and accuracy matter. If those fail, then it's a bad customer service experience. I think we've all experienced that at one time or another.

Pragmatically, is AI different? If it gets you the answer you need, does it matter that it's AI-generated?

To be sure, there are many issues in the background. With human customer support, it's about jobs and working conditions and so on. With AI, it's about where those answers ultimately came from.

But as a user, when you need an answer, are you going to turn down the right answer because it came from someone's idea of the wrong place?

Again, I don't know.

Written content today. Tomorrow?

Honestly, what's saving Ask Leo! today is video. Every written article has a video posted on YouTube where I cover the same topic. If there's something to demonstrate, I demonstrate; otherwise, I discuss (not "narrate") the article at hand.

Including this one. By the time you read this, there'll be a video of me talking about the issue on camera.

AI will probably be able to meet or surpass the quality of much written content in the not-too-distant future. I'll keep writing, and I'll keep pointing out that I'm human, but I know it's a losing battle.

The same will happen with video someday. There's some amazing AI video being generated right now, but it's not on a par with videos created by real people discussing and demonstrating topics in the tech space. Yes, AI is being used as a tool — for example, someone whose English skills are not up to par can use AI to transform their voice into something more understandable. But it's still human-generated content.

If you see me on camera, that's me.

But I'm not sure how long that'll last. I'll say we're good for a few years while AI catches up to the current state of human how-to and Q&A video creation, but catch up it will.

I'm not sure what happens then.

The Future

I'm not the only one facing this situation. I'm not even the first. Maybe the topic of technology is a little harder for AI to replicate. We're certainly seeing AI in other spaces further down its evolutionary path than we see in tech.

Creators are responding in several different ways.

Giving up. I hope not to do this, or at least not for a very long time. But someday, the incentives and revenue we rely on are likely to disappear. I'm not sure when or what this will look like for me.

Exploring alternate presentations. This is what I'm leaning into with YouTube and my online course creation. AI's not there yet, so it's very much worth my time and investment.

Building community. This is what I see happening a lot outside the tech space. It's all about building direct access to a resource you trust. Newsletters, Substacks (and equivalent), patronage, and members-only access are all built on one-to-one relationships, bypassing all the things AI is competing on. It's why I've been a little more vocal about my own patronage options.

Something else? Many creators and entrepreneurs continue to explore different ways to do what they do in a way that competes with AI less or complements it more. I don't know what this looks like, but again, it's something I'm keeping an eye on.

It's not just about me

I've used myself as an example throughout this essay because I know my issues, and you know what I do.

I am extremely privileged that while Ask Leo! is absolutely a business with a bottom line, paying me a salary and also paying three assistants, I won't lose my home or go hungry if it goes away. (Same with my assistants, I believe.)

The same is not true for other online creators. Many are terrified to see their livelihoods threatened by the changing landscape. Some may adapt, some may figure out how to make it work, some may pivot, and others may end up giving up on a dream they've invested much of their lives in.

Podcast audio

Footnotes & References

31: Was: Intel(R) Xeon(R) 8 cores, 32GB RAM. Is now: 16 cores, 64GB RAM. All hosted at Amazon Web Services.

Tip of the Day: Keep Your Browser Up To Date

2025-11-05 08:00:29

Like your operating system, it's important to keep your internet browser as up to date as possible.

About Chrome
"About Chrome" information. Click for larger image. (Screenshot: askleo.com)

I used to think everyone's browser would be up to date because the major browsers automatically update themselves.

I was wrong. People might have an out-of-date browser, their auto-update wasn't working or available, or they just ignored the "update available" notifications.

Don't be that individual.

Your browser is your first line of defense against threats from the internet. In reality, browsers are more like the first point of vulnerability, as hackers like to exploit browser vulnerabilities to place malware on your machine.

Like any software, all browsers have bugs. Some bugs result in vulnerabilities, and some of those vulnerabilities can be used for malicious purposes. Most browsers — again, like most software — are continually updated to fix bugs as they are discovered to remove those vulnerabilities.

As a result, you need to run the most recent browser version available for your platform.

So keep it updated — it's for your protection.

Tip of the Day: Remember Modify in Add/Remove Programs

2025-11-04 08:00:24

For many applications, uninstalling isn't the only option.

Modifying an installation
The option to modify an app installation. (Screenshot: askleo.com)

In addition to uninstalling software via Settings > Apps > Installed apps (or Add/Remove programs, as we knew it in the past), you can also modify some installations.

The option to modify isn't always available. It requires support from each application's setup program, and what it does isn't consistent from app to app. It may:

Microsoft Office is a good example of change over time. Currently, if I click the Modify button shown above for Office 365, it launches a repair wizard that offers to repair my current installation. In this case, I guess "modify" means "fix". In older versions of Office, however, it allowed you to select which specific Office applications were installed.

Knowing that modification options might exist can be another useful tool, depending on your situation and the problem you're attempting to solve.

Tip of the Day: Plan for Your Death

2025-11-03 08:00:58

It's not pleasant to think about, but planning is essential.

I was contacted some time ago by a family trying to recover a loved one's online life after a death. It was not going well.

I try not to be morbid, but it's important to consider. If you suddenly disappeared, what would happen to your digital world? Would being unable to access it present a problem for anyone you left behind? Would they be able to pay bills, access your email, save your photos, or find information they need?

It doesn't even have to be about death: any kind of prolonged disconnection counts, even if it's not permanent. An unexpected hospital stay, a vacation that lasts longer than expected, and involves a loss of connectivity — just about anything that makes it impossible for you to access your online life can have dramatic ramifications for other people in your life.

When you plan for your death, include your digital life.

I can't say what is or isn't appropriate for you. It could be as simple as a single password in a known location. It could be a document of instructions kept with a lawyer. It could be taking advantage of features built into some tools for exactly this circumstance. The common thread is simply that you must prepare. And as things change, you must keep things up to date.

Think about it for the sake of the people who rely on you.

Replying to Spammers to Tell Them to Stop

2025-11-03 08:00:33

Tempted to hit "reply" and tell spammers to knock it off? Don’t. Here’s why replying makes things worse, and what you can do to keep spam under control.

The Best of Ask Leo!

Don't do it.

by

Tempted to hit "reply" and tell spammers to knock it off? Don't. Here's why replying makes things worse, and what you can do to keep spam under control.
A garbage can overflowing with spam.
(Image: dollarphotoclub.com)
Question: Can I set up an automatic email reply to all the [BULK...] emails I get telling them that such are not being received at my email address? Would it be advisable to do so? I get few if any that inform or provide any useful info. Or perhaps I need to ask, "What is the best way to deal with [Bulk...] emails other than one by one?"

I assume that by "BULK" you mean unsolicited email, more commonly called spam: email you never signed up for and don't want.

Never, ever reply to spam. Period. It won't help and will more likely make things worse.

I won't show you how to set up an automated reply because it's the wrong thing to do. Period.

Instead, let me explain why replying to spam — automated or manually — is a really, really bad idea.

TL;DR:

Replying to spam

Don't reply to spam. It won't reach the real sender and just proves your address works, so you'll get more junk. Instead, mark true spam as spam so filters learn. Unsubscribe from emails you asked for. Don't bother blocking, since From: addresses change all the time.

Replies to spam don't go where you think

When you reply to an email, the reply goes to the address listed in the "From:" field32 in the original email.

The problem is that in spam, the "From:" line is a lie. It's rarely the person or organization that sent the mail. More commonly, it's the email address of someone completely unrelated to the spam message — an innocent bystander.

If you reply to spam, the person who gets your message can do nothing about it. In fact, you're now spamming them.

Spammers use "From: spoofing," as it's called, to hide. It makes tracing the source of spam difficult, if not impossible.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Replies to spam confirm you're real

Spammers send email to millions of addresses at a time, including many that are bogus. (Another reason for faking the "From:" address is so the spammer doesn't get all the resulting bounces.)

Why?

It's more like "Why not?" There's no additional cost to the spammer to send out all those bogus emails, as long as some of the addresses are valid.

Sometimes spammers pay attention to your reply, but not in the way you want.

If they pay attention to it, they now know that your email address is valid and their spam has been read by a real person. Note that they will not read your message. They don't care what you have to say. By replying, all you've done is confirm to them that your email address is legitimate.

That's valuable information to spammers, giving your email address gold status among their targets.

The result is that you'll get more spam. Possibly lots more spam.

Deal with spam as spam

So, what should you do with spam?

If it's really, truly spam — something you did not sign up for — then mark it as spam in your email program or email service. They will use the characteristics of the message to better identify and automatically filter spam in the future.

If it is something you signed up for, then unsubscribe. Mark it as spam only if the unsubscribe process doesn't work.

Don't bother blocking the sender of spam. The sender is rarely accurate and changes randomly.

Delete it and move on

If you don't have the option to mark it as spam, or it doesn't seem to help, simply delete it and move on. It's not worth getting all worked up over. There's very little you can say or do that will stop spam once you start getting it.

As a last resort, you might move to an email service that has a better spam filter. While not perfect, as of this update, Google Mail remains the most effective.

Podcast audio

Footnotes & References

32: Or the "Reply-To:" field, if there is one. Also easily spoofed.

Can I Back Up Files to a Separate Partition on the Same Hard Disk?

2025-11-01 08:00:22

Thinking of backing up your files to another partition on the same hard drive? Learn how this puts your data at risk and discover smarter, safer ways to back up before disaster strikes.

You can. Don't.

by

Thinking of backing up your files to another partition on the same hard drive? Learn how this puts your data at risk and discover smarter, safer ways to back up before disaster strikes.

Question: I am going to do a clean install of Windows to hopefully fix some errors, which means that I need to back up my files. The problem is that I don't quite have the means to back up my hard drive. Can I create a new, separate partition on my existing drive (1TB), copy my files to that, and then perform a clean install on the existing Windows partition? Afterward, I would transfer the files back and delete the "backup" partition. Would that work, or am I heading in the wrong direction?

It would work, but, yes, it's the wrong direction.

There are risks. And from what I can see, you're running a huge risk before you even begin.

TL;DR:

'Backing up' to another partition

Copying files to another partition on the same hard drive isn't a real backup. If the drive fails, both partitions fail, and you lose everything. A true backup needs to be on a different drive, ideally external, in online storage, or both.

You're just shuffling data

What you describe isn't backing up. You're just moving some files over here so you can erase stuff over there.

It's a fine approach to solving the problem at hand: making room for a clean Windows install. It's a fast way to copy files so you can wipe out the primary partition and copy the files back later.33

But don't think of it as a backup.

If it's in only one place, it's not backed up.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

A separate partition is still on the same disk

Backing up one partition onto another where both partitions are on the same hard disk is at best only half a solution; at worst, it's a disaster waiting to happen.

If the hard disk fails, all the partitions fail with it. If you put the backups of the primary partition onto a separate partition on the same hard drive, and the drive fails, they both disappear at once.

It's like having no backup at all.

Backups on a separate partition may be useful for some kinds of errors. Perhaps you delete a file you didn't mean to, or a bad sector crops up on a file in the primary partition — the backup on the separate partition would still be there.

But that completely ignores the more disastrous and more common scenario of a catastrophic failure of the entire hard drive, in which case you lose everything on it.

In case I haven't been clear, don't do backups this way.

Back up, and back up somewhere else

Back up. That's a given.

Back up in such a way that you're protected from events that might cause you to need the backup. Options include:

Backing up to an external drive will cover 99% of most of the problems you're likely to encounter.

Podcast audio

Footnotes & References

33: Many people would leave what you're calling the backup partition in place after the install. There's no requirement that those files be in the same partition as Windows itself.

 

How Do Websites Store Passwords Securely?

2025-10-31 08:00:17

Not all websites protect your password the same way. Some do it well, others badly, and a few dangerously poorly. I’ll walk through the good, the bad, and the ugly of password storage, and share one simple step you can take to keep your accounts safe.

The good, the bad, and the really bad.

by

Not all websites protect your password the same way. Some do it well, others badly, and a few dangerously poorly. I'll walk through the good, the bad, and the ugly of password storage, and share one simple step you can take to keep your accounts safe.
Password dial set to "password"
(Image: adobestock.com)
Question: After reading your excellent article, "How Can a Hacker Try All Possible Passwords If Systems Block the Login Attempts?" I still don't understand. Even if a hacker has stolen the user database of logins and hashes, how can they duplicate the method of hash creation used by any particular website? I would think different websites would use different hash-creation formulas.

You would think. And they should. That's what makes it so frustrating when these attacks are successful.

The problem is that security is sometimes an afterthought. In fact, it's often not thought of in any deep sense until after a successful attack.

The good news is that there's something simple you can do about it.

TL;DR:

Password storage security

Websites can store passwords in good, poor, or horrible ways. The safest use salted hashes, which add secret info before hashing so stolen databases are harder to crack. Sadly, some sites still store passwords in plain text or weak hashes. Protect yourself: always use a unique password for every site.

A horrible approach

I include it for completeness only, but a very, very bad method websites can use to keep track of your password is to store your actual password.

For example, if your password is:

password

then somewhere in the account database, in a password field, is:

password

Anyone who steals that database can just look inside and find your password.

This is extremely poor security. Sadly, it happens occasionally.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

A better but still poor approach

Websites should not keep a record of your actual password. Put more bluntly, with the most basic security, the website does not actually know your password.

Instead, when you first set (or change) your password, they "hash" the string of characters you provide as your password and store that hash instead. A hash is a one-way complex mathematical conversion of the characters you type in to a number. Hashing a password generates a number unique to what you typed in. Even if a hacker accesses that number, they cannot figure out what was typed.

When you log in, the system hashes the password you type in and compares it with the hash that was stored when you set your password. If the hashes match, you must have typed in the same password both times, and the system gives you access to your account.

There are several standard hashing functions. For example, if we hash the password:

password

using the "sha256" hash, the result is:

5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8

And that's exactly what a "poor" website might do: store nothing more than a standard hash.

The problem is that anyone who hashes "password" using sha256 will get exactly the same result. There are several approaches that allow hackers to discover which hash algorithm was used. While they cannot calculate the password from the hash directly, they can try hashing long lists of common or discovered34 passwords. If they find a matching hash in a breached database, they then know the password used to create the hash for that account.

Not good.

The "good" approach adds salt

Let's say you specify a password.

password

When using good security, the website modifies it slightly before hashing it. It changes it in a way unique to the website via a "secret" method. It could be as simple as adding a string to your password.

password-website-added-string

Now when that modified password is hashed using a standard hash algorithm, the result is quite different.

ecd4615720cd24c455cbf627243737c94cd1539f4c8903d664a36ef4992fbce8

Each time you enter your password, the website adds this unique information — called "salt" — to what you entered before it calculates the hash. As long as no one knows the salting string (or, more commonly, the salting algorithm, which is more complex than just adding a simple string), there's no way to reverse-engineer a stolen database of password hashes.35

This is password storage done properly.

When to be concerned

Whenever there's a report of a user-account database breach, I look for information about what that database contains. I look for one of three phrases.

Podcast audio

Footnotes & References

34: This is why not reusing passwords is so important.

35: This is an oversimplification. A properly secure password storage mechanism would use a different hashing function for a variety of reasons, as well as a unique, random number as a salt. I found a good, more detailed rundown at Salted Password Hashing ' Doing it Right.

Tip of the Day: Reboot Your Router

2025-10-31 08:00:15

Every once in a while, pay attention to your router and reboot it.

Router with a shield and globe with an ethernet port and cable.
(Image: dollarphotoclub.com)

We take our routers for granted. I mean, we really take our routers for granted.

Seriously, when was the last time you even thought about that device, which is a critical component of connecting you to the internet and keeping you safe? I'm thinking it's been a while.

I've talked a lot about router security in the past, but this is more of a performance and stability thing: every so often, reboot your router.

Routers are amazingly complex little devices. They're small computers in their own right, often running a variant of the Linux operating system. Like any operating system, things can become less efficient over long periods of time. Rebooting your router once a month or so can improve its performance and even make some of those mysterious connection errors less frequent.

Tip of the Day: Ignore Old Accounts

2025-10-30 08:00:52

Ignore an account for long enough, and it'll die of natural causes.

comic-book style image of a tombstone in a graveyard which has chiselled on to it "RIP Leo's myspace account"
(Image: ChatGPT)

I'm often asked how to close various types of accounts. The most common cause for concern is an email account getting unwanted email.

My advice?

Don't.

The best way to "close" an account you're no longer interested in using is:

  1. Remove any information you want from the account (or don't want left in it). This might involve deleting emails, removing files, downloading contacts, etc.
  2. Ignore it. Stop logging in to it. Forever.

That's it.

Behave as if the account doesn't exist. Ignore any mail sent to it or anything else associated with it.

Eventually, the service will probably remove it for lack of use.

Important: don't log in to see if it's still active. Even logging in once can be taken as a sign that you've changed your mind and want the account to remain active.

Also, make sure you're not using the account elsewhere in other ways. For example, you can ignore your hotmail.com email, but if you're still using that account to log in to your PC or access OneDrive (or any other Microsoft service), the account is still active and will not be deleted. Once you understand how many places an account is used, you might decide not to delete it after all.

Still Another Way to Install Windows 11 With Only a Local Account

2025-10-30 08:00:23

Want Windows 11 without tying it to a Microsoft account? There’s still a way. I’ll walk you through a simple but slow two-step trick. The result: a fresh Windows 11 setup with only a local account... at least until Microsoft closes the door again.

Applies to Windows: 11, 10

I call it the "local account two-step".

by

Want Windows 11 without tying it to a Microsoft account? There's still a way. I'll walk you through a simple but slow two-step trick. The result: a fresh Windows 11 setup with only a local account... at least until Microsoft closes the door again.
an individual about to step on a two-step step stool where the first step is labeled "Windows 10", and the next is labelled "Windows 11"
(Image: ChatGPT)

Microsoft has removed various workarounds discovered to allow Windows 11 to be installed without using a Microsoft account. Their recent justification claimed a change was to "avoid missing important parts of the setup process".

Important for whom?

The technique I'm about to describe is simple but time-consuming. So far, my results show it works... for now. The resulting installation of Windows 11 Home has only a local account.

The process starts a little further back than you might imagine.

TL;DR:

The Windows 11 local account two-step

Step 1: Install Windows 10 from scratch with only a local account

Boot from Windows 10 installation media and set up Windows 10.

Yes. Windows 10. It's not our final destination, of course, but it's the first step in our local account two-step process.

The easiest way to install Windows 10 with only a local account is to disconnect the internet. Unplug the Ethernet cable or turn off the Wi-Fi adapter. The setup program may complain, but forge ahead anyway without connecting.

Eventually, you'll be asked, "Who's going to use this PC? What name do you want to use?"

Who's going to use this PC?What name do you want to use?
Who's going to use this PC? Click for larger image. (Screenshot: askleo.com)

This is the username of your local account. For example, I generally use "leon"36.

Click on Next, and you'll be asked to provide a password (twice) and set answers to some recovery questions.

Complete the Windows 10 installation. Even when done, do not connect to the internet.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Step 2: Upgrade to Windows 11

Replace the Windows 10 installation media with Windows 11 installation media.

Run the "Setup.exe" file found there.

Assuming your computer meets Windows 11's minimum requirements, the Windows 11 upgrade will proceed.

Windows 11 Upgrade underway.
Windows 11 Upgrade underway. (Screenshot: askleo.com)

Eventually, after the inevitable copies and installs and perhaps even a reboot or two, you'll find Windows 11 ready to sign in.

With your local account.

Loging into Windows 11 with only a local account.
Logging into Windows 11 with only a local account. Click for larger image. (Screenshot: askleo.com)

If you now examine the accounts in Windows 11 settings, you'll see that there's only a single local account with no association to a Microsoft account.

A single account, local.
A single local account. Click for larger image. (Screenshot: askleo.com)

What happens next

Now, of course, you connect to your network and let Windows 11 update itself and more.

Be careful!

Windows will "encourage" you to sign in with a Microsoft account multiple times and in multiple ways. Assuming you want this computer to have nothing to do with a Microsoft account, resist the requests. Signing in to any service with a Microsoft account, even once, can have ripple effects that go far beyond whatever service you think you're signing into (particularly if you don't read the fine print).

I assume you understand what you're missing without a Microsoft account. Things like backing up BitLocker recovery keys, using cloud storage, and managing other services and features become your direct responsibility.

I totally understand that, for many people, avoiding those features is exactly the point.

Podcast audio

Footnotes & References

36: Which literally harkens back to my first email address at Microsoft in 1983.

How Often Should I Reset My PC?

2025-10-29 08:00:53

Is your PC slowing down, acting odd, or just feeling old? A full reset might be the fix, but how often should you do it? I’ll share when it makes sense, when it doesn’t, and how to decide if your computer needs a fresh start.

There's no schedule.

by

Is your PC slowing down, acting odd, or just feeling old? A full reset might be the fix, but how often should you do it? I'll share when it makes sense, when it doesn't, and how to decide if your computer needs a fresh start.
A Reset Button
(Image: depositphotos.com)

Resetting your PC involves backing everything up, reinstalling Windows and applications from scratch, and restoring your data from the backup or elsewhere.

In years past, I advised doing a reset fairly regularly. Recommending an annual reset wasn't uncommon for active users, including me.

These days, a reset isn't as necessary as it once was. I'll review why and when we would want to reset Windows.

TL;DR:

Resetting a PC

Resetting your PC gives it a fresh start, clearing out cruft, clutter, and problems. These days, most people may never need to do it. But if your computer feels slow, unstable, or is hit by malware, a reset can help. Sometimes it's the quickest fix. Of course, always back up first.

Why reset at all?

Like any modern operating system, Windows is unfathomably complex.

Over time, Windows becomes slightly less stable. As updates are applied, old components are replaced, software is installed and uninstalled, configurations are changed, malware is discovered and removed, and so on, the internal state of the system gets messier. Some of it is under Windows' control, but much is at the mercy of third-party software, like the drivers and applications you install.

The symptoms are subtle. They range from the system feeling slower than it once was to applications not behaving as they should to random crashes and other issues.

A reset starts over with a clean slate, and the process begins again.

That hasn't really changed. What has changed is that the rate of degradation has decreased dramatically. These days, it's reasonable to assume that for a casual user, the operating system will remain stable enough throughout the life of the computer itself. A "reset" of sorts happens when the device is eventually replaced.

But, sometimes — particularly for active users who stress their systems in various ways, such as installing and uninstalling lots of different software — a reset might be called for before the computer's replacement.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

So, how often?

There's no hard-and-fast answer to how often you should reset your PC.

As I said, it's possible you may never need to.

I'll use myself as an example. I used to count on a reset roughly once a year. As you can imagine, I'm a heavy user. I play with a lot of different things and test an assortment of even more. I definitely consider myself at the far end of the bell curve.

And yet, I've reset my current desktop — five and a half years old as I write this — exactly once, about a year ago. That's over four and a half years without a reset.

Your mileage will definitely vary. Rather than looking at a specific timeframe, base it on your system's performance. At some point, its behavior will reach some threshold and just "feel" like it's not the machine it once was. That's a prime time to consider a reset.

Other times to reset

Besides feeling that your machine has slowed down or become unstable over time, there are a few other times when it's worth considering a reset. Rather than being driven by explicit concerns, these are opportunities to reset the clock.

Considering a new machine? Reset first.

When you're thinking about replacing your machine, take a minute to see if it's really as bad/slow/incapable as you think it is. Whatever's driving you to consider a replacement is also an opportunity to see if your existing machine might feel like a replacement after a reset. While certainly not guaranteed (there are too many variables), it can save you a lot of time and money when it works. And, let's face it, getting a new machine incurs many of the same "costs" as a reset; you still have to reinstall all your applications and restore/move your data.

Recovering from malware

I'm constantly amazed at the time people spend trying to remove malware from their computers. They'll spend hours or days downloading assorted tools, running scans, and following sketchy advice — all without a guarantee that the malware is actually removed.

Aside from restoring an image backup taken before the malware arrived37, a reset is quicker. It's also guaranteed to remove the offending malware. As a bonus, your machine gets to start over with a clean slate.

Not a silver bullet

I don't mean to imply that performing a reset is some magical silver bullet that will suddenly fix all the problems you've been having with Windows, but it'll fix a lot of them.

I also realize how Windows performs changes over time. A clean install of the Windows OS from four years ago will behave differently — faster or slower — than a clean install of today's Windows — even the same version (10 or 11, for example). That's the nature of software development over time.

But removing the accumulation of cruft is always a good thing.

Podcast audio

Footnotes & References

37: Which, sadly, too many people do not have.

Tip of the Day: Remove and Re-Add Your Printer

2025-10-29 08:00:11

Forcing your printer drivers to start over with a remove/reinstall can resolve issues.

Printers and Scanners
Removing and adding a printer in Settings. (Screenshot: askleo.com)

Even though it's improved dramatically over the years, printer problems remain common and often vexing in Windows.

When experiencing a problem with a printer — especially when you can't connect to it — I recommend a simple diagnostic step.

This forces the printer drivers to reset to a known initial state and often resolves connectivity issues.

It won't fix every printer problem, but it's a good diagnostic and repair technique to have in your toolkit.

Tip of the Day: Whole Drive Encryption Only Protects When a Disk is Not Mounted

2025-10-28 08:00:00

Whole disk encryption is great, but it's important to understand when it doesn't protect your data.

Whole-drive encryption is a great way to ensure that everything on a hard drive is encrypted and invulnerable to prying eyes.

Regardless of how you encrypt your data, when you unencrypt it to use it, remnants of that data can appear — also unencrypted — in temporary files or the system-paging file.

With whole-drive encryption, even those locations are encrypted before they're written to disk.

Here's the problem: while your system is running, everything on your encrypted disk is freely available. That's a benefit: you can continue to use the files and folders on the disk normally, knowing that when you turn your machine off, it's all inaccessible to whoever else might come along.

Here's an example of when this becomes a problem. Say someone is traveling and:

Whole disk encryption is good, but it's important to understand its limitations. If the disk and its data are accessible to you, it's accessible to anyone with the same access as you. Only when the machine is powered down or the disk is disconnected does the full protection of whole-disk encryption kick in.

Tip of the Day: Whoever Provides Your Internet Is Your Internet Provider

2025-10-27 08:00:31

Your friend or that coffee shop down the street might be your ISP at any particular moment. Understanding that is important.

Router with a shield and globe with an ethernet port and cable.
(Image: dollarphotoclub.com)

This sounds redundant, but whoever provides your internet is, by definition, your internet service provider.

Seems obvious, right?

When your internet is provided by a hotel, landlord, coffee shop, or even a friend whose home you're visiting, it's the hotel/landlord/coffee shop/friend who is your ISP. They may get their internet service from a more commonly recognized name-brand ISP, but in providing it to you, they've become your ISP in that moment.

Why is this distinction important?

Because your ISP, whoever it is, has access to what you're doing online. They can see what sites and services you're connecting to, and they can view the data you're exchanging with those services, unless it's encrypted.

In the worst case, they can turn evil, routing you to sites and services you might not expect.

It all takes some technical savvy, but depending on what you're doing, it might be important to protect yourself.

Most importantly, just be aware.

What Are the Internet's Rules About Free Speech?

2025-10-27 08:00:14

When people find their posts or comments removed or altered from websites they visit, sometimes they claim that their right to free speech has been violated. That's rarely the case.

The Best of Ask Leo!

Probably not what you think they are.

by

When people find their posts or comments removed or altered from websites they visit, sometimes they claim that their right to free speech has been violated. That's rarely the case.
Microphone
(Image: canva.com)
Question: Can you advise me on the "rules" of the internet regarding free speech? I've had my comments on some sites and posts deleted by the owner. Doesn't that violate my right to free speech?

No, it doesn't.

Free speech is an interesting concept in general, especially in today's turbulent times. Take it to the internet, and things get even more "interesting".

Yes, there are rules and even laws, but it's complex.

TL;DR:

The Internet and Free Speech

The internet is not an entity, and there are no rules or laws that span it completely. Actual laws vary, often dramatically, from place to place. Free speech, when afforded by law, does not mean you may use someone else's venue for your message. It's their platform run by their rules. You can, however, set up your own platform (website, newsletter, magazine, or street corner). The First Amendment only covers what the U.S. government can or cannot do, but does not prevent, say, website owners from setting up more restrictive rules of their own. Regardless of the situation, free speech does not guarantee you access to any particular audience, or any audience at all.

My big fat caveat

I am not a lawyer. This is not a substitute for legal advice from an attorney or other source better versed in all the nuances of free speech. If you need real legal advice, then get a real attorney38.

My discussion here represents only my understanding of and opinions on the assortment of issues related to free speech.

I could be wrong. I don't think I am, but I could be. (Which, by the way, applies to everything I've ever said or published. Smile)

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The internet

Let's start by acknowledging that there is no such entity as "the internet". Internet is just a term that describes a vast global network of interconnected computers.

It has no laws or rules.

Even the protocols, formats, and various ways devices interconnect aren't governed by enforceable laws. A more appropriate (if sexist) term would be "gentlemen's agreements." Adhere to this specific protocol, and you'll be able to do Z on the internet. Change that protocol (which can be done), and Z won't work.

Just look at all the cross-browser capability standards used to display a webpage, and you'll get an idea of those agreements at work. Or not.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

But there are laws

There are laws that govern aspects of how we communicate with each other, including how we do so over the internet.

One problem is that those laws are not global. They're different for each of the hundreds of countries in which internet users live.

As you might imagine, countries rarely agree on everything, including what you're allowed to say and where you can say it. In some countries, it's illegal to speak ill of the ruling monarch. In others, it's only illegal if you threaten them. In still others, you can say what you want.

The issues, concepts, and legalities surrounding the internet and what can be done on it are no different. Some countries try to strictly regulate the internet used within their borders; others, not so much. Many try to apply laws that were written before the internet's existence to current internet-related issues, and they experience varying degrees of consistency and success.

In short, there's a bucketload of laws that apply to what happens on the internet. Unfortunately, it's a bucketload of inconsistent, incomplete, and contradictory laws that may or may not apply to any situation you encounter — and even then, only if it rises to the level of some government agency's attention.

Not all countries have free speech provisions.

Just because you live in a country that affords free speech as a right doesn't mean that the service you're using in that country has the same guarantees. Depending on the location of the company, the individuals who own the site, or the hosting company that provides the server space and network connection, there may be no free-speech guarantee at all. Period.

Free speech is probably not what you think

Let's say I run a website. Smile To keep things simple, we'll say that you, I, and the website are all within the United States.

You take issue with something I post on my website, and you say so, using the comment function on that website.

This has nothing to do with your free speech rights. If anything, I expect it has more to do with my rights as the website owner. I am not required to provide you a place for what you want to say, no matter what you say or how you say it.

However, you can set up your own website, where you might choose to take issue with me. I can do nothing about that.

That's what free speech really is, at least to me: the ability to set up your own pulpit and say whatever the heck you want. Free speech does not mean you have the right to use someone else's venue for your message.

And it doesn't make a difference that you can't reach my audience to make your point from your site. Freedom of speech does not guarantee an audience. If you get one, fantastic. I have no right to reach them via your venue, either.

That pesky First Amendment

People often cite the First Amendment to the United States Constitution (often in the context of having their First Amendment rights violated). Typically, they are incorrect.

The amendment starts with the phrase, "Congress shall make no law...". If no law was made, or you weren't arrested, or a court decision wasn't involved, or a government agency didn't intervene, then the First Amendment doesn't apply. The wonderful webcomic XKCD explains it beautifully.

TOS, AUP, and common sense

There's more to this than the whim of the site owner. Many will have thought through what their site is about and what they want it to look like. They may well have set up some rules or guidelines ahead of time.

Most websites publish Terms of Service (TOS) about posting information. Be it writing your own blog on a blog-hosting service, making posts in a forum, or leaving comments on an article, by participating, you either explicitly or implicitly agree to abide by those terms.

Don't like the terms? Don't post there. Go somewhere else. Violate the terms? Expect to see your comments, posts, or blog disappear.

It's not your site. If you want to play there, you must play by their rules.

Similarly, if you use a hosting service or something similar to set up your own website, service, or blog, you'll likely be faced with an Acceptable Use Policy, or AUP. As the name implies, when you use someone else's services — even if you're paying for the privilege — you're required to abide by what they consider to be acceptable use of their services.39

And regardless of where you post or host and what their rules are, there remain things that are simply wrong to say or do — at least morally and perhaps legally. The classic example is that it's not within free speech rights to randomly yell "Fire!" in a crowded theater40. Where free speech guarantees are available at all, they don't trump the safety of others.

Making your point

"So, if website owners can just randomly delete my comments or posts, how am I supposed to make my point to the people who are there and need to see it?"

You may not be able to. Whether you're on the web or using another form of media, there's nothing about human discourse that guarantees you get to make your point to the people you think need to hear it. There's certainly no legal recourse that I'm aware of.

Except (and this is where you really need to talk to a lawyer) ...

Defamation, slander, and libel are all terms that have very specific legal implications. I won't try to delve into that. But depending on your specific situation, information on the internet that intentionally lies about or maliciously harms you may be one thing on which you can act. Like I said, get an attorney.

It even happens to me

I've been banned from one discussion forum (that I know of).41

And as unfair as it is, the site owner had every right to do so. It really sucks because it prevents me from communicating with the other users of that site.

But it must be this way.

Consider the alternative: what if I was able to force that site owner to let me back in? If there were a mechanism to let people force their way onto sites that others own and control, that would have a pretty chilling effect on the internet. In fact, it's likely that sites like Ask Leo! wouldn't exist. Malicious entities would use that ability to their own ends.

As distasteful as it is, the website owner's ability to pick who they allow on their site is an important form of freedom of speech.

Even if they're wrong.

Podcast audio

Footnotes & References

38: Get a real one. Get an honest one. They're out there.

39: Perhaps the easiest way to explain AUP differences is that some hosts allow you to post porn while others do not.

40: Unless, presumably, there was an actual fire.

41: Corgi-related, of all things. Go figure. Just goes to show that it's not always politics. In this site's case, I take my ban as a badge of honor. Update: The site that banned me is gone. I'm still here.

Can the Owner of an Open WiFi Hotspot See What Files I'm Downloading?

2025-10-25 08:00:12

Internet cafe owners can monitor the activity on open WiFi hotspots. Whether or not they take the time to do it is another story!

If they're techie enough, maybe.

by

Internet cafe owners can monitor the activity on open WiFi hotspots. Whether or not they take the time to do it is another story!
Downloading
(Image: canva.com)
Question: Just wondering if others can see what I'm downloading, say in a coffee shop or some other public place, like the administrator there? Or can they just tell that something is being downloaded? It's a local place, so I assume they have some local provider like Comcast. I imagine it takes up their bandwidth, and they don't like that because it makes the connection slow for others in the establishment. Please let me know.

When you're using someone else's WiFi — or even their wired connection — they're providing you with internet service.

They've become your internet service provider, or ISP.

And ISPs are special.

TL;DR:

Watching what you download

Any internet connection provided by a third party can be monitored by that third party. They are your internet service provider in that situation and can watch your data as it passes through their equipment. Even HTTPS, while it protects the data, does not hide which sites you're connecting to. A VPN is the only real protection, but even then, the provider can see when you're transferring "a lot" of data. Do they watch? It's unlikely, but there's no way to tell for sure.

Open WiFi

We talk a lot about staying safe when using an open WiFi hotspot. Those are the free WiFi connections available at many coffee shops, airports, and other public places.

The concern here is that an open WiFi hotspot — one that requires no password for an initial connection — doesn't add any security, and anyone within range can monitor your traffic.

Fortunately, a WiFi connection that is not "open" — meaning it's secured and encrypted using a WPA2 password or the hardwired connection that they provide — doesn't suffer from this risk.

But that doesn't mean that there isn't still a significant risk.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Your ISP

Your ISP can see everything you do.

If you're not taking additional steps to encrypt or otherwise hide what you are doing, your ISP can see that you are downloading, say, a specific file from a specific location.

ISP stands for Internet Service Provider. The coffee shop or other location is providing you with internet service. In this situation, they're your ISP. The administrator of a publicly available internet connection, such as an open WiFi hotspot, can monitor all unencrypted traffic and see exactly what you're doing.

Do hotspot owners watch?

Whether or not they watch is a completely different subject.

My guess is that the local coffee shop manager not only doesn't care what you are doing with the internet, but also doesn't have the time or expertise to know what to look for. Perhaps someone upstream can look — perhaps there's technology in place that's looking for certain types of activity — we just don't know for sure.

What we do know is that they can look.

The only way to truly protect yourself from that level of intrusion is to use a Virtual Private Network, or VPN. My article How Do I Use an Open WiFi Hotspot Safely? discusses this in a little more detail.

Ultimately, a VPN is the only way to hide what you're doing from the coffee shop owner, administrator, or your ISP.

Using bandwidth

But we're not quite done.

When you're using a VPN, an ISP may not see what you're downloading, but they can see that you're downloading a lot. They can probably figure out which computer connected to their network is the guilty party.

They can identify you as being a bandwidth hog; they just can't tell what file you're downloading.

What about HTTPS?

Given that we talk a lot about using HTTPS to remain secure, it's worth exploring why I've not mentioned it here.

HTTPS encrypts the connection between your computer and the service you're using. That's important for things like banking, as one example — your conversation with the bank can't be listened in on by anyone.

But your ISP can still see that you're talking to your bank. And if it's an open WiFi hotspot, so can that creepy guy with a laptop over in the corner.

If you're downloading something over HTTPS, the ISP can't see what you're downloading, but they can absolutely see the site you're downloading it from. Sometimes that — coupled with the fact you're downloading something large — is enough to question what you're up to.

A VPN won't change the size of the download, but it will hide the site you're connecting to.

Podcast audio

Are VPNs Safe for Online Banking?

2025-10-24 08:00:21

Think a VPN makes online banking safer? Banking is already protected by strong encryption, but a VPN adds a twist. I’ll explain what’s really protected, what isn’t, and where the real risks lie when you bank on the go.

Safe? Sure. Safer? Probably not much.

by

Think a VPN makes online banking safer? Banking is already protected by strong encryption, but a VPN adds a twist. I'll explain what's really protected, what isn't, and where the real risks lie when you bank on the go.
VPN
(Image: canva.com)
Question: Is it safe for me to use a VPN for online banking while I'm on the road?

Online banking these days is relatively safe to begin with. HTTPS connections, for example, mean your conversation with the bank is encrypted between your computer and the bank's servers, regardless of whether or not you use a VPN.

There are a couple of things that a VPN kinda/sorta makes slightly safer.

Let's examine the differences.

TL;DR:

VPN Banking

Online banking is already secure with HTTPS connections, even without a VPN. A VPN can hide which bank you're using, but it doesn't make your banking safer in most ways. In my opinion, the bigger risk is losing your laptop, so focus on strong logins and two-factor authentication instead.

No VPN

Without a VPN, connecting to your bank's website happens over an HTTPS connection. This means that data is encrypted before it leaves your machine and can only be decrypted when it arrives at the bank's server, and vice versa. No one in between can make sense of the encrypted data.

Visualization of an https connection between your computer and your bank, showing the data protected on its way through the cloud which is the internet.
(Image: askleo.com)

This provides nearly bulletproof security regardless of whether you are at home or on the road. No one can intercept your data, not the ISP you're using, the open hotspot you're connected to, or anyone else.

That doesn't mean it's completely risk-free, however.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The risk(s) of no VPN

Without a VPN, due to HTTPS, no one can see what data you're exchanging. However, a hacker can see that you are connected to your bank. In fact, they can see which bank you use. That tells them you may have your credentials for logging into your bank available.

This could make you a slightly bigger target for other forms of malicious behavior. It seems unlikely but possible that knowing you're connecting to a specific financial institution could be enough of an incentive to try to steal your laptop, for example, and see if your accounts could be broken into once they have physical access to your computer.

It's not something I worry about.

Another form of vulnerability is called a "man in the middle" attack. When you connect to your bank, information is securely exchanged as part of setting up that encrypted connection. In rare cases, it's possible that a malicious actor could insert themselves in such a way as to appear to be your bank, right down to the HTTPS verification. This is extremely rare and difficult, and almost always involves some kind of notification that certificates are being installed on your machine. Accepting these types of unrecognized certificates can lead to HTTPS compromise (so, as always, pay attention to notifications).

This is something I worry about even less, mostly because it's extremely rare, plus there's a notification that something's happening, which I'd never allow while on the road. The more common scenario is when schools or corporate networks intentionally use the same technique to monitor their users' online activities.

With a VPN

Using a VPN, your connection to your bank still happens over HTTPS and is end-to-end encrypted between you and your bank. The VPN adds a layer of encryption and data obfuscation between your machine and the VPN's internet server.

Visualization of an https connection between your computer and your bank through a VPN, showing the data protected on its way through the cloud which is the internet.
(Image: askleo.com)

A VPN hides what you're doing. If someone can see data to and from your machine, the only thing they can see is that you're using a VPN (and which one you're using). They cannot see that you're doing any online banking, or which bank you use, at all.

The VPN service, of course, knows which bank you're connecting to, but still can't see the data being exchanged.

The only real risk a VPN introduces is that it could perform a man-in-the-middle attack on the HTTPS connection — but again, there would be notifications that something was going on.

What I do

I bank online all the time. It's convenient, and most importantly, it's safe.

If I'm at my local coffee shop or airport, I'll fire up my trusted VPN before I do anything (banking or otherwise), but I also don't panic if I forget to. HTTPS has me covered.

What I definitely do, though, is when a site asks if I want it to remember my sign in (usually a little checkbox below the username and password fields) I'll always explicitly say "no" (by leaving that unchecked).

The bigger risk of banking on the road

Clearly, I don't consider packet sniffing and data interception nearly the problem it once was, but that doesn't mean that there aren't risks.

Ways that I reduce those risks include:

The biggest risk, in my opinion, is losing my laptop. These are all measures that secure my accounts in such a way that even if someone does steal my computer and bothers to try to break in42, they'll be blocked from accessing my accounts.

Podcast audio

Footnotes & References

42: Most theft is about hardware resale, not breaking in.

43: I would avoid banks that don't use HTTPS by default. Fortunately, I don't know of any.

Tip of the Day: Use FAT for Thumb Drives

2025-10-24 08:00:15

FAT is the most commonly understood disk format across almost all devices that accept a USB thumb drive.

Format Thumbdrive
Formatting a thumb drive. (Screenshot: askleo.com)

When formatting a disk, you're given options as to which type of file system you want to use. This determines how data is organized on the drive.

If you're formatting a USB flash, thumb drive, or SD card, my recommendation is to use FAT32 or exFAT, particularly if you expect to use them with non-Windows devices.

USB thumb drives are among the most portable of devices and are inserted into a variety of systems. Not only might you use one to carry data between computers, but many smart TVs and other devices now allow you to insert a thumb drive containing video, music, or other data to be processed by the device.

Not all file systems work on all devices. Fortunately, FAT — and specifically, FAT32 — is by far the most commonly understood and accepted way of storing information. Unless you have a reason to choose otherwise, choose FAT32 for those thumb drives. ExFAT is the next choice.

Tip of the Day: Treat Email Like a Postcard

2025-10-23 08:00:57

Email is like a postcard: anyone with access can see what it says.

Postcard
(Image: canva.com)

Typically, when you send an email, anyone along its delivery path can read it. Like a postcard mailed through a postal service, your mail carrier can read it, as well as anyone in the postal offices and delivery trucks between the sender and you. (The exception would be if you manually encrypted your email's content — perhaps like putting your postcard in an envelope.)

Not just anyone has access to the delivery path of an email. For example, it would be difficult for you to intercept an email I send to someone who isn't you. But the mail servers at either end, the internet connections between those servers, and any servers along the way are all opportunities for technicians or government agencies to see what's being sent.

That may not bother you. It rarely bothers me. But it's important to keep in mind if you are communicating something sensitive via email.

USB Charging and Cables Explained: Safe and Simple

2025-10-23 08:00:05

With USB-A and USB-C, things have gotten simpler, but not always obvious. I’ll walk you through what cables really do, how devices and chargers “talk,” and why missing charger blocks isn't a big deal.

At worst, slower than it could be, but that's fixable too.

by

With USB-A and USB-C, things have gotten simpler, but not always obvious. I'll walk you through what cables really do, how devices and chargers "talk," and why missing charger blocks isn't a big deal.
Several USB charging bricks plugged into a power strip.
(Image: canva.com)
Question: So many devices come with only the charging cable and not the actual charger (plug/block) itself, which has the label on it stating what voltage & amperage ratings it has. I have yet to find charging cables that come with such labeling on them. So how do you know what that particular charging cable is capable of — or are they all universal charging cables whether or not they come with the plug?

USB standardization has made all of this much simpler.

For the most part, if the cables fit, your device will charge safely. Slowly, perhaps, but safely. There are exceptions, but when talking about portable devices, it's rare.

TL;DR:

USB charging

USB has simplified charging dramatically. Most cables just pass power through, so if it fits, it works. It may be slower, but it'll be safe. USB-A always means five volts, while USB-C is smarter: device, charger, and even cable "talk" to each other to decide the fastest, best, and safest speed. Missing chargers? Standard ones are everywhere and work fine.

USB-A

The older, larger, square plug and socket used for years is the USB-A socket. Regardless of what's at the other end of a USB cable, if one end is USB-A, this tells us pretty much everything we need to know.

USB-A plug
USB-A plug. (Image: canva.com)

USB-A supports five volts. That's part of the definition of the USB standard.

USB ports
USB-A sockets (Image: canva.com)

Originally, USB-A ports were limited by the USB specification to providing only half an amp of power (0.5A or 500ma), though that's been increased in USB 3 to nearly twice that (900ma), and even 1.5 amps in a charging-specific specification.

The upshot is that if your device uses a USB cable of any sort to charge, and that cable plugs into a USB-A connector, it'll work. The USB standard defines everything we care about.

It may charge more slowly than it could, though. That's where USB-C factors in.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

USB-C

USB-C is a newer, smaller, more flexible version of the USB family of connectors.

USB-C plug
USB-C plug. (Image: canva.com)

USB-C is smaller than USB-A, has more wire connections (24 compared to 4), and is symmetrical, meaning you can plug it in either way; there is no right-side-up to figure out.

USB-C socket (left) and USB-A socket (right)
USB-C socket (left) and USB-A socket (right) (Image: depositphotos.com)

USB-C is a more flexible but slightly more complicated solution for power delivery. It's not limited to five volts. USB-C may provide:

Later versions of the protocol have expanded to include 28, 36, and 48 volts as part of the EPR, or Extended Power Range, addition.

Here's the trick: when you plug in a device — say your phone — into a USB-C socket, the phone and power supply have a little "conversation" about:

If there's no conversation, the default is our old friend, five volts. On the other hand, if the two can negotiate something better, that's what they use. If that happens, your device will charge faster.

A cable is just a cable, mostly

When it comes to your mobile phone and other small portable devices, a USB cable is just a cable. Wires in the connector at one end pass through to the connector at the other. If you can plug it into a power supply at one end and your device at the other, then the cable will work and your device will charge.

These are referred to as passive cables. They do nothing other than connect.

Some (or even most) USB-C cables have a chip as part of the cable that, among other things, identifies the cable's capabilities. For example, extended power capabilities can range up to 240 watts of power delivery, which requires a cable capable of safely transferring that much power.

This means that the "conversation" between power supply and device now includes a third voice: the cable connecting the two. The conversation then covers:

The goal is for them to agree on the safest, highest-power delivery.

The case of the missing charger

Small USB chargers
(Image: depositphotos.com)

As you pointed out, more and more devices come without a charger. This is an attempt to reduce electronic waste, since:

Given that USB-based chargers are the emerging standard, each device no longer needs a unique charger. The chargers we've already accumulated will do just fine. Assuming the cables fit and connect, you're mostly done.

And if you find yourself short a charger, they're standard, inexpensive, and easy to find.

Podcast audio

Tip of the Day: Don't Share Contacts

2025-10-22 08:00:54

Sharing contacts with online services can have benefits, but it can also have a nasty side effect: spam.

Find Friends on Twitter
Twitter would like you to share your contacts list. (Screenshot: askleo.com)

Many online services, including most social media sites, ask you to share your contact list with the service. I recommend you avoid doing so — at least until you understand what will happen when you do.

When you upload your contact list, the service determines which of your contacts use the same service. This is most often done by matching email addresses: if an email address in your contact list is the email address of a user of the service, then the service will either connect you or offer to make the connection.

The service will also know which of your contacts are not currently using the service — and this is where it gets dicey.

A well-behaved service will offer to send your contacts an invitation to join the service. You'll say "no", I hope, since your friends' emails should be kept confidential unless you have their permission to share them.

A not-so-well-behaved service will send the invitations without asking. Most people consider this kind of "invitation" spam, as it's unwanted.

Until you're certain you won't be inadvertently spamming your contacts, don't upload their information. If you want to invite them, do so manually by dropping them a message yourself.

Can My Computer or Signed-In Account Be Hacked from the Internet?

2025-10-22 08:00:29

Worried that staying signed in leaves you open to hackers? I’ll explain why your router, firewall, and smart habits protect you, what the real risks to your accounts are, and the simple steps you can take to stay safe online.

Never say never... but it's pretty close to never.

by

Worried that staying signed in leaves you open to hackers? I'll explain why your router, firewall, and smart habits protect you, what the real risks to your accounts are, and the simple steps you can take to stay safe online.
A computer keeps running securely while the user sleeps.
(Image: ChatGPT)
Question: Is it possible for hackers to hack an account that has not been logged out from the Internet?

There are two ways to take your question:

Can hackers hack into my computer from the internet to access accounts that I've signed into?

or

Can hackers hack into my online account on the internet because I haven't signed out of the account on my computer?

Both answers are basically "no". But because there are never any absolutes when it comes to security, the true answer for both is that it's extremely unlikely.

TL;DR:

Hacking from without

Movie plots aside, hackers can't just "reach in" from the internet and hijack your signed-in accounts. Firewalls, Windows updates, and good security habits keep you safe. The real risks come from phishing, malware, and weak or reused passwords, not from staying logged in on your computer.

Can they hack into your computer?

If someone successfully hacked into your computer, then yes, they would have immediate access to any accounts you happen to be logged into at the time.

But before you panic, let's look at what that hacker would have to do to make that happen.

They would have to breach your router. Your router acts as a powerful firewall, preventing unsolicited connections from the internet to any computer on your local network. Routers are underrated; they are a very powerful first line of defense.43

They would have to breach the Windows firewall. The Windows firewall is something we rarely think about, as it works quietly in the background. While its history has been spotty, the firewall built into Windows has come a long way and represents another significant layer of protection. While it's technically redundant with the firewall provided by your router, it's so unobtrusive that leaving it on is a fine thing to do.

They would have to breach Windows. Even if hackers were able to bypass both firewalls in their way, they'd still have to find and leverage some kind of unpatched vulnerability in Windows itself before they could gain access to anything. Keeping Windows up to date, as well as keeping your security software up to date, is your best protection in the unlikely event that anyone ever makes it this far.

So, no, I don't see it as being likely at all. This is also why I don't turn off my computer at night as protection against hacking. It's just not that big a threat.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Can they hack into your account?

This one's even easier.

There's nothing about being signed in to an online account on your PC that makes hacking into that account from somewhere else on the internet any easier.

In fact, for some accounts, it could make it a little harder.

Let's say you're signed in to an account on your PC. Now you go to sign in to that same account on your mobile device or another computer. You're instructed to "approve" the second sign-in on the first computer. Approving something on a machine they don't have access to is just not something a hacker has any hope of hacking. Admittedly, most sign-in techniques will let you say "I can't access the signed-in machine", but the alternatives offered aren't affected by your having been signed in in the first place.

Once again, no. Your online account isn't at any greater risk because you stayed signed in on your PC.

The real risks

Hopefully, I've set your concerns to rest. But what about the real risks to your security?

First, if you allow malware onto your machine, that malware can do anything. Your firewall(s) don't protect you if you explicitly download and run something malicious or open an attachment you shouldn't have. All bets are off when this happens. Having that malware gain access to your online account(s) might be the least of your concerns.

Online accounts get hacked for a variety of reasons. Here are the most common mistakes to avoid.

In my opinion, these are the risks you should be paying attention to and ensuring your good habits protect you against.

Podcast audio

Footnotes & References

44: And, interestingly, not by design but by accident. The technique used to share a single internet IP address among several machines has this firewall as a side effect.

Tip of the Day: Check All Your Two-Factor Options Before Giving Up

2025-10-21 08:00:55

Two-factor authentication isn't always limited to smartphones and text messages.

Yahoo Verification Options
Two-factor authorization options. (Screenshot: askleo.com)

I regularly hear from people who avoid two-factor authentication because they don't have a mobile phone or a smartphone, or don't do text messaging.

Depending on the service, two-factor authentication may offer methods that don't require any of those things.

Frustratingly, sometimes they support alternatives without making it clear. For example, Yahoo! requests that I enter a mobile number, which would seem to make two-factor a mobile-only alternative. Not only could I add my landline number, but once I logged in, I was offered additional options, including:

Clearly, two-factor authentication at Yahoo! is significantly more flexible than they make obvious.

Before you give up on the additional security that two-factor authentication provides, make sure you've explored all the options your service supports. While it may not support all the options you might want, it may support more than you expect.

Like me, you may be surprised.

Tip of the Day: Reboot Again After an Unexpected Shutdown

2025-10-20 08:00:28

Lose power suddenly? Reboot again for safety.

The power goes out, and your computer unexpectedly turns off.

Once the power comes back on, the typical approach is to reboot and hope you haven't lost much data and everything is working as it should. If it is, or at least seems to be, you move on as if nothing happened.

I take an extra step: once my machine is up and running, I turn around and reboot it.

The issue is that when you shut down a computer — the first half of a reboot — the operating system writes data to disk and makes sure everything is cleaned up in an orderly fashion. We think most often of files on disk, but modern OSs keep track of a tremendous amount of information about all of your devices and the operating system itself.

When the power simply disappears, the operating system has no way to do that.

When the power comes back on, the OS should notice what's out of whack and clean it up as it boots. But anyone with much experience will tell you that's not always the case. Sometimes an additional, orderly shutdown as part of a reboot will cause the operating system to write to disk what it wasn't able to write before.

It's one small thing that can prevent mysterious errors from cropping up later without explanation.

Why Am I Being Labeled a Spammer?

2025-10-20 08:00:00

Possibly being labeled a spammer is another reason not to forward political and other emails. Do it enough, and your normal email may not get delivered.

The Best of Ask Leo!

You might be collateral damage in the war against spam.

by

Possibly being labeled a spammer is another reason not to forward political and other emails. Do it enough, and your normal email may not get delivered.
Spam Bin
(Image: canva.com)

As I write this, thousands of people have my email address. It's right there on the "From:" line of every newsletter I send.

Naturally, some of them forward me jokes, political messages, hoaxes, or urban legends. I know they mean well and do so with the best of intentions.

But I mark them all as spam. It seems harsh, but I feel I have to.

Because that's exactly what they are.

Even if I don't, others may, and because of that, there's a very important lesson here in making sure that the rest of your email keeps getting delivered.

TL;DR:

Are you a spammer?

Spam is whatever the recipient says it is. If enough people mark your emails as spam, email systems start to consider you a spammer. Be respectful of other people's inboxes, and you should be fine.

What is spam?

In its purest form, spam is email you didn't ask for. Some folks limit it to commercial email, but many do not.

It's a simple definition.

You can argue about it all you want (and I often do), but the fact is, people will push the "Report Spam" button on anything they don't like.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Getting your email delivered

I'll use Google's Gmail as my example here.

When a Gmail user hits the "spam" button on an email you sent, that's a strike against your email account. That person is telling Google that any email that looks like this is spam as far as they're concerned.

One of the biggest things Google can look at as part of trying to define what "looks like this" is the email address the message was sent from.

You.

If that happens often enough or is marked by enough different recipients on Google, then Google will start automatically marking email that looks like that as spam without needing to be told further.

In other words, your email won't get delivered. That includes not getting delivered to all the other people on Gmail who never called it spam.

This applies to just about any email system that has a "Spam" or "Junk" reporting system.

"But I just sent something important/funny/pretty, not spam!"

It doesn't matter. You don't get to define what is and is not spam; your recipient does.

And by reporting spam, your recipients can affect whether your email makes it to others.

I know that this doesn't feel right, but it is what it is. People want control over what shows up in their inbox, and marking any unsolicited email as spam is one way to do it.

Why I have to

In the beginning, I tried replying and asking people to stop forwarding me stuff.

Not only does that take time, but people got angry with me for daring to do so. No one wants to deal with angry people, but I don't want their forwards.

So, one click and it's marked as spam. I get on with my life. If it's a one-shot email, it probably affects nothing. If it's a repeat offender, eventually Google will get the message and mark it as spam for me, removing it from the email I need to see.

This isn't about me

As I said, people got angry when I replied. I expect people will get annoyed at what I've said here, and blame me for being too draconian in my approach to email I didn't ask for.

This isn't about me.

This is about all your email recipients who are doing the same thing without telling you.

If you find that your email isn't getting delivered to people, ask yourself this: Have I been sending them things they didn't ask for? Lots of humor? Petitions? Politics? Irresistible pictures and videos?

If the answer is yes, then it's possible that by using the Spam button, they've convinced their email provider that email from you is spam.

Podcast audio

Do I Need to Make a New Rescue Disc Every Time My Backup Software Updates?

2025-10-18 08:00:42

Worried you need a new rescue disc every time your backup program updates? Relax. I’ll explain when it matters, why it usually doesn’t, and how you can get one at the last minute.

Not really.

by

Worried you need a new rescue disc every time your backup program updates? Relax. I'll explain when it matters, why it usually doesn't, and how you can get one at the last minute.
someone on a boat throwing a life ring to a desktop PC floating in the water
(Image: ChatGPT)
Question: Hi Leo, I've been using the Macrium Reflect program to back up my Windows computer. However, I'm finding that when I try to do an image or a clone backup, I'm prompted each time to update the software. This requires making a new rescue disc, which can be fairly time-consuming as I'm using Macrium Reflect to back up my desktop PC and my laptop, too. I'm concerned that if I don't make a rescue disc each time the software asks me to update (which is every time I open it), my backups won't work and I'll be "you know what" out of luck! Can you advise?

You don't need to make the rescue media every time you back up.

You don't even need to make new rescue media each time Reflect updates itself.

Heck, you may not even need to make rescue media at all until you need it.

There are times it's appropriate to make a new one, but even then, it's not a disaster if you don't.

TL;DR:

Creating rescue media

Rescue media

To restore a backup image to a hard drive, that hard drive can't be in use by other software. Booting from the hard drive means that Windows itself is using it, so you need to boot from something else.

That "something else" is the rescue media or rescue disc. It's also referred to as an "emergency disc" or other terms by other backup programs. It's typically a USB stick from which you can boot your computer when or if you need to restore a backup image to the computer's hard drive.

Most backup programs encourage you to create rescue media when you first install the backup software, or perhaps after performing your first backup. Creating a rescue disc is something you can do at any time from within the backup software.

I encourage you to create rescue media, as well as make sure you can boot from it, so you know you're prepared should the need ever arise.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Backup software updates

You absolutely don't need to make a new rescue disc for each backup. The only time you might consider it is when the backup software itself updates.

My recommendation is that you only make new rescue media on major version updates (say, version 6 to version 7) and not on minor updates (like 6.1 to 6.2) unless the release notes indicate a compelling reason to do so.

Honestly, even then, I'm likely to overlook it and not bother with a new rescue disc at all.

It won't be a disaster.

Just-in-time rescue media

Say you've misplaced your rescue disc or you didn't make one at all, or you realize that your rescue disk is for version 4 of the backup software, and you've since upgraded to version 7.

And suddenly you need to restore a backup image.

Not to worry. You can create one at the last minute.

On another machine — even that of a friend, if needed — download and install the backup program if it's not there already (the trial version will typically do), and create the rescue media. Then take that rescue media to your own machine, boot from it, and you're good to go.

Rescue media isn't tied to your machine, account, purchase, activation, or any specific backup you've created. Any current copy of rescue media for the backup software you use should do just fine.

It's also typically backward-compatible, so if you were backing up using version 4 and all you can download in your time of need to make the rescue media is version 7, it's still not a problem. Newer rescue media should read and restore older backups just fine.

Podcast audio

How to Recover Deleted Data from Your Disk — Maybe

2025-10-17 08:00:56

Think those old files on your hard drive are gone forever? Maybe not. I’ll walk you through what affects your chances of recovery, the tools you can try, and why sometimes, it all comes down to luck.

Resurrecting old files.

by

Think those old files on your hard drive are gone forever? Maybe not. I'll walk you through what affects your chances of recovery, the tools you can try, and why sometimes, it all comes down to luck.
A glowing external hard drive sits on a desk, with beams of light shining out as if it holds hidden treasure.
(Image: ChatGPT)
Question: Is it possible to recover data that was deleted a year ago from an external hard drive?

This is another question that earns my most common answers: "Maybe" and "It depends".

As long as a few conditions are met, it may be possible to recover old data from a hard drive. I'll review what those are and recover some files from a drive I formatted.

TL;DR:

Recovering deleted files

You might be able to recover old files from a hard drive, although it's never guaranteed. If the drive hasn't been used much since the deletion, your chances improve. Tools like Recuva are a good place to start, but often, recovery comes down to luck.

The conditions for success

Several things conspire for or against successful data recovery. The more of these conditions are met, the higher the chances you'll be able to recover files.

1. If you formatted, you used quick format.

I suspect accidentally formatting the wrong disk is one of the more common reasons folks need data recovery. The good news is that as long as you didn't specify "full" format — in other words, you opted for a "quick" format — you dodged a bullet. A full format overwrites the entire hard drive, rendering its contents inaccessible to mere mortals.

2. You're dealing with an external drive.

Recovering data is easier on an external drive than an internal one. If you delete a file from an internal drive that contains the operating system, the data can be unrecoverable because the hard drive continues working, potentially overwriting the file. If you mistakenly delete a file on an external drive and stop using the drive completely, your chances of recovering it are good regardless of how much time has passed.

3. You haven't used the drive for much since deleting.

Now we get into grey areas. The more data you write to a drive, the lower your chances are of recovering what was there before. If you delete a bunch of things and then use the drive, causing a small amount of data to be written to it, the chances are better than if you cause a lot of data to be written. How much is a little or a lot, I can't say.

4. You're looking for something small.

Small files are more likely to be completely recovered than large files. The larger the file, the higher the chances that intervening use will have overwritten some portions within it.

5. You get lucky on layout.

Depending on how the drive was used before the file you're looking for was created, when it was created, and after it was deleted, you could get lucky. In concept44, if there was a lot of data on the drive when the file was created, and if much of that pre-existing data was deleted before the desired file was deleted, it's possible that what you want is on a rarely reached portion of the hard drive, and therefore more likely to be recoverable.

6. You just get lucky.

There's no getting around the fact that if the drive has been used for anything that involved writing data to it, previously deleted data is at risk. A good portion of successful data recovery boils down to sheer luck on where the desired file happened to be written on the disk and whether any of it has been overwritten since it was deleted.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Recovering data from a hard drive

My tool of choice for data recovery is Recuva, from Piriform, the same folks that make CCleaner45.

Some time ago, I formatted a drive I hadn't used in a while. As an experiment, I fired up Recuva and had it scan the drive. Its quick scan turned up nothing, but it offered a deeper scan, warning that it might take some time.

Recuva: No Files Found
Recuva offering a deep scan. (Screenshot: askleo.com)

"Deep scan" results began to show almost immediately.

Initial progress in a Recuva scan
Initial progress in a Recuva scan. (Screenshot: askleo.com)

True to its word, five hours later, it was complete.

Recuva listing "found" files
Recuva listing "found" files. (Screenshot: askleo.com)

Apparently, I had stored music on this drive in the past. While Recuva listed over 109,000 files, my attempts to recover them were unsuccessful. The files recovered were not the original files and could not be played.

This goes to show that when it comes to file recovery, time, as well as lack of activity, is of the essence. This might have been my oldest external drive46, and it was used heavily. Clearly, its use invalidated the information on the drive, preventing the successful recovery of its prior contents.

Podcast audio

Footnotes & References

45: In concept. Various disk formats have different strategies for where to place data on hard drives to minimize wear, so it's possible that this might not even apply. But you could get lucky.

46: As with CCleaner, you do not need to pay — the free version will do just fine — and you should always watch the install options for any unwanted extras or PUPs.

47: It's actually a "limited edition" Seagate FreeAgent Go, engraved with the old Ask Leo! logo.

Tip of the Day: Never Search for "Support"

2025-10-17 08:00:38

Searching for support can easily lead to unexpected and even dangerous results.

Most free services have no telephone support. This is a cost of using a free service: there's no one to call.

At least no one not directly associated with the service.

For the longest time, you could search for (say) "hotmail phone support" and the results would include dozens of listings for phone numbers you could call. There were two problems with those results.

Many search engines have attempted to clean up what ads can be placed on pages resulting from such searches, but misleading ads and the potential for abuse still exist.

My rule of thumb: if there's a phone number, it's likely not associated with the service in question, and almost certainly not free. Heck, even if it's a website, the same rules apply.

Instead, when looking for help about a particular service, start with the service itself. Go to the Microsoft, Outlook.com, GMail, Yahoo!, or other service's website and explore the help and support options right there. Those are official and not scams.

But above all, keep in mind that there's no phone number and no one to call. If there is, that should set off alarms.

Tip of the Day: Know What to Encrypt in the Cloud

2025-10-16 08:00:26

Cloud storage is safe and useful as long as you understand the tradeoff between convenience and security.

Concept: cloud with chains and a padlock
(Image: depositphotos.com)

In various Ask Leo! articles, I've discussed techniques to encrypt the data you place into cloud storage services like OneDrive, Dropbox, and others.

There are tradeoffs, however. One feature of most cloud storage services is your ability to access your files from any browser on any device, anywhere you have an internet connection. If you encrypt your files, you won't be able to access the unencrypted versions that way; you'll need a computer with the storage service's software installed that is running your encryption software of choice. That's not nearly as convenient.

But that's kinda the point.

If, for example, someone hacks into your Dropbox account, all those unencrypted files are immediately visible to them. (As they are to law enforcement, should your files ever come under legal scrutiny.) The extra inconvenience of giving up random online access is the price you pay to ensure that no matter what happens, your files are accessible to you and only to you.

Logging in to the web interface for the storage service is a great way to determine what you want to encrypt. A hacker could access anything you can access there. If that's unacceptable, then you know what you need to encrypt.

In my case, I store lots of unencrypted reading material so I can access it anywhere I choose. I also have folders encrypted with Cryptomator to protect more sensitive information. I can't access those files online, but I know no one else can either.

How Do I Fix the Master Boot Record (MBR)?

2025-10-16 08:00:16

If your computer refuses to start, the problem might be the Master Boot Record (MBR). Fixing it isn’t as scary as it sounds. I’ll show you how to use Windows’ built-in Startup Repair and a couple of handy command-line tools to get your machine running again.

There are a couple of different ways.

by

If your computer refuses to start, the problem might be the Master Boot Record (MBR). Fixing it isn't as scary as it sounds. I'll show you how to use Windows' built-in Startup Repair and a couple of handy command-line tools to get your machine running again.
Startup Repair
(Screenshot: askleo.com)
Question: Can you tell me how to fix the MBR?

The MBR, or Master Boot Record, is the first sector of MBR-configured hard disks. (GPT-configured hard disks have something similar, but I'll be referring to MBR unless the difference matters.) In either case, it tells the BIOS or UEFI where on the hard disk to locate the software to be loaded when you boot the computer.

Without an MBR, or with a damaged MBR, your machine won't boot (power up and load the operating system).

There's a lot more to booting than just the MBR. Fortunately, recent versions of Windows have made the distinction between these various pieces fairly transparent, referring to all of them as "Windows Startup".

I'm not sure what led you to ask about fixing the MBR, but repairing Windows Startup will address MBR problems as well as others.

TL;DR:

Fixing startup and the MBR

If your PC won't boot, Windows has a built-in Startup Repair that often fixes the Master Boot Record (MBR) and other startup issues. Just boot from a Windows setup USB or disc, choose Repair, and run Startup Repair. If that fails, use command-line tools like bootrec /fixmbr.

Startup Repair

Recent versions of Windows now include Startup Repair: software that attempts to fix several problems that can cause a machine to fail to boot. Fixing the MBR is just one of them.

The first logical question to ask is, if you can't boot the machine, how do you run the boot repair tool?

You boot from something else.

Specifically, you boot from a System Repair Disc (a disk you create beforehand, when the operating system is running), or you download the Windows Setup Disc for your version of Windows, which also has these tools.

I'll assume the setup disk since that's more common, and you can download it using a different computer if you need it.

Running the repair

Boot from your Windows Setup CD, DVD, or USB. You'll first be asked what language and keyboard layout you'll want to use. (Not shown.)

Click Next. This will bring up the primary Windows Setup screen.

Windows Setup - Options
Select a setup option. Click for larger image. (Screenshot: askleo.com)

Make sure "Repair my PC" is selected, and click Next. (Previous versions of the setup program may have a "Repair your computer" link in the lower left to click instead.)

You'll be asked for your keyboard layout (not shown) and then presented with a menu of options.

Setup repair menu of options.
The repair menu. Click for larger image. (Screenshot: askleo.com)

Click on Troubleshoot.

Setup repair advanced options.
Advanced options for PC repair. Click for larger image. (Screenshot: askleo.com)

Click on Startup repair.

If the system drive is encrypted using BitLocker, you'll be asked to provide the recovery key. (If the system drive is not encrypted, you won't see this screen.)

Startup repair needing your Bitlocker key.
Entering your BitLocker key. Click for larger image. (Screenshot: askleo.com)

You can locate the key saved in your Microsoft account by visiting aka.ms/myrecoverykey. If you have the key saved elsewhere, you can fetch it from there instead.

Enter the key and click on Continue.

Startup Repair - OS
Choosing your operating system. (Screenshot: askleo.com)

You'll be presented with a list of operating system installations that were found on your machine. In most cases, there'll only be one, as in the example above. Click on it, and Startup Repair will begin.

Diagnosing your PC.
The repair process starts with diagnosing your PC. (Screenshot: askleo.com)

After it completes, you'll either be told that nothing could be fixed (as in my case, since there was nothing to be fixed) or that repairs were made and you can reboot your machine.

If Startup Repair explicitly fails or your computer doesn't start after running it, you can try the command-line tools listed below.

Start repair via the command line

Caveat: I assume that Startup Repair runs these same tools, or their equivalents, for you behind the scenes. In particular, I'm assuming it runs MBR-related tools for MBR-configured disks and GPT-related tools for GPT-configured disks. The hope is that by running them manually, we may get more diagnostic information, if only to provide to a repair technician.

Follow the steps above to boot from the setup disk again, this time clicking on Command Prompt instead of Startup Repair.

Command Prompt option.
Command Prompt option. (Screenshot: askleo.com)

This, naturally, opens up a command-prompt window.

Command Prompt
Command Prompt. (Screenshot: askleo.com)

There are several commands and options available.

bootrec /fixmbr

If all you need to do is fix the MBR, then "bootrec /fixmbr" is the command to run.

bootrec /fixboot

This command attempts to fix the Boot Configuration Data (BCD), which is used by newer boot processes and GPT-configured disks.

bootrec /rebuildbcd

This one rebuilds the Boot Configuration Data (BCD) used by newer boot processes with the operating systems found on the hard disk47.

Unfortunately, errors in these steps are beyond the scope of this article, though as I said, perhaps additional diagnostic information might be made available.

Podcast audio

Footnotes & References

48: I believe this will report "0" installations found if only one was found. My theory is that it's reporting additional installations found.

I Opened Something I Shouldn't Have — Now What?

2025-10-15 08:00:04

Accidentally run or opened something suspicious? We've all done it. I’ll walk you through the options from scans to resets, and consider what to learn from the experience.

If it's malware, it's not good.

by

Accidentally run or opened something suspicious? We've all done it. I'll walk you through the options from scans to resets, and consider what to learn from the experience.
A laptop glowing with a big red exclamation mark on the screen, while a worried person hovers nearby, coffee cup in hand.
(Image: ChatGPT)
Question: I have a question. I recently downloaded a wrong file after being redirected. I even allowed the .exe to run the cmd (I didn't see it type anything in it before closing, though) after allowing the threat in Windows Security. I did a full scan afterwards, and it said everything was fine. Should I still be worried and consider a factory reset?

Worried? Probably.

This is exactly the scenario security folks warn against so strenuously: running or opening something you shouldn't and bypassing warnings from your security software.

Let's look at your options.

TL;DR:

Running what you shouldn't

If you run something you shouldn't, the only 100% safe fix is a full reset or a complete restore from a backup image. Scans may show the computer is clean, but malware can hide. If the risk feels manageable, run complete scans with two tools (like Windows Security and Malwarebytes). Then watch for odd behavior.

The pedantic answer

If what you ran could be malware, there's only one true solution to the situation: a factory reset. (There's one more answer that I'll share below, but it involves preparation.) Back up your machine completely so things can be recovered as needed later, and then reinstall Windows from scratch.

It's brutal, I know.

The problem is that once you allow it to run on your computer, malware can do anything — even hide itself so your security software doesn't see it. In a real sense, once malware is on your computer, it's not your machine anymore.

The only way to be completely, 100% certain that the malware is removed (if, indeed, it was malware) is to erase everything and reinstall.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Risk management

To be clear, the answer above is what most would call The One True Answer. When in doubt, that's what you should do.

However, depending on what you know about what was run and the amount of risk you're willing to take, we might be able to start with something less daunting than a factory reset.

Where did it come from?

Consider where the download came from. If it's from a site you know or at least recognize, that's less risky than what the original questioner experienced: being redirected to a URL you've never heard of.

The same thinking applies to an emailed attachment. If you're certain you know and trust the sender, that's less risky than having opened an attachment from someone you've never heard from before.

What did the security software say?

It's usually a bad sign if your security software complains when you download something or run something.

I say usually because the specific wording of the security software's complaint matters when assessing risk.

For example, Windows Defender SmartScreen might object to a download because it doesn't recognize the application or its digital signature. That doesn't necessarily mean the application is malware; sometimes we ignore its advice when downloading something we know is safe. In situations like this, it's a data point.

However, if your security software tells you something along the lines of "This is malware!", that's a clear sign that something is amiss. Think twice about bypassing that warning.

The less brutal but riskier approach

In this situation, the risk is never zero. But if the risk seems low — perhaps you know where the download came from and your security software said nothing (or something amounting to a simple warning) — then you might consider sidestepping the nuclear option.

That looks like this.

If both come up clean, proceed with caution. Watch for unexpected behavior, but you might have dodged a bullet.

If either scan detects malware, then what happens depends on the tool's ability to remove and/or quarantine the malware. If it's successfully dealt with, you may have dodged a bullet again. If the scans have difficulty removing the malware, then the nuclear option may be your only path to recovery.

If all this causes you concern, that reset might be worth the effort anyway. Back up your machine first (to preserve data). Reinstalling will help you sleep at night.

Learn from the experience

There's no shame here; we've all made these kinds of mistakes at least once. I know I have48. So let's focus on making sure that it remains a one-time thing.

Based on the description, I'd encourage you to:

That other answer

You can avoid a factory reset by doing one thing: restoring your machine to the most recent full image backup taken before you downloaded and ran the questionable software. It's the ultimate undo. It restores your machine to the state it was in before anything happened...

...without spending hours reinstalling and recovering everything.

The catch?

You need to be backing up regularly. Specifically, you need to be taking full image backups regularly. I recommend a process that gets you daily snapshots49.

Podcast audio

Footnotes & References

49: A long time ago. Smile

50: Specifically, monthly full image backups with daily incremental backups.

 

Tip of the Day: Bite the Bullet and Upgrade

2025-10-14 08:00:47

Sometimes, moving on to the most recent version of your software is the most sensible thing to do.

Not everyone will like this tip. It comes from my experience listening to people who waste amazing amounts of time trying to keep older versions of software or operating systems working.

Sometimes, it's most efficient in the long run to bite the bullet and upgrade to the current version. Yes, there may be frustration or a learning curve, but it's often less than you'll get by continuing to bang your head against whatever it takes to keep your old software running.

I'm not saying you should always submit to an upgrade. What I'm saying is that you should seriously consider it. Sometimes you need to cut your losses and move ahead to get your work (or whatever) done.

I don't say this frivolously, nor do I believe in blindly upgrading for upgrading's sake. I understand "If it ain't broke, don't fix it." I also understand that staying with what you have may be the only practical option.

But sometimes it really is "broke" in the sense that it takes more work and effort — not to mention frustration — to maintain the status quo than it would to move forward.

P.S.: That the republication date of this tip aligns with the Windows 10's end-of-support date is a pure coincidence. Honest. Smile

Tip of the Day: Check the Time Zone in Your Online Accounts

2025-10-13 08:00:42

Time zones are important and easily overlooked, particularly with online services.

Time zone
Checking the time zone. (Screenshot: askleo.com)

Time zone information may need to be set correctly in two locations: on your PC, of course, but sometimes also in your online accounts.

As you might expect, the software running on your PC uses this information. Email programs, for example, use it to properly timestamp your outgoing email as well as to interpret the date and time of messages you receive.

However, if you use an online mail server like Gmail, Outlook.com, or others, you may need to locate a separate setting within those services that specifies your local time zone. The information is used in the same way as on your PC — to set and interpret emailed dates and times correctly. If your time zone is set incorrectly, you may find that your email has the wrong times associated with it.

The location of this setting depends on the online service you're using. For larger services, it might not be associated with email specifically, but your account with that service. For example, the time zone setting shown above isn't really part of my Outlook.com account; it's found in the settings of the Microsoft account associated with the Outlook.com account.

What's the Difference Between an Email Account, an Email Address, an Email Program, and an Email Service?

2025-10-13 08:00:28

What’s the difference between your email service, account, address, and program? I'll break it down so you’ll know what each term means, why it matters, and how not to get tripped up next time you want to change your email or ask a question.

The Best of Ask Leo!

Confusing terms.

by

What's the difference between your email service, account, address, and program? I'll break it down so you'll know what each term means, why it matters, and how not to get tripped up next time you want to change your email or ask a question.
Email
(Image: canva.com)
Question: I want to change my email program from Hotmail to something else. How to do?

I'm going to use this as an opportunity to clear up some confusion I see all the time. You might not believe me, but the confusion is extremely common. (And Microsoft isn't helping any, as we'll see.)

An email program is not at all the same thing as an email service, or an email account, or even an email address.

In technology, terminology is important. Time for some definitions, so you won't be confused.

TL;DR:

Email terms, briefly

Email service

An email service is something like Outlook.com, Yahoo! Mail, Gmail, or the services provided by your ISP, domain registrar, school, or place of employment. The service they provide includes the servers and software that:

To begin a metaphor, think of an email service as an apartment building in which you live.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Email account

An email account is a relationship you establish with an email service, and all the storage, features, and functionality it provides. This may include more than email services. For example, Microsoft and Gmail accounts include not only email, but cloud storage services, messaging services, calendaring, contacts, and much more.

An account is often, though not always, identified by a single email address.

In our apartment building, this is equivalent to the apartment where you live.

Email address

An email address uniquely identifies your mailbox as provided by your email service. When someone sends a message to your email address, it's collected by your email service and placed in a mailbox, which you access through your email account.

Email addresses are always in this format:

name@domain

The domain — the part after the "@" — is used to route email to the email service. The service is often obvious from the domain — such as outlook.com, gmail.com, and so on. The domain is used to identify the mail service50 handling its email.

As an email message is on its way from sender to recipient, the name — the part before the "@" — is completely ignored until it reaches the email service handling the email account. Once it arrives, the name is examined to see which account should receive the mail.

In our apartment building, the domain is like the street address: it gets the mail to your building. Your email name is like the apartment number. In the mailroom, the mail clerk uses your email name to place the message in the correct mailbox.

Email program

As soon as you say program, you're talking about computer software. An email program is software you run on your computer or device to access your email. Examples include Microsoft Outlook, which is included in Microsoft Office (but not Outlook.com), Thunderbird, emClient, and many more.

An email program must be configured with your email account information, including your email address(es), password, and more.

Confusion #1: Email programs versus email websites

There are two basic ways to access email: using an email program on your computer or visiting a website online. The latter is often referred to as web-based email.

When you use an email program, email is downloaded to your computer.

When you visit an email website — like gmail.com, outlook.com, or others — you're not using an email program. Instead, you're using your web browser (like Edge, Chrome, Firefox, or others) to visit a website where your email is displayed to you. The email is not downloaded to your computer; it remains on the service's servers in the cloud.

An email program is like a person you hire to run and get your mail from the mailroom and bring it to your apartment. Using your web browser is like running down to the mailroom yourself and storing all of your mail there.

Confusion #2: It's a floor wax and a dessert topping51

So, is gmail.com, for example, an email service? An account? An address? A program? A website?

Some of the above, depending on what you're talking about.

As you can see, "Gmail" can mean many things, depending on the context.

Of course, Microsoft makes things even more confusing.

Confusion #3: The many faces of Outlook

Outlook is not an email service. Outlook is not a website. There's no such thing as an "Outlook" account.

Outlook — now "Outlook (classic)" — is a program that is part of Microsoft Office, which you pay for and run on your computer. Outlook — or more formally, Microsoft Outlook — is an email program you use to access email from almost any email service by downloading it to and managing it on your computer.

Outlook (not "classic", sometimes labeled "(new)") is also an email program. It's the default email program included in Windows 11. Even though it shares the Outlook name, it's significantly simpler and has fewer features than Outlook (classic).

Outlook.com (not "Outlook", but "Outlook.com" — the difference matters) is a web-based email service. Outlook.com is a website you visit to access the email associated with your Microsoft account. Email addresses ending in @outlook.com are Microsoft accounts provided by the Outlook.com email service.

The ".com" matters A LOT. Why? Because Outlook (without the .com) and Outlook.com are completely unrelated to one another — other than both being Microsoft products and both being called Outlook! (Thanks, Microsoft. You have no idea what confusion you've created down here in the trenches.)

Moving machines

Say you get a new computer. To get your email on the new machine, what do you need to move from one machine to another?

If you're using an email program, you need to:

The only thing that really "moved" is your collected email and contacts. Everything else is just configuration to properly access email from the new machine.

If you're using web-based email, things are simpler.

There's really nothing to move from one computer to another because it's all stored online.

Moving accounts

The original question was, "I want to change my email program from Hotmail to something else."

By now, we know you're not changing your email program; rather, you're changing your email service, which means getting a new email account on a new service and then getting a new email address.

At a high level, changing email accounts means you'll take these steps.

It's really no surprise people get confused. There are several layers of complexity here, and many of the terms aren't always used accurately.

Unfortunately, when it comes to computers — and particularly when seeking help for computer problems — terminology matters a lot.

Podcast audio

Footnotes & References

51: Technically, it is used by the DNS service to identify the specific server or computer designated to accept mail for the domain.

52: Kids, ask your parents. Smile

53: Using your web browser, which is a program you run on your computer.

Windows Security to 2028? Why ESU Still Costs Extra

2025-10-11 08:00:16

Wondering why Microsoft charges for Extended Security Updates when Windows Defender will get updates through 2028? They're not the same. I'll explain the difference between malware database updates and actual Windows fixes, and what you really need to know to stay protected on Windows 10.

Two different things, two different dates, and two different costs.

by

Wondering why Microsoft charges for Extended Security Updates when Windows Defender will get updates through 2028? They're not the same. I'll explain the difference between malware database updates and actual Windows fixes, and what you really need to know to stay protected on Windows 10.
Split view showing Defender updates through 2028 and ESU updates through 2026.
(Image: ChatGPT)
Question: If Windows still has "security" until 2028, why is there a fee for Extended Security?

There's no shortage of confusion around Windows 10's end-of-support date. This question has been asked a few times: What's the deal with paying for ESU until 2026 if Windows Security will continue to be updated through 2028?

It's an apples-and-oranges kind of comparison. Even though they have similar names, they're two different things.

Let me explain.

TL;DR:

Security to 2026 or 2028?

Windows Defender will keep updating its malware database until 2028, but that's not the same as fixing flaws in Windows itself. Extended Security Updates (ESU) cover those fixes, pushing updates to Windows until 2026. Defender protects against new malware; ESU fixes Windows bugs.

Windows Defender updates through 2028

In Microsoft's How to prepare for Windows 10 end of support by moving to Windows 11 today article, they include the following statement:

Microsoft will also continue to provide Security Intelligence Updates for Microsoft Defender Antivirus through at least October 2028.

This means that one program — the anti-virus tool in Windows Security called Windows Defender — will continue to receive updates to its database of known malware through 2028. This will allow it to detect new malware that's released between now and then.

This only affects Windows Defender, and only its database of malware53 (AKA Security Intelligence Updates).

The reference to 2028 refers only to Windows Defender.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Extended Security Updates through 2026

If a bug is discovered that creates a severe security vulnerability, Windows Update will receive a patch to fix the software and presumably remove the security vulnerability.

This is what Windows Update normally does. This is what is scheduled to end a few days after this article's posting in October 2025.

The ESU program simply extends that date by one year to October 2026.

It's free if you meet certain conditions, or $30 for one year. If it's available to you, you should find the offer in Windows 10's Settings -> Windows Update.

Podcast audio

Footnotes & References

54: I refer to it as a database, though I suspect it's more complex than that.

Tip of the Day: Support Free Software (If You Can)

2025-10-10 08:00:42

If you find free software useful, consider supporting its creator.

Support Free Software
Donate to support free software. (Screenshot: askleo.com)

In the preceding tip, I suggested that when available, the free version of a software program may be sufficient for your needs.

Particularly when you find such software useful, I recommend supporting the manufacturer with a donation or upgrade purchase if you can.

Put another way: if you can, reward the creators of useful software. Either:

Individuals create free software for a variety of reasons, but it's not done without cost. When possible, show your appreciation.

How Do I Encrypt a Disk?

2025-10-10 08:00:34

Worried about your data if your computer goes missing? Whole-disk encryption can keep prying eyes out. I’ll show you simple, practical ways to encrypt your entire drive so your information stays safe even if your computer doesn’t.

Encrypt the whole thing.

by

Worried about your data if your computer goes missing? Whole-disk encryption can keep prying eyes out. I'll show you simple, practical ways to encrypt your entire drive so your information stays safe even if your computer doesn't.
Hard disk chained and locked.
(Image: canva.com)

Whole-disk encryption is an important aspect of security for many people. If you encrypt a disk properly and your computer falls into the wrong hands, those hands won't be able to access your data.

The average computer user may or may not need to use whole-disk encryption; it depends on the type of data they store and their level of concern. However, encryption is an important tool for business and government users, particularly for portable computers such as laptops and tablets.

TL;DR:

Encrypting a disk

Encrypting your whole disk keeps your files safe if your computer is lost or stolen. Windows Pro users can use BitLocker. Everyone can use VeraCrypt. Both require saving a recovery key or passphrase; without it, you risk losing your data. Once set up, encryption works quietly in the background.

Encrypt a disk using BitLocker

If you're running a Professional edition of Windows or better54, and your disk is formatted using NTFS (most Windows hard disks are these days), Windows can encrypt your disk using BitLocker.

Much like encrypting folders, the technique is simple. Right-click on the drive in File Explorer and click on Turn on BitLocker.

Turn on Bitlocker option
"Turn on BitLocker" option. (Screenshot: askleo.com)

This next step is critical. You must save a copy of the recovery key somewhere. Should you ever forget your password (or lose that USB key, if that's what you select below), having a recovery key is the only way you can regain access to your encrypted data. Exactly how you save it is less important than that you save it somewhere, so that some days, months, or even years from now, you'll have it should you need it.

Saving your Bitlocker recovery key.
Saving your BitLocker recovery key. Click for larger image. (Screenshot: askleo.com)

I elected to save to a file.

Note: this is sensitive data. Keep your recovery key in a secure location. Anyone who has access to it can decrypt your drive.

BitLocker then gives you the option to immediately encrypt only the existing files on your system or all of the files and currently free space.

How much to encrypt.
How much to encrypt? Click for larger image. (Screenshot: askleo.com)

The issue here is that when you delete a file in Windows, the data for that file is not actually removed from the hard disk. It's marked as free space and doesn't go away until sometime later, if and when new data is written on top of it. That implies that if you've used your machine for any length of time, the free space may include fragments of sensitive data. If you're unsure, select "Encrypt entire drive". Regardless of which you choose, all data written to the drive from here on out will be encrypted.

Next, BitLocker asks another question: the "mode" to be used.

Encryption mode to be used.
Selecting the encryption mode to be used. Click for larger image. (Screenshot: askleo.com)

This is basically an improved encryption algorithm. If you're encrypting your internal hard drive, I recommend selecting this new mode. If, as the prompt indicates, this drive might be taken to other machines, use the older, compatible mode.

Finally, it's time to encrypt the drive.

Ready to encrypt.
Ready to encrypt. Click for larger image. (Screenshot: askleo.com)

A reboot is required to begin the process. After rebooting, you'll return to Windows as normal, with a notification.

Encryption in progress.
Notification: encryption in progress. (Screenshot: askleo.com)

How long the encryption process takes depends on many factors, including the size of your disk, the speed of your computer, and what else you're doing on the device while the encryption proceeds. You can continue to use your computer while the disk is being encrypted.

The good news: BitLocker is a strong, secure encryption tool built into Windows. Once encrypted, other than specifying the password to unlock the drive at boot time, it's completely transparent.

The bad news: BitLocker is for Windows only, and not available for Windows Home editions55 or for drives formatted using anything other than NTFS. While it can encrypt disks to be shared with others, only machines running a compatible edition of Windows (Pro or better, supporting the same encryption mode) can decrypt the drives. Using BitLocker assumes you trust Microsoft, particularly if you use the option to store a backup of your recovery key in your Microsoft account.

Encrypt a disk using VeraCrypt

VeraCrypt56 is a free third-party tool that supports, among several other things, whole-disk encryption.

VeraCrypt Volume Creation Options
Options to encrypt with VeraCrypt. (Screenshot: askleo.com)

I'm not going to cover this option in detail, as the VeraCrypt documentation is quite good.

The good news: in many regards, VeraCrypt works almost exactly like BitLocker. Once you specify the passphrase to gain access to an encrypted disk, its operation is transparent. VeraCrypt is free. Volumes encrypted using VeraCrypt should be inherently portable to any system, including non-Windows systems on which VeraCrypt has been installed. VeraCrypt works with all editions of Windows.

The bad news: As with BitLocker, if you lose or forget your passphrase, your data cannot be recovered. There is no back door. There is no recovery key. VeraCrypt is third-party, open-source software, which may raise trust issues for some.

Encrypt almost an entire disk using VeraCrypt

Another approach is very similar to the approach I outlined in How Do I Encrypt a Folder? Rather than using whole-disk encryption, create a VeraCrypt container that is as large as possible on the disk you want to encrypt.

Let's say the disk you want to use is 100 gigabytes in size and is empty. You would use VeraCrypt to create a container as large as possible, approaching 100GB57. That container would appear on the drive as a single, large file. When you mount it using VeraCrypt, another drive letter appears on your system. Files you read and write on that drive are transparently encrypted in the VeraCrypt volume. When it is dismounted, the drive letter goes away, and your encrypted data cannot be accessed.

The good news: VeraCrypt container volumes can be copied to other hard disks, or even other operating systems, and can be accessed as long as VeraCrypt is installed and you know the passphrase.

The bad news: This approach does not work for system drives (the drive containing Windows and from which you boot your system).

Podcast audio

Footnotes & References

55: Essentially, this boils down to anything but the Home or Starter editions. In File Explorer, right-click on My Computer or This PC, select Properties, and look for "Windows Edition" to see what you have.

56: Windows 11 Home edition now includes device encryption.

57: The successor to the now-defunct TrueCrypt.

58: Due to overhead, it can never be exactly as large as your hard disk's capacity. You may need to experiment with sizes that work, or just plan on leaving a little unencrypted space left over. For example, you might create a 99GB volume on a 100GB disk.

Tip of the Day: Check Out the Free Version

2025-10-09 08:00:17

Many programs offer free versions that may completely meet your needs.

Free sign
(Image: canva.com)

Someone recently complained that he wouldn't use a popular tool because the annual price had doubled. In reality, the annual price has remained exactly the same: $0. By focusing on the price, he hadn't noticed that the free version of the software would address his needs completely.

While it's not true for all software, many valuable tools and packages come in two flavors: free and premium. Usually, the premium version offers additional features. The hope is that you'll like the free version of the product, see value in those premium features, and be willing to pay for them.

But it's not required.

You're welcome to use that free tool for as long as you like. Be it free versions of popular backup tools or whatever else, if they meet your needs, keep using the free version until you discover a reason to either upgrade or move to a different tool that fits you better.

Bonus tip: "free" and "free trial" are not the same

"Free trial" is not free. A free trial is software you are free to try for a period before a purchase is required. Truly free software is free forever. Be careful when visiting sites to download software; they often push the "free trial" in ways that might make you believe otherwise.

And as I covered in a previous tip, "free download" also doesn't mean the software is free.

Is Syncing Passkeys Across Devices Safe?

2025-10-09 08:00:05

Passkeys promise more security and less hassle, but is syncing them across devices safe? Learn how password managers handle passkeys and what happens if a device is stolen.

As safe as syncing passwords.

by

Passkeys promise more security and less hassle, but is syncing them across devices safe? Learn how password managers handle passkeys and what happens if a device is stolen.
One key, multiple devices.
(Image: ChatGPT)
Question: If one passkey is synced across multiple devices, what happens if one (like a laptop) is stolen?

Passwords are easy. We understand what it takes to make them more (or less) secure. Passkeys are a little harder to understand, partly because they depend more on behind-the-scenes security measures we don't see.

Fortunately, the benefits and risks of sharing passkeys across multiple devices via a password manager are almost identical to doing the same with passwords.

TL;DR:

Syncing passkeys across devices

Syncing passkeys with a password manager is about as safe as syncing passwords with one. A thief would need to break into both your device and your vault to get them, which is extremely unlikely. With good security habits, syncing makes passkeys safe and easy to use.

Synchronized passkeys

Passkeys are designed to be unique to, and stored on, each device. So, for example, if you use passkeys for your Google account, then:

You need to set up a passkey for each device, typically by signing in some other more cumbersome way58 and then responding "Yes" when the process completes and you're offered the option to set up a passkey.

Some password vaults now allow you to store your passkey not on each device but in your password vault instead. As a result, you have one passkey for that account that you can use on any device (assuming your password vault is installed and unlocked on each device). This means:

It's quite convenient... exactly as convenient as letting your password vault hold usernames and passwords for accounts that don't use passkeys.

That doesn't mean there aren't risks, though.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The risk

Let's say you use your password manager to store passkeys and share them across devices, as I do using 1Password.

And let's say that your laptop, which has your password manager installed, is stolen.

The thief would have to:

There are scenarios where your own behavior can compromise both of those. For example,

then you've arranged a potential perfect storm. But the laptop and the password vault would both need to be compromised, or access couldn't happen.

It's all pretty darned unlikely.

Here's the thing: nothing about what I've just described is unique to passkeys.

Passkeys aren't the issue

The compromise I described above applies equally to accounts that use passwords. In other words, it applies to all the accounts you use today.

If someone somehow gains access to your password vault, they've got access to everything, passkeys or not.

In fact, passkeys may offer additional security because, unlike a password, passkeys generally require authentication, usually as biometrics or a PIN, at the time they're used. If the thief can't supply your face, fingerprint, or PIN, the passkeys remain secure.

But the security hygiene you're already following to secure your password vault secures your passkeys as well.

Personally, I feel 1Password itself and my setup are sufficiently secure. I'm not concerned about this specific threat should my laptop ever be stolen.

Podcast audio

Footnotes & References

59: Not necessarily using a password, but more often responding to an SMS message or emailed link.

60: This applies equally to the hard disk being stolen from the machine. The database is strongly encrypted and realistically uncrackable given today's resources.

61: Unsurprisingly, I have multiple devices.

Tip of the Day: Ignore the Event Viewer

2025-10-08 08:00:50

Event Viewer is a powerful tool. However, if you don't know what you're looking at, it becomes a powerful tool for scammers.

Event Viewer
Event Viewer. (Screenshot: askleo.com)

Unless you're a technician or computer professional and know what to look for, please ignore the Event Viewer.

The problem is that while its intent is good — a repository for Windows and applications to keep a log of interesting activity, or "events" — the results have become such a confusing mess, it's simply not meaningful to the average computer user. There's a lot of valuable information if you know what you're looking for. Software developers, for example, can use the Event Viewer to great effect as they monitor how their software is operating.

Scammers often direct unsuspecting victims to look at the Event Viewer for evidence that their system is misbehaving and needs fixing. Those fixes are usually unnecessary and costly software or even malware. Even a properly operating computer has Event Viewer logs chock full of errors, warnings, and other events. This is normal and not a sign of a problem.

Ignore the Event Viewer. It's not telling you what you think, and certainly not what that strange-sounding gentleman on the phone is trying to make you believe.

Public or Private? Picking and Changing the Windows Network Setting

2025-10-08 08:00:12

Not sure if your Windows network should be public or private, or even what that means? I’ll show you what each means, when to use them, and the simple steps to switch.

Learn which you want when.

by

Not sure if your Windows network should be public or private, or even what that means? I'll show you what each means, when to use them, and the simple steps to switch.
a computer screen showing a balance scale which has the word "Public" on one side and "Private" on the other
(Image: Gemini)

One of the most confusing aspects of Windows networking is the concept of private and public networks. When you set up a network (typically when installing Windows or the first time you make a connection on a new network adapter), Windows makes an assumption about which you want.

Sometimes that assumption is wrong.

Depending on what you do later, Windows may offer to change it. Or not.

I'll review what these network types mean and how to switch from one to the other.

TL;DR:

Public versus Private network setting

Switching your Windows network between public and private is easy. A public network keeps you safer on coffee shop Wi-Fi, while a private one allows home devices to share files and printers. A quick PowerShell command changes the setting, helping you stay secure and connected depending on where you are.

Changing the network type

The easiest way to switch your network type is to use Windows PowerShell60. You must run it as an administrator. First, enter:

Get-NetConnectionProfile

and press Enter. This will display information about the current configuration of your network.

Get-NetConnectionProfile command
Results of the Get-NetConnectionProfile command. (Screenshot: askleo.com)

Note and save the name of the network. In the example above, the name is "Network".

Note that in this example, the "NetworkCategory", as Windows calls it, is "Public".

To change it to private, enter:

Set-NetConnectionProfile -Name "Network" -NetworkCategory Private

If yours is different, replace "Network" with the name displayed by the previous Get-NetConnectionProfile command.

Set-NetConnectionProfile -Name "Network" -NetworkCategory Private
Set-NetConnectionProfile command. Click for larger image. (Screenshot: askleo.com)

You can then re-run the Get-NetConnectionProfile command to confirm that the Network Category has been changed to private.

Of course, if the network is already private and you want it to be public, use "public" instead of "private" in the Set-NetConnectionProfile command.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Private versus public

Now that we know how to change them, let's understand what they mean. This is important for making the correct choice.

Think of the terms as defining not whether you want your computer to be private or public, but rather defining what kind of network you're on.

Private network

When you're on a private network, the implication is that you can more readily trust the other machines on the same network.

Your network at home is a good example. All the machines you have connected to the same router are on the same network, and you can usually trust that all are well-behaved. This is a good candidate for a private network.

Public network

When you're on a public network, the implication is you shouldn't trust other computers on the same network.

Connecting to a (literally) public network — say WiFi at the airport, a hotel, or a coffee shop — is a good example of a public network. You don't know who else is connected to the same network you are, so you don't know whether they've been practicing good security hygiene or even if they might have malicious intent.

Public/private differences

When Windows treats a network as public, the firewall blocks connections from external sources. This means that a random person can't find and connect to your computer and, say, steal files from it.

When Windows treats a network as private, the firewall allows those connections.

The most common time this comes up is when trying to access a network share or network printer on one computer from another. If the network is configured as public, it won't work.

Which do you want?

The choice is simple.

Note also that if you have multiple network adapters — say an Ethernet and a WiFi connection — they can be of different network types. For example, if you connect your laptop via Ethernet at home and use WiFi only when out and about, you can set the Ethernet network as private and the WiFi as public. This allows you to share files and printers with other devices at home while keeping your computer more protected elsewhere. You don't have to remember to switch between the two types.

Podcast audio

Footnotes & References

62: There are ways to do this in the Settings app, but it's different between Windows 10 and 11, and I have no faith that it won't keep changing. The PowerShell approach just works.

Tip of the Day: Move Closer

2025-10-07 08:00:29

When it comes to wireless connectivity, distance and interference can impact signal strength.

Moving Closer
(Animation: askleo.com)

As you might expect, I get a fair number of questions relating to wireless networking.

When the problem is intermittent connectivity or slower-than-expected speeds, one of my first recommendations is to move closer. Move the computer or mobile device closer to the WiFi antennas, and see if or how that impacts the problem.

All wireless communications are subject to interference and signal-strength issues. The closer you are to the source of the signal, the less interference and the stronger the signal. If you move closer and your problems suddenly resolve, you have a pretty clear sign that it's a wireless signal issue. Solutions depend on your situation, but could include moving your device, moving the antenna, getting stronger or better WiFi equipment, or switching to a wired solution.

Sometimes changing position without changing distance can affect the issue. For example, if there's an electrically noisy device sitting between your computer and the WiFi antenna, moving to a position where it's not directly in between may help.

Bonus tip: it's more than WiFi

These issues apply to anything wireless, and that includes Bluetooth. Bluetooth devices are designed to operate at shorter range, but that doesn't mean they don't suffer from signal strength and interference issues. If you're having problems, try moving closer, even if it's just to diagnose the problem.

One thing unique to Bluetooth that's also worth trying: replace or recharge the device battery. Bluetooth connectivity is one of the first things to go when a device's battery is close to exhausted.

Can I Tell If Email I Sent Has Been Read by the Recipient?

2025-10-06 08:00:30

People want to know if someone’s opened their email. I’ll explain why features and tools claiming to do that can't work most of the time. I'll share the only way to know for certain your message was read.

The Best of Ask Leo!

Not with 100% certainty.

by

People want to know if someone's opened their email. I'll explain why features and tools claiming to do that can't work most of the time. I'll share the only way to know for certain your message was read.
A man dropping an email into a black hole.
(Image: ChatGPT)
Question: I sent an email to a friend, and he claims never to have gotten it. I don't believe him; things he's said led me to believe that he did get it and that he did read it. Is there a way I can tell for sure?

I'm amazed at the number of questions I get that boil down to people not trusting each other. Not that there isn't cause, I suppose, with spam, phishing, and malware running all over the place. But this seems like the simplest case of all: was your email read or not?

The answer to your question is no, there is no way to tell for sure that your email was delivered, opened, or read. You might as well have dropped it into a black hole.

I always get a lot of pushback on that.

TL;DR:

Has the message been read

You can't know for sure if an email was read. Period. Tricks like delivery confirmations, read receipts, or hidden images mostly don't work because modern email programs block them. At best, you might get lucky. If you hear nothing, it means nothing. The only proof is a reply.

It's all about certainty

There are solutions that work sometimes, or in some situations, or if the stars align just right.

When they work, they can tell you that an email was delivered and even that it was opened... but they cannot tell you for certain that an email was not delivered or not opened.

If you hear it's been opened, great, you know it's been opened (though not if it's been read). But if you hear nothing, you know nothing. It could have been opened and read, or not.

And hearing nothing is the norm.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Delivery confirmation

Delivery confirmation is a feature that requests an automated return email when a message is delivered.

Almost all email clients now ignore delivery confirmation requests for privacy reasons.

They may occasionally work, but most often do not. If you request delivery confirmation but get no confirmation in reply, it means absolutely nothing.

Read receipt

Like delivery confirmation, a read receipt is a request to the recipient's email client: "Please email me when this message has been opened."

Again, almost all email clients ignore read receipt requests for privacy reasons.

They may work occasionally, but generally they do not. If you request but get no read receipt, it means absolutely nothing.

Images in messages

One approach to seeing if an email has been opened is to include a picture and then notice when that picture is fetched. I might create an HTML email that includes a picture of my dog. That image file is stored on my server. When you open the mail, the picture is fetched from the server, and I can use server logs to see that you opened the mail.

Most email clients don't display images unless you explicitly ask for them. Many people don't.

If the pictures aren't displayed, the server isn't notified, and there's no way to tell that the email was opened. While this might work more often than other techniques, hearing nothing (once again) tells you nothing.

For the record, every service that claims to tell you whether an email has been opened with 100% accuracy uses this technique or something similar and is misleading you about their accuracy. There's simply no way of being 100% accurate. If they require additional infrastructure, like a special mail-viewing program, or if they send people to a website to read your message, then it's no longer email. Those techniques also act as an obvious disincentive to getting your message read, as they're also used by spammers, phishers, and hackers.

Opened is not read

So, all our techniques thus far to see if email was delivered or opened fail most of the time. There's simply no 100% accurate way to tell if an email has been delivered or opened.

Let's say for a moment there was. Let's say we could tell that email was delivered and opened. Even then, how could you possibly tell that a person actually read it?

You can't.

Even if the person has it open on their computer, there's no way to tell that they've actually read it. Unless, of course, they take the time to reply to you and tell you they did. (Though even then, they could be lying.)

Podcast audio

Tip of the Day: Make a Backup Image of Your New Machine as Soon as Possible

2025-10-06 08:00:27

When you get a new machine, you have a unique opportunity to create an important safety net.

Making an Image Backup
Making an image backup. (Screenshot: askleo.com)

When you get a new computer, take a backup image of its hard drive as soon as you can.

That way, should you ever need to revert to factory settings because of a hard disk problem (or any other problem), you can restore the image. All will be as it was on the day you got the machine.

There are two approaches to doing this, one easier and one technically more accurate.

The easier approach, and the approach I recommend: after setting up the machine, immediately install a backup imaging program like EaseUS Todo, Macrium Reflect, or others, and use them to create an image backup of the machine's hard drive. That image will be of the machine as it was set up and with the backup tool installed, so technically it's not quite the exact image of the hard disk as delivered, but it's pretty darned close.

The technically more accurate approach is this: before you set the machine up in any way, boot from the rescue or emergency media that tools like Todo or Reflect can create. (You'd create that media on a different PC.) Using those tools, make a backup image of the computer's hard disk. This will be an image of the hard disk exactly as it was delivered. This is a more cumbersome approach, but if you feel that the true factory-original image is of value, this is how to capture it.

Regardless of which approach you use, save the backup image somewhere safe. As I said, it's the ultimate safety net should you ever want to return the machine to its pristine initial state.

Why Is the Same File a Different Size in Different Places?

2025-10-04 08:00:17

Ever notice that the same file can show up as different sizes depending on where you look? It’s not a mistake; it’s how disks and online services handle storage. I’ll explain why your files can look bigger or smaller, what clusters have to do with it, and why it’s nothing to worry about.

There's size, and then there's size.

by

Ever notice that the same file can show up as different sizes depending on where you look? It's not a mistake; it's how disks and online services handle storage. I'll explain why your files can look bigger or smaller, what clusters have to do with it, and why it's nothing to worry about.
A one byte file displayed in Command Prompt
A one-byte file shown in Command Prompt. (Screenshot: askleo.com)
Question: When backing up online, my pictures only take up ~65 GB, but ~88 GB are reported on my computer. Why?

This is something that's confused computer users for many years: the same file can show as taking up a different amount of space depending on where you look and the characteristics of different disk drives.

Copy that file online and things get even more confusing.

This is not something to worry about. Fortunately, no matter where it's stored or how much space it's reported to be taking up, your file is still your file.

TL;DR:

File size confusion

File size versus file size

I'll use a one-byte file as my example: one-byte-file.txt, shown at the top of the page.

I used Command Prompt specifically because it clearly shows the file size as exactly one byte — unlike Windows File Explorer.

One byte file in Windows Explorer.
A one-byte file shown in Windows Explorer. Click for larger image. (Screenshot: askleo.com)

Explorer lists the file as "1KB" (1024 bytes) in size.

So, what is it, one byte or over a thousand?

Well, in a way, it's both.

To understand why, we need to look at how disk space is allocated.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Clusters

Data on hard disks is stored in sectors of 512 or 4,09661 bytes at a time. This physical organization maximizes the amount of data stored on the media while providing the ability to recover from errors, access data randomly, and do all of it quickly.

File systems, or more accurately, file storage systems, keep track of all the information about files stored on a disk, including the sectors in which data is stored. Rather than track one sector at a time, however, most file systems group multiple sectors in clusters.

Clusters are groups of 1, 2, 4, 8, 16, or more adjacent sectors62. A file system then tracks the location of a file's data by keeping a list of the clusters assigned to it.

CHKDSK (run with no parameters) displays the cluster size used on a drive as "bytes in each allocation unit" at the end of its report.

Allocation Unit - aks Cluster Size
CHKDSK displays the allocation unit, AKA cluster size. Click for larger image. (Screenshot: askleo.com)

You can see that my hard disk has 4096 bytes per cluster63.

Space given versus space used

Conceptually, when I created my one-byte file, the file system had to do a few things:

The file was given an entire cluster — 4,096 bytes of disk space — even though the file size is only one byte.

A one-byte file takes up 4KB of space because that's how disk space is allocated: one cluster at a time. Should the file grow to 4,097 bytes in size, an additional cluster will be allocated; the 4,097-byte file will take up 8,192 bytes of disk space.

Depending on where you're looking, either number might be reported.

But File Explorer showed 1KB, not 4KB

Note that I said conceptually above. In reality, that's not quite what happened.

A file system tracks more than just your file's data. It also records its name, the list of clusters allocated, time stamps, attributes, permissions, and more. All that metadata (data about your data) takes up disk space in the file's directory listing.

In the NTFS file system directory listing, space is allocated one chunk at a time. Regardless of the actual amount of metadata, the space it's given grows 1,024 bytes at a time.

The optimization is simply this: if the file is small enough, and there's enough space in the directory listing to also hold the file's data, it's placed there instead of being allocated any clusters at all. In a sense, the file takes up no additional space on disk beyond its directory listing.

When that happens, Windows File Explorer lists the size as 1KB — the size of the directory listing — rather than the size of the zero clusters allocated to the file.

It's the same online, except different

Now let's look at how the cloud reports file sizes. Cloud storage services use hard disks just like you and I do. Those hard disks are formatted with file systems, and those file systems allocate space in various ways that probably behave much like I've just described. I expect that Microsoft's OneDrive uses NTFS-formatted hard disks to hold your files.

However, it's different in the sense that none of that matters because the hard disks are hidden from you completely. All OneDrive and other cloud storage providers only show you the files and their actual file sizes.

While you need to know how much space your files are consuming on the hard disk on your machine, that information is irrelevant for online storage. It even changes, as cloud storage providers transparently update their infrastructure and may move your data from hard disks formatted one way to hard disks formatted another way.

The result of all this? The pictures that take up 88 gigabytes on your hard disk may only be 65 gigabytes of actual data. Chalk up the difference to a) file system overhead, and b) that disk space is allocated in increments of clusters.

Podcast audio

Footnotes & References

63: 512-byte sectors are most common in older hard drives.

64: A choice typically made when the disk is formatted. And yes, one sector per cluster is often an option.

65: Which is one sector per cluster or eight, depending on the sector size used by the underlying physical disk.

Tip of the Day: Don't Attach; Share Instead

2025-10-03 08:00:27

Emailing a link is much more efficient and polite than including a large attachment.

One way to share a link.
One way to share a link. Click for larger image. (Screenshot: askleo.com)

One thing easily accessible cloud storage gives us is an alternative to the overused email attachment.

Attaching files to email, while useful for getting a document from one person to another, suffers from various problems. Emails with attachments are often large, take a long time to be delivered, and can be erroneously flagged as spam. The attachment takes up a lot of space in the recipient's mailbox.

Send a link instead. It's short, quick, and easy to do.

Using a service like Dropbox, OneDrive, Google Drive, or several others, if you put a file into your cloud storage folder, you can immediately create a link to that file to share with anyone. Above, I'm using Dropbox as an example, but other services are similar. Right-click on the file to see an option to "Copy Dropbox link". That link is placed on the clipboard and can then be pasted into your email message.

https://www.dropbox.com/scl/fi/hkf6pwjl28hcolm9op7t9/InternetSafety-v6-Free.pdf?rlkey=4qyaz5bu4w70v2apmmst61sjb&dl=0

Emailing that link allows the recipient to download the file themselves if they want to, rather than having to deal with the email attachment. And they don't need a Dropbox account to do so.

Your email will be smaller, faster, and more likely to make it through. Your recipient will appreciate that they can choose when, if, and how to download the file on their terms.

How Do I Encrypt a Folder?

2025-10-03 08:00:07

Want to keep your folders private? This article shows three ways to encrypt everything inside a folder. Each method has pros and cons, so you’ll learn which one best protects your files while balancing ease of use.

Three approaches.

by

Want to keep your folders private? This article shows three ways to encrypt everything inside a folder. Each method has pros and cons, so you'll learn which one best protects your files while balancing ease of use.
Locked Folder concept
(Image: canva.com)

Sometimes encrypting a single file isn't enough. Sometimes you want to encrypt all the files in a folder and its subfolders.

As you might imagine, there are several solutions, depending on your particular needs.

I'll review some alternatives, as well as their pros and cons.

TL;DR:

Encrypting a folder

Encrypting a folder keeps all its files safe from prying eyes. Windows Pro can do this with a simple right-click, VeraCrypt uses secure "containers," and Cryptomator is great for cloud storage. Each has pros and cons, but all protect your data with encryption and a password.

Using Windows to encrypt files and folders

If you're running Windows Pro Edition and your disk is formatted using NTFS (as most are these days), then Windows can encrypt your files and/or folders for you using EFS, or the Encrypting File System.

Right-click on the file or folder you want to encrypt — my example here is a folder called "Sensitive Documents" — and click on Properties.

Properties item in a right-click menu.
Properties item in a right-click menu. Click for larger image. (Screenshot: askleo.com)

In the resulting dialog, on the General tab, click on Advanced.

Folder properties dialog.
Folder properties dialog. (Screenshot: askleo.com)

In the resulting Advanced Attributes dialog, make sure that "Encrypt contents to secure data" is checked.

Advanced Attributes
Advanced attributes. (Screenshot: askleo.com)

Click OK. You may be asked whether you want a single item or more than one item encrypted.

Encrypt sub-folders?
Encrypt sub-folders? (Screenshot: askleo.com)

With folders, show above, the second option is to encrypt the folder and everything within it. When encrypting a file, the second option is to also encrypt the folder containing the file.

Include parent folder?
Include parent folder? (Screenshot: askleo.com)

The choice is yours, depending on what you're attempting to do. (I find encrypting a folder and everything within it the most straightforward choice.)

The good news: It's simple, easy, and almost completely transparent to encrypt a folder. Your folder is encrypted, as are the files it contains. As long as you're not logged in, anyone who steals or otherwise gains access to your hard drive cannot gain access to that folder.

The bad news: Anyone (including malware) who can access your computer while you're logged in can access your files.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

VeraCrypt

VeraCrypt
VeraCrypt (Image: veracrypt.io)

VeraCrypt is a successor to the once-popular TrueCrypt. It has a couple of different approaches to high-quality encryption, one of which we can use to encrypt a folder — or at least we can do something very similar.

You can use VeraCrypt to create an encrypted container secured with a passphrase. This is a single encrypted file kept on your computer's hard drive. You then "mount" that file using VeraCrypt, supplying the passphrase to decrypt it. Once mounted, the unencrypted contents of that file appear as a separate drive — often called a virtual drive — on your system. Reading data from and writing data to that virtual drive transparently decrypts and encrypts the data stored in the container file. Once the drive is unmounted, the data is once again inaccessible without re-mounting the container and providing the passphrase.

The specific details are beyond the scope of this article, but as an example, you might create a container C:\Users\%username%\Documents\MySensitiveDocuments and give it a nice, secure passphrase. When you mount MySensitiveDocuments using VeraCrypt and type in the passphrase, you can then assign it a drive letter — I'll use "S:" for this example. Now any program can read and write files and folders to drive "S:", and when doing so, the data is stored inside the file MySensitiveDocuments in encrypted form. Once you unmount the container, drive S: disappears, and the data is no longer visible in unencrypted form.

Using VeraCrypt to manage an encrypted container in this way is very similar to having an encrypted folder.

The good news: VeraCrypt provides high-quality encryption and is available on multiple platforms. Containers created by VeraCrypt are not tied to your login, but are secured by a passphrase. The containers can be copied from machine to machine and opened anywhere. Once mounted, encryption and decryption are transparent to any program reading and writing data on the virtual drive.

The bad news: Containers are monolithic, meaning that regardless of how many files they contain, they are still a single container file. The container size is specified when you create it. The only way to move encrypted data from one place to another is to copy the entire container.

Cryptomator

Cryptomator
Cryptomator (Image: cryptomator.org)

Cryptomator uses a model similar to VeraCrypt but is designed to work optimally with online/cloud services. Rather than storing everything in a single container, Cryptomator maintains individually encrypted files.

When you install and configure Cryptomator, you point it at an empty folder on your machine, which will contain your encrypted data, and specify a passphrase to use for encryption.

You mount that folder using Cryptomator and your chosen passphrase. Much like VeraCrypt, a virtual drive appears. Files and folders transparently written to and read from that virtual drive are encrypted and stored within the folder you originally specified. Once you unmount the folder, only the encrypted copies remain accessible.

The major difference between Cryptomator and VeraCrypt is that Cryptomator maintains the encrypted files and folders as individual files and folders rather than using a single, monolithic container. The article Cryptomator: Encryption for Your Cloud Storage goes into the differences in more detail.

The good news: Cryptomator provides high-quality encryption and is available on multiple platforms. It's highly suited to storing encrypted data on online storage services. Like VeraCrypt, your data is protected by a passphrase and is not tied to your login. Once mounted, encryption and decryption are transparent to any program reading and writing data on the virtual drive.

The bad news: You cannot easily copy individual files encrypted using Cryptomator to other machines in encrypted form. The entire encrypted folder is designed to be replicated to other machines and cloud storage providers.

Podcast audio

Tip of the Day: Understand What "Free Download" Really Means

2025-10-02 08:00:22

"Free download" is attention-grabbing but often misleading.

A button labelled "Free Download"
(Image: canva.com)

Advertisers know that "free" is a magic word. Who doesn't like things for free?

As a result, we often see ads full of free offers: free newsletters, free trials, free samples, and so on.

The one to be wary of is the free download.

Consider that phrase. What it means is that the act of downloading something is free. That's exactly and only what it means.

It does not mean that the product is free. It means that downloading the product is free. They may charge you for anything after that. You may need to pay to install the program, you may need to pay to use it, or you may need to pay after some kind of trial period.

Of course, the product may be truly and completely free.

But the phrase "free download" doesn't mean that at all. It's just used to fool you into thinking so.

How Do I Stop Email from Going to Junk in Outlook.com?

2025-10-02 08:00:00

It's frustrating when email previously marked as "not junk" continues to get sent to the Junk folder. Let's look at your options.

It's a never ending struggle

by

It's frustrating when email previously marked as "not junk" continues to get sent to the Junk folder. Let's look at your options.
a balance scale with one side labeled "Junk", the other labeled "Not Junk" and an arm coming in from off camera putting a thumb on the Not Junk side to make it lower
(Image: ChatGPT)
Question: A newsletter subscription I have had for YEARS recently started going into junk mail! I have had it all along on the junk mail "safe senders" list. Now I added it as a full contact using the exact email from which it is sent. The daily newsletter still goes to junk mail! It is addressed to my Hotmail address, so not a generic address. What gives??

Outlook.com does not make this fix obvious, but it is fairly easy. In fact, it's gotten easier in recent years.

Let's take some steps in Outlook.com to stop emails we want from going to the junk mail folder.

TL;DR:

How Do I Stop Email From Going to Junk in Outlook.com?

There are steps you can take to stop email from landing in the junk folder.

Add to Safe Senders

There is a feature designed specifically for this purpose: the Safe Senders list.

Click the gear icon in Outlook.com's upper right. Click Mail (if not already selected), and then click Junk email.

Outlook.com Safe Senders list.
Outlook.com Safe Senders list. Click for larger image. (Screenshot: askleo.com)

You may need to scroll down to find "Safe senders and domains". Underneath that, click Add safe sender.

Adding leo@askleo.com as a safe sender.
Adding leo@askleo.com as a safe sender. Click for larger image. (Screenshot: askleo.com)

You can add either specific email addresses or domains.

Add to Contacts

Your contacts can also be used to prevent accidental junking.

When viewing a message in Outlook.com, hover your mouse over the "From" address. Outlook.com displays a small card with information about the sender. If you don't move the mouse, the card will expand to include more information.

Adding a From address to Contacts.
Adding a From address to Contacts. Click for larger image. (Screenshot: askleo.com)

Click on the ellipsis near the top of the card, and then click on Add to contacts. That will add this email address to your contacts list.

Adding a contact at Outlook.com.
Adding a contact at Outlook.com. Click for larger image. (Screenshot: askleo.com)

You can supply additional information if you like, but all you really need to do is click Create to create the contact.

You're not done!

Click the gear icon in Outlook.com's upper right, click Mail (if not already selected), and then click Junk email. Scroll down to find "Security options".

Telling outlook.com your contacts can be trusted.
Telling Outlook.com that your contacts can be trusted. Click for larger image. (Screenshot: askleo.com)

Make sure that the "Trust email from my contacts" is checked, and click Save. Now, email from anyone in your contacts will bypass the junk folder. Consider all the various newsletters, marketers, and other email addresses that end up in contacts before you do this.

An occasional complication

For a variety of reasons, mostly related to fighting spam, a newsletter might come "from" a different address than is displayed in the From: field. For example, for a long time my newsletter:

It's now back to only "leo@askleo.com". For now. Smile

Each of those other email addresses might be ones you'd want to add to your safe senders list, or contacts.

Here's the catch: it's difficult to determine if one of those other email addresses is being used. Outlook.com, which also keeps changing, has displayed them in the past, so it's fairly obvious, but it's also possible that they're hidden. The only way to know for certain is to look at the email's full headers for entries related to From, Sent-by, Reply-to, and similar.

I know that's beyond what most people are comfortable doing.

The good news in my example above is that simply adding my email provider's domain — aweber.com — to the safe senders list would address them all, whether they're used or not.

Podcast audio

Tip of the Day: Prefer "docx" Over "doc"

2025-10-01 08:00:44

The newer .docx format is more capable and creates smaller files.

Doc to DocX graphic
(Image: askleo.com)

Many years ago, Microsoft Office programs were upgraded to use a new file format by default — the "x" or "extended" format — signified by the filename extension ending in "x". ".doc" became ".docx", for example. Other Office applications went through a similar transition: ".xls" became ".xlsx", ".ppt" became ".pptx", and so on.

Existing documents were not changed, however. If you have a Word document in ".doc" format, it stays in that format unless you explicitly perform a "Save As..." and manually save it in the new ".docx" format.

A couple of decades after the change, we're still seeing documents in the older formats being used and shared.

I suggest you switch.

Unlike the older formats, the "x" formats are compressed to take up less disk space. They also use new features and functionality in newer versions of Word. But most importantly, the file will get smaller — often significantly smaller.

Bonus tip for the adventurous

The compression used in the Office "x" files is plain old "zip" compression. That means you can do some interesting sleight-of-hand, although it may not be particularly useful.

Take a Word ".docx" file and rename it to ".zip". Now use your favorite zip tool to examine the contents. You'll find many obscure files and folders that make up your Word document.

Docx file opened as zip
A .docx file opened as a zip file. (Screenshot: askleo.com)

It's not terribly useful — except perhaps in some data recovery or extraction scenario — but I find it an interesting glimpse behind the scenes.

Should I Update to Windows 11? (October 2025 update)

2025-10-01 08:00:09

Windows 10 support ends October 14, 2025. Should you move to Windows 11? I’ll walk you through the pros, cons, and options: upgrade now, wait for new hardware, or even stick with Windows 10 safely. The choice is yours, but it’s time to decide.

Applies to Windows: 11, 10

If you can, probably.

by

Windows 10 support ends October 14, 2025. Should you move to Windows 11? I'll walk you through the pros, cons, and options: upgrade now, wait for new hardware, or even stick with Windows 10 safely. The choice is yours, but it's time to decide.
Windows 11
(Screenshot: askleo.com)

Updated September/October 2025.

The time is here. October 14, 2025, is upon us. Windows 10's end of support is imminent.

With Windows 10 support coming to an end, it's time to consider what you want to do.

TL;DR:

Is Windows 11 for me?

Windows 11 is a stable, usable system. It feels more like what we used to call a "service pack" to Windows 10: a feature refresh more than a completely new version of Windows. With Windows 10's end-of-support date approaching in October, it's worth considering the switch if your hardware supports it.

I'm (still) not saying you have to

Before anyone takes this the wrong way, I am in no way saying you must upgrade to Windows 11. I recommend you do so if you can, but that's all it is: my recommendation.

As I've said in multiple places and times, Windows 10 will keep working beyond its end-of-support date. You can continue to use Windows 10 safely by taking more responsibility for your security. You can also consider enrolling in the Extended Security Update program (ESU) to, in a sense, push the end-of-support date out one additional year.

Eventually (though not immediately), some of your third-party applications may also end their support for Windows 10.

If you don't want or can't upgrade to Windows 11, keep calm and carry on in Windows 10.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Windows 11

Windows 11, now four years old, is a fine version of Windows.

I've been using it daily almost since the day it was released, and I've been happy with it from the start. I have it on both my primary desktop PC and my laptop.

Honestly, it feels more like a large feature update to Windows 10 than a completely different version of Windows. The taskbar was moved, and there's a somewhat different look and feel to it, but it's pretty much the same operating system. I know not everyone feels this way, but from my perspective, there wasn't much to get used to when I switched. It, and I, just kept on working.

Until now, though, my take was that Windows 11 rated a big "meh". There wasn't any compelling reason to switch.

However, since Windows 10's end of support is getting closer, I think it's time to consider the change — as long as your hardware supports it.

Yes, the requirements are frustrating

One frustrating aspect of Windows 11 is its system requirements. Many machines — even some newer ones — fail the compatibility test.

There are workarounds for installing Windows 11 if your machine isn't up to the requirements.

(Microsoft has disabled many of the previous workarounds, and those mentioned in the article above may be disabled as well at some point. Microsoft has also indicated that machines updated to Windows 11 through those workarounds may not receive updates or may have other issues Microsoft won't address.)

Windows 11 on a new machine?

New machines are likely to have Windows 11 pre-installed.

Keep it. It's fine.

There's no reason to run away from Windows 11. As I said, I use it every day, and it's just as fine as Windows 10.

Aside: The every-other-version "curse"

This is not a reason to avoid Windows 11, but some may take it as one. It's at least interesting.

Windows XP Popular
Windows Vista Not so much.
Windows 7 Popular
Windows 8/8.1 Not so much.
Windows 10 On over a billion machines. Very popular. Still.
Windows 11 ???

It's as much superstition as anything else, and by itself, it's not a reason to avoid anything, particularly since there's been no word about any successor to Windows 11.

And yet. There does seem to be a pattern.

Make of it what you will.

But what about... ???!!!

To say Windows 11 elicits strong opinions in some people is perhaps an understatement. I want to address some of the more common ones.

Everyone hates Windows 11!

No. Here's the thing: you're only likely to hear from people who are experiencing issues. They look for help (or just vent) in various public forums. The people who like it — the people for whom it's working just fine — are quietly getting on with their work. I'm convinced there are many, many more of them than there are haters.

Microsoft is evil/spying/scanning/etc.!

That's not a Windows 11 problem. I know some feel Windows 11 is worse in some "Microsoft is evil" kind of way, but I don't see it. Windows 10 introduced much of the telemetry people complain about. To the best of my knowledge, Windows 11 hasn't made that significantly worse.

Windows 11 pushes things on me I don't want!

That's not a Windows 11 problem either. Seriously, every version of Windows includes features and functionality that many (though again, not all) people object to. Sometimes people grow to like the features, and sometimes the features disappear.64

In addition, many of the current complaints aren't about Windows 11 per se but about specific features being introduced and pushed hard across both Windows 10 and 11. What's worthy of your ire is how Microsoft is pushing the features. (*cough* OneDrive *cough*)

Microsoft is colluding with hardware manufacturers to force us to buy new machines!

Oh, hell no. Honestly, this conspiracy theory frustrates me to no end. No one is forcing you to purchase a new machine. Stick with Windows 10. Switch to Linux. Use one of the hardware requirement bypasses. None of those options requires you to spend a dollar65.

Yes, eventually you're likely to get a new machine, not because anyone forces you to, but because it's time. That's been the case since PCs were invented. As a side effect, you'll have a machine that meets the new hardware requirements.

You're just a Microsoft shill!

I often get accused of being on Microsoft's payroll (I haven't been for decades, long before Ask Leo!), getting paid to endorse them (I have yet to see a check), or some kind of Microsoft apologist. When I recommend you consider Windows 11, it triggers the anti-Microsoft crowd something fierce.

I'm a realist. I have lots of complaints about Microsoft and Windows. Lots. But I also realize that leaving Microsoft and Windows behind isn't in the cards for many people, including most of my audience. Railing against all of Microsoft's evils — of which I agree there are many — wouldn't be helpful. Helping people switch to something else would benefit only a small portion of my audience.

Instead, I try to help people make informed decisions and work within the system they have.

Podcast audio

Footnotes & References

66: Cortana, we hardly knew ye.

67: Or whatever your local currency might be.

Tip of the Day: Sometimes Replacement Makes More Sense

2025-09-30 08:00:56

Sometimes replacing or upgrading your old hardware or software is the easiest solution to a problem.

Update button
(Image: dollarphotoclub.com)

I often counsel folks that hardware rarely needs to be replaced because of a software problem. If your machine is full of malware, for example, you don't need a new machine; you need to wipe it and start over with clean installs of everything.

There are scenarios, however, where replacing hardware and/or software may be more realistic.

For example, you might need new software — an application or an operating system — that pushes the limits of what your hardware can do. You could spend a lot of time trying to tweak settings and make changes, trying to shoehorn the system into place so it's functional...

...or you could get a new machine. If your budget allows, it's a quicker and longer-lasting solution than whatever you cobble together.

The same is true for software. You may be happy with the 15-year-old version of an application, but there's a good chance that eventually it won't be supported on current versions of your operating system or on newer hardware. Again, you can spend a lot of time and effort looking for tweaks and workarounds or alternatives... or you can upgrade the application to the most current version.

This requires learning the new version's nuances, but again, it may be the most realistic solution. It's quicker and likely to last longer than whatever you do to keep the old version afloat.

I'm not saying you always need to replace or upgrade, but I am saying that you should consider it when things get too tenuous.

Tip of the Day: Never Reply to Spam

2025-09-29 08:00:09

Replying to spam is tempting but pointless. It often gets you more spam, not less.

It's a comment I hear frequently: "I replied to the spammer, telling him to stop..."

Don't do that!

The only effect it might have is that you will get more spam.

In most spam, the "From:" address that you would reply to is fake. Your reply will either:

The net effect is that nothing changes.

Some spam actually has a "From:" (or "Reply-To:") address that works, but messages sent to it don't go to anyone who cares, if it goes to a real person at all. When you reply to this address, the person or spambot notices that your email address is real and knows you got their spam and read it. They'll ignore whatever you say to them. Instead, you'll get more spam.

Spam is a pain — I get that — but replying to it is not the solution.

Instead, use the "this is spam" button in your email program or service to automatically filter the spam into your spam folder, where you need not look at it.

Why Is My Machine Slowing Down?

2025-09-29 08:00:00

Is your once-speedy computer crawling? From hidden malware to too many background apps, there are plenty of reasons your PC might feel sluggish. I’ll walk you through the most common causes and what you can do to get things running smoothly again.

The Best of Ask Leo!

Maybe it's not just tired or overworked.

by

Is your once-speedy computer crawling? From hidden malware to too many background apps, there are plenty of reasons your PC might feel sluggish. I'll walk you through the most common causes and what you can do to get things running smoothly again.
Computer screens showing progress bar, and a frustrated user.
(Image: canva.com)

Perhaps when you purchased it, your computer ran like a champ and quickly did everything you needed. Now, well, not so much. Perhaps it takes forever to boot. Or starting applications is slower than molasses. Or maybe the machine just acts sluggish when you try to use it for just about anything.

Regardless of the specifics, the underlying theme is simple: It's slow.

There are so many reasons a machine could slow down. I'll list a few of the most common reasons here, along with some advice on what steps to take.

TL;DR:

Your slow machine

A slow PC can be caused by malware, misbehaving programs, too many apps running, aging updates, or failing hardware. Check for viruses, trim unnecessary startup programs, add RAM or an SSD, and, of course, back up in case of hardware failure. Small fixes can often bring big speed improvements.

We're talking about a slow computer

An assumption I'm making here is that it's your entire computer that is slow, not just one or two applications.

For example, if Edge has slowed down while the rest of your software runs just fine, you need a different approach than what I'll outline here. Instead, you'll need to focus on the specific applications that are behaving slowly. The solutions may be the same, but arriving at those solutions and choosing one will depend on investigating the issue with that specific application.

Here, we're talking about a slow computer: just about everything seems slow.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Sudden slowdowns: Malware comes to mind

If the slowdown is sudden and severe, the first thing that comes to mind these days is malware.

Different malware does different things, and it behaves differently on different machines. One symptom of malware can be a suddenly slow or sluggish system.

Your security software is your first line of defense. Make sure it's up to date, and run full scans. Here's How to Run a Full Scan Using Windows Security.

Sudden slowdowns: A program run amok

Another step I take when my computer seems to slow down, particularly if it's sudden and unexpected, is to fire up Process Explorer. Very often, the source of a system slowdown can be attributed to a single program running on your machine that is attempting to use all available processing resources. When that happens, other programs (often including Windows itself) aren't able to respond to your actions as quickly.

How Do I Find Out What Program Is Using all My CPU? walks you through the steps to identify any processes in this state.

Similarly, a program that's using the disk heavily (i.e., the activity light isn't even flickering, it's just on), or even using the network heavily, can manifest as a slow system. Why Do I Have Constant Disk Activity in Windows? and How to Monitor Network Activity and Speed up Your Machine's Connection will help you identify those culprits, if present.

Sudden or gradual slowdowns: impending hardware failure

This isn't as common, but it definitely happens.

We normally think of most hardware failures as sudden and catastrophic. Sometimes, they're a little less catastrophic than we think.

For example, if a sector on a magnetic hard disk is going bad, that may first manifest as a slowdown whenever that sector is accessed. The disk drive will try multiple times to read a marginally bad sector before giving up, and that takes time. If multiple sectors are affected (which is common if it's an area on the disk media that's been damaged, for example), then this might happen for more than one sector, and that time adds up. The system keeps working because the sectors aren't so bad that they actually fail, but they take additional time to be read because they're going bad.

Back up, of course. Impending failure can quickly become actual failure and data loss.

In situations like this, when dealing with traditional magnetic hard disks, I start by running CHKDSK /R, and/or SpinRite to diagnose and possibly repair the hard disk in question.

Gradual slowdowns: Too much stuff

In my experience, the #1 cause of a system gradually slowing down over time is that it's being asked to do too much.

Many software packages install components that run all the time, whether or not you're actively working with the software in question. Install enough of those types of packages, and you may have a small army of components all starting automatically and running in the background, using resources constantly.

To be clear, some software needs to run all the time. But I see many that don't really need to, but run all the time anyway. Examples include:

Those are all legitimate, depending on how you use your computer.

I've also seen applications install tools that load the application when you boot your computer, whether you use the application or not. The reason? It makes your eventual use of the app seem faster, since it's already loaded. Unfortunately, it's at the cost of a slower boot or sign-in time.

There are two approaches to resolving the "too much stuff" scenario.

Gradual slowdowns: Updates

In a sense, this falls into the "too much stuff" category, but it applies even if you haven't made a single change.

It's commonly understood that systems get bigger over time. That's more or less the nature of software evolution and our expectations of ever-increasing functionality and support.

While we normally associate that with major version updates (i.e., Windows 11 is larger than Windows 10), it can actually happen — slowly — at the system or application update level as well.

Years of updates slowly increase the resource requirements of your operating system and applications. Particularly if your system is already somewhat marginal, that increase can be enough to affect your overall performance.

Note that I'm not talking about files left behind after an update (unless, of course, your hard disk is full), but simply the scenario where the patched version of an application might need ever so slightly more RAM than before. Repeat that for all the applications you have installed and the updates your system receives, and it adds up.

Once again, adding RAM or uninstalling programs you don't use can help if this is the case.

Podcast audio

Why CAPTCHA?

2025-09-27 08:00:27

Been asked to spot bicycles or click “I’m not a robot”? That’s CAPTCHA at work. Here’s why websites use them, how they’re changing, and what it means to be asked to prove you’re human.

Are you human? Prove it.

by

Been asked to spot bicycles or click "I'm not a robot"? That's CAPTCHA at work. Here's why websites use them, how they're changing, and what it means to be asked to prove you're human.
a robot standing behind a sign that says "I am not a robot."
(Image: ChatGPT)

We've all seen them and been frustrated by them. Click on all the images that contain a bicycle. Or a bridge. Or stairs. Or click this slider and move it to the right until the image is properly aligned. Or pick the two things shown in different orientations that are the same.

Those are all CAPTCHAs, which is an acronym for Completely Automated Public Turing test to Tell Computers and Humans Apart. It's even trademarked by Carnegie Mellon University.

As frustrating as they are, they exist for an important reason.

TL;DR:

CAPTCHA conundrum

CAPTCHAs confirm that you're human, not a bot. They stop spammers from flooding websites with junk. While sometimes annoying, they keep the internet usable. As AI gets smarter, CAPTCHAs keep changing too. Next time you click "I'm not a robot," remember it's there to protect us all.

It all starts with spam

As with so many things these days, it's all about spam and spammers.

There are several scenarios in which CAPTCHAs stem the tide of spam.

Without CAPTCHA, it's easy to use a computer program to open thousands66 of free email accounts and start sending spam from them. Sure, the accounts would eventually be blocked, but the program just keeps on creating thousands more.

Without CAPTCHA, it's easy to use a computer program to leave thousands of spammy comments on Ask Leo! and other blogs and websites. It's easy to overwhelm just about any website that has an input form that even looks like it might be a comment-submission form.

Spammers are responsible for untold millions of dollars in additional costs and burden on website owners and internet users.

CAPTCHAs are one way to keep that from growing out of control.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Computers trying to act like humans

One of the oldest challenges in computer science is to build a computer (or software) that mimics "thinking" like a human and does it so well you can't tell the difference. Asked a series of questions, you wouldn't be able to tell whether the responses came from a real human or a computer.

That's referred to as a Turing test, named after the computer scientist Alan Turing.

You've probably heard more about it of late with the rise of AI. Many AIs can pass various forms of Turing tests. More on that in a moment.

A CAPTCHA is a kind of Turing test. It's a test to prove you're human.

Why CAPTCHAs (mostly) work

Until recently, the old-style distorted letters style of CAPTCHA stymied computer programs.

And then this happened.

ChatGPT solving a CAPTCHA.
ChatGPT solving a CAPTCHA. Click for larger image. (Screenshot: askleo.com)

I didn't even tell ChatGPT what to do. I just pasted in the image that I used to use in this article — an example of what was once impossible for computers to decipher — and it simply returned the result.

Yikes.

And I'll bet you haven't seen that style of CAPTCHA for some time.

Even the ones we do see — distorted image identification and matching — are slowly becoming things that current AI can figure out.

The result, of course, is an arms race. You can expect to see more and different forms of CAPTCHAs in the future.

One drawback to CAPTCHA

CAPTCHAs have one huge drawback: they assume you can see.

Blind computer users — of whom there are many — cannot complete a visually oriented CAPTCHA.

As a result, there are alternatives. Some use audio (asking the person to type a series of characters), or even simple math expressed as a sentence ("What do you get when you add two and seven?"). The goal is the same: answering these types of tests is surprisingly difficult to automate, so a correct result is reasonably possible only if you're human.

Of late, an even simpler CAPTCHA has become popular: the "click here" CAPTCHA.

recaptcha1
A "click here" CAPTCHA. (Screenshot: askleo.com)

As simple as this seems, it's apparently fairly effective. The "trick" is that you can't click the checkbox right away. It's replaced by a spinning disk until it's ready for your input. Current automated spam bots aren't capable of something as simple as detecting that a delay is required.

I'm No Robot
A "click here" CAPTCHA resolved. (Screenshot: askleo.com)

Some employ other behind-the-scenes tricks, such as monitoring mouse movement while they wait, to determine whether or not the entity at the keyboard is a human or not. Many CAPTCHA techniques now rely on behavioral analysis rather than on your ability to identify bicycles in a grid.

Why Ask Leo! has no CAPTCHA (today)

My website takes comments, but I currently don't use CAPTCHA. How's that possible? I do get a lot of spam.

Spam count so far today.
Spam count so far today. (Screenshot: askleo.com)

I pay for a service that attempts to block spam. That number above — 381 — represents a little over half a day's worth of blocked comment spam attempts. I'm sure it'll pass 600 attempts by the end of the day. We're looking at something like a quarter of a million attempts to post spam comments here every year.

Because spammers aggressively and constantly change their approach, I'm not ruling out requiring CAPTCHA sometime in the future. But for now, things seem to work well.

Except things are getting worse.

Why so many sites use CAPTCHA

A few days ago, one of my servers — fortunately not the one housing Ask Leo! — bogged down to a crawl and finally crashed. The culprit? Bots and scrapers. Specifically, a new genre of spiders that are scraping websites for content to feed AI large language models. There are so many, and they are so persistent and overwhelming, that they can bring websites to their knees.

Not to mention copying all their content.

As a result, many websites now present a CAPTCHA before you can even view their content.

It's no longer only about spam, but about protecting the servers and the content that the websites present.

In my case, I just beefed up the server specs a little, and all seems well. For now. I'm not as concerned about content "theft", as some see it, as I am about just keeping my servers online.67

Podcast audio

Footnotes & References

68: And by "thousands", I mean hundreds of thousands, if not millions.

69: Not as concerned, or perhaps simply resigned to the current state of AI.

How Do I Encrypt a File?

2025-09-26 08:00:21

Want to send a file safely by email? I’ll show you how to use the simple .zip format with a strong passphrase so your private documents stay protected across Windows, Mac, or Linux platforms.

Sharing files securely may be easier than you think.

by

Want to send a file safely by email? I'll show you how to use the simple .zip format with a strong passphrase so your private documents stay protected across Windows, Mac, or Linux platforms.
Computer screen showing a concept of a document with a padlocl.
(Image: ChatGPT)

Sending an encrypted document as an attachment is a reasonable approach to securely sending information in what is otherwise an insecure medium: email. Even though there are approaches to encrypting email messages themselves, they're either obscure or complex (or both), and not widely known.

Encrypting individual files can also be an important step in secure data management.

I have a specific recommendation that should be easy and work just about everywhere.

TL;DR:

Encrypting a file

Encrypting a file is easy with 7-Zip. Put the file in a .zip archive and set a passphrase. The result works across Windows, Mac, and Linux. Share the file securely, but give that long-and-strong passphrase separately.

Zip it

The .zip file format, formally referred to as an "archive", lets you bundle multiple files together into a single file that is compressed to save space.

Password-protecting a zip file encrypts its contents.

There's nothing that says you must include several files in the archive; you can also use .zip to encrypt single files.

I'll use 7-Zip for my example, but the .zip file format is widespread, and zipping tools are available on every platform, including Windows, Mac, and Linux. You should be able to decrypt a zip file encrypted on one platform on any of the others.

Open 7-Zip and navigate to the folder containing the file you wish to encrypt. Right-click on the file, select 7-Zip, and then Add to archive.

Encrypting a single file in 7-Zip. Adding.
Encrypting a single file in 7-Zip. Adding. Click for larger image. (Screenshot: askleo.com)

The other quick options, like "Compress to ‘<filename>.zip' and email" look convenient, but they don't encrypt; thus, our use of the "Add to archive..." option.

7-Zip add to archive dialog.
7-Zip add to archive dialog. Click for larger image. (Screenshot: askleo.com)

The first field lets you name the output file. By default, it'll be the name of the file you selected, with the extension changed to .zip.

Settings to pay attention to:

  1. Set the archive format to "zip". This ensures that 7-Zip is not required to extract the file. Anyone with a Zip program (and the password) can open it.
  2. Enter a password — more ideally, a passphrase — to secure the file.
  3. Select the encryption method: ZipCrypto, the default, is the most compatible across different unzipping programs. AES-256 is somewhat more secure. I'd recommend AES-256 unless your recipient tells you it doesn't work in their zip program.

Click OK, and 7-Zip will create your .zip file.

A file and its encrypted zip.
A file and its encrypted zip archive. Click for larger image. (Screenshot: askleo.com)

In this example, I encrypted a random ChatGPT .png image. Note that most zip utilities leave the original alone. You may want to delete that if you don't want an unencrypted copy of your file to remain.

You can now send that file to others, and they can use their zipping program to extract the contents of the file. (Be sure to share the passphrase separately — ideally via a method other than email.)

7-Zip command-line

I'll be honest and say that I'm not a big fan of the graphical interfaces of most zipping utilities. They're too confusing and cumbersome for me.

Here's what I really do to zip a file: in a Windows Command Prompt, where the file I want to encrypt is in the current directory, I type:

7z a -tzip -p example.zip example.doc

Where:

To decompress and decrypt the zip file back into its original file or files, the command would be:

7z x example.zip

Where the "x" command simply stands for extract.

One Zip drawback

One characteristic of the zip file format is that even when encrypted, the list of filenames it contains remains readable. The net effect is that in our example, someone without the password may not be able to see the contents of our file, but they can still see its name.

The traditional solution to this is to rename the file to something obscure before zipping, or to zip twice. Zipping twice has the added benefit of preserving the original filename for the intended recipient.

The net effect of this approach is that the contents of the files, as well as the names of the files contained within the original zip, are protected.

What about Windows?

Windows File Explorer includes .zip file support.

Except.

It's not possible to create a password-protected zip file. You can use Windows File Explorer to open password-protected zips, like the ones we created above, and you can use it to create zip files that are not password-protected, but that by itself doesn't solve the problem at hand: encrypting a file.

You are the weakest link

There's a lot of discussion about which encryption technology is the "best" and thus least susceptible to cracking. This is an important discussion, and I believe the scenarios above are sufficiently secure for all but the most demanding applications.68

However, hackers rarely gain access to encrypted files by cracking the algorithm.

Instead, they simply hack the password.

Picking a weak password makes that kind of discovery easy.

Unlike hacking passwords online, in this case, an attacker can spend as much time with your encrypted file as he or she would like to. In fact, they can throw as much computational power at it as they want to perform a brute force attack, trying every possible password.

An eight-character password is nothing to an offline brute-force attack these days.

That's why most of these programs don't use the word password but default to passphrase.

Rather than using a short eight-character password, use a longer phrase comprising four or five words that total at least 20 characters or more. No matter how you do the math, this is virtually uncrackable using current brute-force techniques.

Podcast audio

Footnotes & References

70: Depending on your needs, you can delve deeper into different algorithms used in most zipping programs, or dive into public key encryption with PGP/GPG.

Tip of the Day: Try Not to Cancel Installs

2025-09-26 08:00:10

Set-up programs rarely get the respect they deserve. As a result, they may not handle your cancel request as well as they should.

Cancel Install
"Cancel installation?" dialog. (Screenshot: askleo.com)

Installation and setup programs have a checkered history. They're tasked with installing important software, yet they are not actually part of that software. They're often developed by a different team and frequently with less-than-ideal resources.

Put another way, they rarely get the respect they deserve.

The result is that they're often not as robust as we want them to be.

For example, sometimes they don't react well to being cancelled partway through. Aborting an installation can leave remnants of partially installed components behind. In the worst case, those remnants can interfere with subsequent attempts to install the same software.

I'm not saying all setup programs are like this; only some, and perhaps only a few. The problem is we can't know beforehand which is which.

As a result, two pieces of advice in today's tip:

  1. Only install software you're sure you want to install.
  2. Once an install has started, let it run to completion even if you change your mind. You can uninstall it more cleanly after that.

I realize that letting it complete isn't always an option, depending on the situation, but if you can, do.

Tip of the Day: Use Local Folders to Avoid Email Loss

2025-09-25 08:00:32

Local folders are a way to copy email locally to your PC and out of reach of IMAP deletions, accidental or otherwise.

One of the legitimate concerns about connecting a PC-based email program to an online email account using IMAP is the fear of email loss.

IMAP synchronizes email across multiple machines. For example, if you read an email on your mobile device, it's marked as read on your desktop. Delete an email on your desktop, and it disappears from your mobile device. It's a great way to manage multiple devices accessing the same email.

The concern is the delete scenario: what if your email provider accidentally deletes your messages, or your account gets hacked and the hacker deletes them? That deletion would happen on all of your devices using IMAP.

Most email programs like Thunderbird, Microsoft Office Outlook, and others provide local folders. These folders aren't connected to any of your email accounts; they reside only on your PC. Copying email into local folders moves the messages out of the reach of any IMAP-initiated deletions or changes, intended or otherwise.

I'm not suggesting you copy all of your email to local folders as some kind of backup. Regularly backing up your PC, as you should, will back up your locally downloaded IMAP folder well enough. But local folders are an additional tool that, when used properly, can reduce your risk of losing emails should you, for example, lose access to the account for some reason.

Process Explorer, a Powerful Free Replacement for Task Manager

2025-09-25 08:00:23

Want to know what’s really going on in your PC? Process Explorer is a free, powerful tool that digs deeper than Task Manager. I’ll show you how it works, what you can discover, and why it’s one of the best utilities you should have on your computer.

When you want to see what's really going on.

by

Want to know what's really going on in your PC? Process Explorer is a free, powerful tool that digs deeper than Task Manager. I'll show you how it works, what you can discover, and why it's one of the best utilities you should have on your computer.
About Process Explorer
(Screenshot: askleo.com)

You may not need, or even want, to know what's going on under the hood in Windows. Most computer users shouldn't have to. Computers are supposed to just work, and you should never need to be bothered with things like processes or resource utilization.

And yet, there are times when we want, or even need, to know.

This is where Process Explorer comes in. Process Explorer — also called "procexp" — provides a window into all the programs running on your computer at a level of detail that Task Manager doesn't.

TL;DR:

Process Explorer

Process Explorer is a free, powerful tool that shows everything running on your computer in detail. It beats Task Manager with features that dive deeper, even showing system trends over time. It's a must-have for troubleshooting and understanding your PC.

Task Manager is good, Process Explorer is better

Task Manager in Windows 10 and 11 is a good tool, and it's gotten better since its earlier incarnations.

Windows 11 Task Manager
Windows 11 Task Manager. Click for larger image. (Screenshot: askleo.com)

While past versions of Task Manager were woefully inadequate for diagnosing system activity, the current versions do provide more visibility into just what programs are running — both the foreground programs you see, and the background programs you don't. Often that's enough.

But sometimes we need more.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Process Explorer

Process Explorer is included in the SysInternals suite of tools, which can be installed for free from the Microsoft Store.

It's hard to list all the types of things you can do with Process Explorer. It's like a Swiss-Army knife of system utilities, and it has many, many potential uses.

When you fire it up, you'll get exactly what you might expect: a list of the processes running on your machine.

Process Explorer
Process Explorer. Click for larger image. (Screenshot: askleo.com)

The list includes all tasks, or "processes", running on your system. The "hierarchical" view (click on the "Process" column header to change the view from alphabetical to hierarchical) shows which processes started other processes, which can be a very interesting way to understand how they all relate to each other.

CPU usage

Click on the "CPU" column header, and the processes will be listed in order of which program is using the processor most heavily. This is updated every few seconds and is perhaps the single most common use of procexp: to answer the question "What's using the CPU the most?"

Memory usage

Click on the "Working Set" column header to list processes in order of physical memory (RAM) used. As you might expect, this is the next most common use: to answer the question "What's eating up all my memory?" The "Private Bytes" column does roughly the same, but includes memory that may have been swapped to the system paging file.

CPU and memory are probably the most commonly used columns. You can find out more about the others (and, indeed, a list of additional columns you can monitor) in Procexp's help.

Finding things

The "Find handle or DLL" function is a quick way to see, for example, which process is using a file. Enter a partial filename, and procexp will list all the processes that are referencing a handle (typically a file) that includes that name.

Process Explorer handle search results.
Procexp shows how many Thunderbird files are open. Click for larger image. (Screenshot: askleo.com)

In the example above, I searched for "askleo.com", which returned the fact that Thunderbird has several files open that include that as part of the filename (not visible, but off to the right in the dialog) as it accesses my askleo.com email.

Process details

Process Explorer also lets you dive into individual processes for more information. Right-click on any process and click on Properties for more details.

Process Explorer showing Thunderbird.exe properties.
Thunderbird.exe properties. Click for larger image. (Screenshot: askleo.com)

As you can see, the Properties view of a process — thunderbird.exe, in this case — shows a lot of additional information. Explore the various tabs on the dialog, and you'll be able to see network usage, security attributes, the resource usage of the process, the command line used to start the process, and even anything that looks like a readable string within the process image or memory space.

System information

Finally, click anywhere on Process Explorer and type CTRL+I. This opens the "System Information" display.

Process Explorer showing System Information.
Process Explorer showing System Information. Click for larger image. (Screenshot: askleo.com)

System Information presents an overview of what your system is doing and updates in real time. It's great for watching trends over time as your computer goes about its work. Hover the mouse over any point in a graph, and you'll see a tooltip with information about which process was at the top of the list then.

Process Explorer showing point-in-time information.
Process Explorer shows point-in-time information. (Screenshot: askleo.com)

You can also click on the tabs shown at the top of the System Information dialog to get even more data about that specific topic.

Podcast audio

Tip of the Day: Leave Small Partitions Be

2025-09-24 08:00:57

It's tempting to remove the additional partitions you find on your hard drive. Don't.

Partitions
Partitions. (Screenshot: askleo.com)

I am asked frequently about the additional partitions that appear on many modern hard disks, particularly on computers running Windows 10 and 11. Most commonly, they're recovery partitions, original Windows images, UEFI information, or other manufacturer-specific data repositories.

Some people want to eke out every megabyte of disk space, so they want to know whether they can remove the partitions and free up the space for normal use.

Don't.

Typically, these partitions are small, so the space you would recover is insignificant compared to the rest of the drive. More concerning, they're often critically important.

Save yourself the grief and the time. Leave these partitions alone. If you need more space, get a larger hard drive or an additional one.

And if you just can't stand it and must remove a partition, make absolutely sure to take a complete image backup first... just in case you end up regretting your decision.

How to Keep Using Windows 10 Safely after Support Ends

2025-09-24 08:00:09

Worried about Windows 10 after support ends? Don’t be. I'll show you the simple steps -- good habits and reliable security software -- that will allow you keep using your Windows 10 computer safely.

Yes, it can be done.

by

Worried about Windows 10 after support ends? Don't be. I'll show you the simple steps -- good habits and reliable security software -- that will allow you keep using your Windows 10 computer safely.
A desktop computer with a Windows 10 screen bathed in bright morning sunlight.
(Image: ChatGPT)
Question: You keep saying we can keep using Windows 10 safely after support ends. How is that even possible?

I know it's a controversial position that not everyone agrees with, but I believe it's quite possible to keep using Windows 10 safely after Microsoft ends its official support of the operating system.

There are two things you need to do. Both are things you should be doing already.

TL;DR:

Using Windows 10 safely

You can still use Windows 10 safely after support ends by doing two things: practice safe computing and use good security software. Even without new updates from Microsoft, with smart habits and good tools, your PC won't suddenly become unsafe.

First, practice safe computing

This is the single most important thing you need to do to keep using Windows 10 safely.

In fact, it's something you should already be doing and should represent no additional work on your part. Windows 10 end of support is simply a reminder not to drop your guard.

What does that mean? From my most important article:

I'll go one step further and say that your actions are much more important than anything Microsoft might fix in the operating system, regardless of the version of Windows. Why? More people are compromised by skimping on those things than they are by some random unpatched vulnerabilities.

In fact, most unpatched vulnerabilities require that malware make it past you to be exploited. In other words, if there is something that Microsoft doesn't patch, your good habits are what protect you.

Second, use good security software

I continue to recommend Windows Security (aka Windows Defender) as a solid security solution built right into Windows. It's already there, and you may already be using it.

Microsoft has stated that they will continue to provide security definition updates for Windows Security until at least 2028. Thus, even on Windows 10, where Windows itself will not be updated after the end-of-support date, the security software will remain current.

There are also several other good security suites that you can switch to (Windows Security will step out of the way when you install them) that will continue to provide protection long after Windows 10's end of support.

Two-step protection

The result is what I'll refer to as two-step protection:

  1. Your good habits will prevent malware from reaching your machine.
  2. Up-to-date security software will detect and thwart most everything else that might make it through.

Extended Security Updates (ESU)

If you intend to continue to use Windows 10 past its end-of-support date, consider signing up for Extended Security Updates.

The ESU program is nothing more than an extension of the end-of-support deadline for one year. After that year is up, you'll simply continue as above, relying on yourself and your security software once again.

But aren't operating system updates critical?

Keeping all your software as up to date as possible has always been important, and that hasn't changed. However, "important" doesn't mean "can't live without".

Security — all security — is about playing the odds and stacking the deck in your favor. There's no such thing as perfection, even with Windows security updates.

Looking at it a different way, all these things have to be true for something bad to happen to your computer69:

  1. There must be a bug in Windows.
  2. That bug must represent a security vulnerability of some sort.
  3. Hackers need to know about the bug.
  4. Hackers need to devise a way to exploit the bug for malicious purposes.
  5. There must be a way for hackers to get that exploit to you — typically as malware.
  6. You have to "allow" the malware onto your machine, usually through a download of some sort, including attachments.
  7. Your security software must miss the fact that malware has been downloaded to your machine.
  8. You have to "run" the malware, meaning you run a download or open an attachment.
  9. Your security software must miss the fact that malware is running on your machine.

Thwarting any of those items means that the malicious vulnerability will not affect you. Ongoing security updates deal only with #1, and even then, only if #2 is deemed "important enough".

Malware still has many hoops to jump through before it impacts you.

Your job: keep your guard up for the steps you control. That means not allowing malware onto your machine to begin with and using good security software.

The objection

There are two primary objections to what I suggest.

I don't think hackers are disciplined70 enough for the first to have any merit. Windows 7's end of support faced the same fear, and nothing came of it. In a way, it's merely a subset of the second point.

As for the second, I don't buy it. Sure, there's a constant stream of bug fixes to Windows — we see it every "patch Tuesday" — but by and large, those a) aren't security issues, and b) those that are rarely affect broad swaths of Windows users.

On top of that, most bugs are introduced as software is changed. Windows 10 isn't changing anymore. The rate at which Windows 10 vulnerabilities are being introduced should be at a near standstill. The only potential concern would be vulnerabilities that have gone undetected for a long time, which by definition should be nearly none.

We have experience

As I've said in a few places, we've been here before. We have experience with exactly this scenario in two interesting and different ways.

First, when Windows 7's support ended, there were dire predictions of both of the objections above: a previously known vulnerability to be unleashed after the end of support, and dire consequences to follow. Neither materialized.

Just as there are people who want to stick with Windows 10 today, some folks kept on using Windows 7 safely after its end of support. How? By following the two-step protection I outlined above. Some are still using Windows 7 today!

Second, some people have been running Windows 10 without updates for some time already. For various reasons — often the perception that Windows Updates are more disruptive than they're worth — individuals disable updates. That means no updates at all, security or otherwise. They're apparently happy with their result.

I also hear from others looking forward to the cessation of Windows 10 updates for that very reason.

Microsoft only benefits from your fear

I'm not one to jump onto conspiracy theories, and while I don't think this is intentional, it's worth pointing out.

It's in Microsoft's best interest to let all the FUD (fear, uncertainty, and doubt) about Windows 10's end of support go unchallenged. The more people feel they must update to Windows 11, even if that means getting a new machine, the better Microsoft (and PC manufacturers) make out.

That you can keep using Windows 10 safely isn't a message you're going to hear from Microsoft.

The wildcard: third-party software

One fly in the Windows 10 ointment might not be Microsoft at all. At some point, the software you use from other sources may stop supporting Windows 10.

This is another path we've been down previously. After Windows 7 support ended, most software from other sources kept right on working. In fact, many continue to work and be updated on Windows 7 to this day.

But not all. At various points in the years since, some software vendors have decided to stop supporting Windows 7. In most cases, though, it was several years after Microsoft's Windows 7 support ended.

There's every reason that the same will happen to Windows 10. In fact, I've heard reports of at least one software package already requiring Windows 11 for future versions.

There's little you can do about that other than move to Windows 11, find an alternative that still supports Windows 10, or keep using the last version that still supports it.

Podcast audio

Footnotes & References

71: Not including non-operating-system-related stuff. For example, "something bad" could still involve phishing, which has nothing to do with Windows or Windows Security Updates.

72: Some, maybe, but relying on so many to keep a secret for that long, particularly when exploiting such a vulnerability could lead to some short-term gain, just doesn't seem reasonable.

Tip of the Day: "Remember Me" with Caution

2025-09-23 08:00:00

The option to "remember me" is convenient, but it can open you up to additional risk.

"Remember Me" checkbox.
"Remember Me" checkbox. (Screenshot: askleo.com)

When logging in to a site, it's very convenient to check "remember me" so you don't have to log in again, or at least not as frequently.

I use it all the time. I log in to so many sites and services throughout the day that my world would become significantly more complicated if I had to log in over and over.

However, I don't use it everywhere, and I recommend you don't, either.

For example, never use "remember me" on someone else's computer or on a public computer. Unless you remember to log out every single time, you risk someone else coming along and being able to access the account you're still logged in to.

Less obvious: I don't use "remember me" on my laptop — or at least I try not to. The risk here is that my laptop could be lost or stolen when traveling. The finder or thief could then access the sites I was logged in to. Not good.

You'll note I said I try not to. It's darned convenient, and it's hard to avoid the habit.

But it can be important.

Tip of the Day: Back Up Before CHKDSK

2025-09-22 08:00:43

It's possible for CHKDSK to lose data when it fixes problems. If you're at risk, the solution is simple: back up first.

Windows Command Line Tip

CHKDSK
CHKDSK running on the Command Prompt. (Screenshot: askleo.com)

Appearances to the contrary, CHKDSK doesn't cause disk problems. If a problem becomes apparent after running CHKDSK, it's because that problem was already there and CHKDSK's repair efforts made it visible.

While we think of CHKDSK as a cleanup and repair tool, it's important to realize it's not a recovery tool. Its job is to find and fix errors in the information about where files are stored. In rare cases, these fixes can cause data loss.

The solution, of course, is simple: back up first.

Ideally, you've been backing up all along, but particularly if you suspect errors, it is wise to back up immediately prior to running CHKDSK, just in case.

The very errors that CHKDSK repairs can prevent some types of backups from completing, but that's no excuse not to back up somehow. In fact, it's another strong sign that you should do something to back up critical files before moving on, even just manually copying them somewhere else.

Bonus tip

CHKDSK with the "/F" parameter "fixes" problems. That's what I'm discussing above.

CHKDSK without the "/F" (or without "/R", for "repair", which implies "/F") is simply a reporting tool. It scans for errors without attempting to fix anything.

How Do I Get an Email Address for Life?

2025-09-22 08:00:41

Tired of changing your email every time a service shuts down or your ISP changes? Learn the smartest way to secure an email address that’s truly yours for life, and why relying on free or “lifetime” promises could leave you stranded.

The Best of Ask Leo!

Never change your email address again.

by

Tired of changing your email every time a service shuts down or your ISP changes? Learn the smartest way to secure an email address that's truly yours for life, and why relying on free or "lifetime" promises could leave you stranded.
A glowing golden key unlocking a bright envelope icon, set against a vibrant blue sky with rays of light, symbolizing control and permanence in email.
(Image: ChatGPT)
Question: I've used {now defunct service redacted} for several years in order to avoid notifying my contacts that I've changed my email address. They promised me a single email address I could keep forever. Except I now find that the site is working, but it doesn't allow me to view my account. The page merely says, "It works! This is the default web page for this server. The web server software is running, but no content has been added yet." Are you able to help me?

Help you get your account back? No.

Help you avoid this situation again in the future? Absolutely.

It's frustrating when a service promising to provide something forever goes away. Apparently, "forever" isn't what it used to be, and "lifetime" turns out to be the company's lifetime, not yours.

TL;DR:

An email address for life

The only way to keep one email address for life is to own a domain. Free services like Gmail or Outlook may last a long time, but only a domain you control guarantees permanence. Your address never changes, even if you switch email providers.

Email for life

Having a single email address you can count on for the rest of your days is pretty appealing, mostly because changing your email address is such a pain.

You'd never have to tell all your friends that your email address changed, and you'd never have to hope that they updated their address books.

You'd never have to run around to all the online services and shopping sites you use to manually update your email address.

You'd never lose important email because someone didn't have your updated email address.

If you own your own domain, your email address is what it is and will not change (unless you want it to).

There are a few ways to make that happen.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Worst option: your ISP

One thing I can tell you not to do is this: don't rely on the email address your ISP gives you as part of your service.

Regardless of the reason, one thing I can tell you: the email address assigned to you by your ISP will need to be changed at some point.

There are almost no exceptions.71

Better choice: a large company's email service

Google and Gmail will probably be around for a while. Hotmail email addresses will probably work for as long as Microsoft exists, even though the website has changed to Outlook.com.

Yahoo? Your guess is as good as mine. AOL? Probably good for a while, but who knows? Both of these companies have gone through corporate changes that could have easily impacted their email product.

You can count on some of the existing general-purpose email services to be around for a long time, and you can probably guess which ones I consider the safest in that respect: Google and Microsoft.

Paid email services are a little more difficult to judge because their existence is predicated on making money. Should that change, priorities might change, and you could someday get that unwelcome message that the service is closing.

Special-purpose email services run an additional risk: their purpose. ProtonMail, for example, is a fully encrypted email service that could someday be at the mercy of various governments for whom encryption is so offensive. Such services have been shut down in the past either in response to government requests or in reaction to government threats.

But using a service like Gmail or Outlook.com is a pretty reasonable solution, as long as you don't lose your account to a hack.

Best way: your own domain

The best solution is not the simplest, but it puts nearly everything under your control.

Own your own domain.

Just as I own "askleo.com", you can purchase (or more correctly, lease) a domain on the internet that is completely and only yours. You control all the email addresses on that domain (as many as you like!), but more importantly, you control how and where that email is handled, and you can change it any time.

Email on your own domain can be handled in several ways.

Domain registrars (the companies that sell internet domain names) often offer email services. They become your email provider for the email addresses on your domain.

Your domain host is the company that stores your website's files and makes them accessible on the internet. They almost certainly offer email services. If you choose to host a website with your domain, your domain host can become your email provider for the email addresses on your domain.

Any other email account anywhere. Even if your registrar doesn't offer email services directly, they usually offer email forwarding. Email sent to your email address on your domain is automatically forwarded to any other email address. For example, all email might be forwarded from your domain registrar to an Outlook.com email address, and you then deal with your email using Outlook.com.

Any other email service that can import POP3. Most of the major email services (like Gmail and others) support what I refer to as POP3 pickup. If your registrar does offer email services, these services act like an email client program, picking up your email from the registrar or host. For example, while your registrar might support full email access if you like, you can instead configure Gmail (or other services that support it) to fetch the email periodically via POP3. You then interact with your email using Gmail.

There are other options; these are just the most common.

Why your domain is best

Here's why this option is best: you can change the approach at any time without changing your email address. As long as you own your domain, your email address need never change, even though the way it's handled can be changed as needed.

For example, let's say:

In other words, you use your Gmail account to send and receive email as leo@yourveryowndomainname.com.

One day, your Gmail account is hacked, or Google makes you angry enough to want to leave, or (long shot here) Google goes out of business.

No problem. You set up the same system, only this time you use your account at another online provider in place of Gmail. Your email address never changes. It's still leo@yourveryowndomainname.com; you're just using a different provider to access it.

It's what I do

Email sent to any email address that's destined for me @askleo.com is handled by a Google Mail account. My replies? Usually typed in the Gmail web interface.

The same is true for my personal email, except it's all handled by ProtonMail.

If I ever want to change, I can. If I ever want my registrar to handle it, they can. If I ever want to handle it myself, I can.73 If I want to switch it all to a different online service or something else, I can...

...all without changing my email addresses @askleo.com or @ any of the other domains I own.

As long as I own those domains, the email addresses need not change.

And I intend to own most of them for the rest of my life.

Podcast audio

Footnotes & References

73: Two things have to be true: you never move outside your ISP's coverage area, and they never change their email service. Ever. Both are highly unlikely.

74: You don't; I do. It's an example domain. You would use whatever domain name you like and can purchase.

75: This requires that I run my own mail server, which I have available to me.

When I Use Start-Run, Why Does a Window Just Flash and Disappear?

2025-09-20 08:00:58

Frustrated when a window just flashes and disappears when you use Start-Run? It’s not an error; it’s how Windows handles certain programs. I’ll explain what’s happening, why it’s confusing, and show you the simple trick that lets you see what’s going on.

Something happened, but what?

by

Frustrated when a window just flashes and disappears when you use Start-Run? It's not an error; it's how Windows handles certain programs. I'll explain what's happening, why it's confusing, and show you the simple trick that lets you see what's going on.
Animation of a Command Prompt Windows flashing
(Video: askleo.com)
Question: When I try to use "Start" and then "Run" to run a command, the DOS screen flashes momentarily, then vanishes. Am I overlooking something obvious?

Not really. It's only obvious if you've been using PCs since before there was Windows and its graphical user interface, or GUI.

Start-Run is incredibly useful, but it's not appropriate for everything. The good news is, there's a simple trick that fixes what you're seeing.

TL;DR:

Start->Run->Flash

When you use Start-Run for a command that runs in character mode, Windows briefly opens Command Prompt, runs it, and closes it right away, making the window flash and disappear. The fix: open Command Prompt yourself and run the command there so you can see the results.

Two types of programs

The fundamental problem here, if you want to call it that, is that there are two types of programs.

You're most familiar with programs that sport a Graphical User Interface, or GUI. Your mail program, web browser, word processors, and more all display various graphical user interface components, including fancy icons, colorful images and controls, and just about anything that can be drawn on the screen.

Before there was a GUI, there was what we now call character mode. A character is a letter, number, or special item, including punctuation marks. In character mode, the only things that can be displayed on the screen are characters. Character mode does not support pictures or graphics of any kind.

MS-DOS, the precursor to Windows, used only a character-mode user interface.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The command line

Without graphics, character mode has no icons to click on to run programs.

Instead, you type in commands, or the name of the program you wanted to run, press Return, and MS-DOS locates the program and runs it. To start the old character-mode version of Microsoft Word, you'd type "Word" followed by the Enter key, and MS-DOS would run Word.

Windows supports both GUI and character-mode applications. When you double-click an icon, select a menu item, or use Start-Run, Windows looks at the program, determines what kind it is, and operates accordingly. For a GUI application, that means "run it normally" in Windows.

For a character-mode application, though, Windows first starts up a character-mode environment for the application to run in and then runs the program in that environment. That "environment" is the Windows Command Prompt.

When the character-mode program you've run exits, Windows automatically closes the Command Prompt it started.

The command line "flash"

The window you're seeing flash and disappear is a Command Prompt window. What happened is this:

The "flash" you're seeing is just the Windows Command Prompt opening and closing quickly as all that happens in a flash.

It's easy to make happen. Hold down the Windows Key key and type "R" to bring up the "Run" dialog box. Into that box, type "sfc" to run the System File Checker.

Start Run SFC
Running the System File Checker. (Screenshot: askleo.com)

Click on OK. You should see a window come up and disappear quickly — in a flash — and not much else.

Command Prompt is the answer

Now, run the Windows Command Prompt. You can once again use Windows Key key + R and enter "CMD" followed by clicking OK, or you can locate the Windows Command prompt in the Start menu. These days, I'm partial to right-clicking the Start menu and clicking on Terminal.

The Windows Command Prompt
Windows Command Prompt. (Screenshot: askleo.com)

The Windows Command Prompt is a character-mode interface you can work in.

Now, click in the command prompt and type "SFC" followed by Enter.

You can see that SFC has run, printed a message, and exited. We lost this message when we ran SFC from Start-Run because the Command Prompt was opened and quickly closed when SFC finished. By starting your own Command Prompt, you control when the window closes.

In this specific case, SFC requires that it be run with Administrative privileges enabled. The correct way to do so is to run Command Prompt "as administrator" and then run the command.

Tip of the Day: Use Two-Factor Authentication, Already

2025-09-19 08:00:24

Your account is safer -- much safer -- with two-factor authentication enabled. Learn about it and turn it on.

A two-factor authentication code.
A two-factor authentication code. (Image: Proton Authenticator)

If you haven't enabled it and your account supports it, I strongly recommend you enable two-factor or multi-factor authentication (2FA or MFA).

Note that I didn't say what kind of account — email, bank, data storage, or whatever. You should protect any account that would cause you pain and inconvenience if hacked.

The short version of how it works is this: any time you log in to a new device for the first time, you'll be asked to provide proof that you have the second factor. That could be responding to an SMS or voice call, it could be punching in a code displayed by a two-factor application or device, or it could be something else. After that, you can usually specify that two-factor confirmation not be required on that device again, or for some amount of time.

You need to log in once successfully using two-factor in order to then bypass two-factor on future logins on that device.

Hackers won't be able to do that.

I bring this up to reinforce the concept because there have been reports of hackers being able to bypass certain forms of two-factor authentication. This is extremely rare.

Let me be extra clear: adding two-factor authentication only makes your account more secure. Not having it leaves your account less secure.

It's worth learning about (you must set it up properly) and using for any account you consider important.

More on two-factor authentication

7 Reasons You Could Lose Your Google Account Forever

2025-09-19 08:00:20

Losing access to Gmail can mean losing years of email, contacts, and memories. Learn the most common pitfalls, from outdated recovery info to ignored warnings, and how to avoid them so you never risk losing your account.

Let's look at the most common ways.

by

Losing access to Gmail can mean losing years of email, contacts, and memories. Learn the most common pitfalls, from outdated recovery info to ignored warnings, and how to avoid them so you never risk losing your account.
A glowing Gmail inbox filled with colorful emails fading into a digital dust cloud. A worried person sits at their desk, reaching out as the emails slip away.
(Image: ChatGPT)

By far the most common topic throughout the history of Ask Leo! has been account loss and recovery. Originally, it was all about Hotmail, but these days, it's Google. People lose access to Google and Gmail accounts all too often.

The result, of course, is the loss of years of email, contacts, files, and whatever other Google services they used along the way.

Lockouts and loss happen not because Google's broken (even though thinking so is a common knee-jerk reaction), but because of preventable mistakes and oversights.

Let's review what can go wrong and how you can prevent losing your account forever.

TL;DR:

How not to lose your Google account

Most lost Google accounts are due to simple mistakes. Outdated recovery info, weak or reused passwords, ignored warnings, and not enabling two-factor authentication are the biggest risks. Stay signed in, keep details updated, and use sound security practices to make sure your Google account isn't lost forever.

#1: Outdated Recovery Information

This is the single most common reason I see that accounts are permanently lost.

For whatever reason, you have a problem signing in. "No problem", you think, and you head off to the Google account recovery process. As part of that process:

You get the idea. All the points of recovery that you once supplied have fallen out of date. The result? Google has no way to differentiate you from a hacker trying to break in. There's no way to prove that you are you and should be allowed back in.

Review and update recovery info regularly.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

#2: Weak or Reused Passwords

We've all heard the word about weak or easy-to-guess passwords. Creating and using a long, strong password is something everyone is doing these days... right? RIGHT?

There's another drum that's been beating that I don't think people are paying as much attention to: stop re-using passwords. Industry reports indicate this is currently the most common form of simple account compromise. A password is discovered because of a problem with service A, and people find shortly thereafter their accounts at services B, C, and so on are also compromised because they'd used the same password at all of them.

For all accounts, of course, but particularly for your Google account, make absolutely certain not to use its password anywhere else. Use a password manager to keep track of 'em all.

#3: Ignoring Security Warnings

We all get so many warnings — legitimate, accidental, and spam — that it's tempting to ignore them all. At a minimum, it's easy not to give them the attention they deserve.

And they do deserve attention — at least enough to confidently determine whether they represent an early warning sign of a problem with your account or are just so much noise and spam.

Take the time to learn what matters in these warnings and what a legitimate warning from your provider — like Google — looks like. Then take the time to examine them when they arrive. Acting on a legitimate warning could save your account.

#4: Relying Only on One Device

I've noticed this myself of late: online services are seeing and using the fact that you're signed in to multiple devices. It's almost a form of second-factor authorization. You sign into a new device, and you're asked to confirm that sign-in on another computer or a mobile device where you're already signed in.

I know not everyone has multiple devices, but if you do, it's worth signing into more than one of them. Not only can it make signing in to a new device easier, but it's another mechanism services can use when confirming you are who you say you are. You may need to poke at the account from the other device occasionally to keep the sign-in active — perhaps check email occasionally — but it's another way to increase the odds of retaining access to your account.

If you are signed in on only one device, and that device breaks or is lost, getting into your account on a replacement device might be more difficult than it needs to be otherwise.

#5: Not Enabling Two-Factor Authentication (2FA)

Tech-help folks like myself, as well as most of the computer security industry, have been beating this drum for a while. Two-factor authentication means that even if someone gets your password — say through a breach of some sort — they still can't sign into your account.

Two-factor authentication also acts as a form of recovery confirmation. The process of setting up two-factor almost always includes setting up additional backup information, such as recovery codes, that can help get you back into your account in a variety of situations.

Enable two-factor authentication and keep backup codes in a safe place. It's not nearly as intrusive as you might think.

#6: Using Incorrect or Inconsistent Recovery Attempts

AKA: panicking.

It goes without saying that some of the people I hear from in situations like this are in a full-on panic. Understandable. Unfortunately, panicking leads to some terrible decisions.

The most common error is guessing at the information you're asked to provide, whether it's your grandma's maiden name or the name of your first teddy bear. The problem with guessing is that each wrong answer could be a strike against you, making it even harder to recover your account. Supplying incorrect or inconsistent information is indistinguishable from a hacker trying to get in. When that happens, Google sets the bar — the burden of proof you have to provide — higher.

First: don't panic. Second: keep a record of important account details. Your password manager is the perfect place for this kind of information.

#7: Ignoring Account Activity for Too Long

As I hope you know, not signing into an account for a long time — two years, in Google's case — will cause the account to be closed and its contents deleted.

While you and I might know this, not everyone does. I occasionally get requests to help access accounts that haven't been signed into for five years or more. (I think the longest was 12 years.) Perhaps these are folks who know but are grasping at straws. The result is the same: that account's forever gone.

The solution is simple: sign in to your account periodically to keep it active.

Podcast audio

Why Can't You Give a Straight Answer?

2025-09-18 08:00:23

Why can’t I just give you a straight answer? Because things are rarely that simple. Learn why “It depends” is sometimes the only honest answer I can give you, what details really matter, and how giving better clues can help you get clearer, faster, and even simpler solutions.

Life is rarely that easy.

by

Why can't I just give you a straight answer? Because things are rarely that simple. Learn why "It depends" is sometimes the only honest answer I can give you, what details really matter, and how giving better clues can help you get clearer, faster, and even simpler solutions.
Person at computer holding a "Help" sign.
(Image: depositphotos.com)
Question: I've looked at your answers for problems that seem like they relate to mine, but everything seems to be "Check this" or "It might be that". Why can't you just give me the specific steps I need to solve my problem? Why can't I get a straight answer?

It's a fair question.

I wish I could.

Honestly, I truly wish I could give everyone a simple, step-by-step, here's-how-to-fix-your-problem answer. When possible, I try. Unfortunately, it's rarely possible for me to be that specific.

There's a reason my most common answer is "It depends."

TL;DR:

Straight answers for complicated situations?

Computer problems don't always have one clear fix. Like people, every computer is unique. They have different setups, symptoms, and issues. Good answers require details, clues, and patience.

The information I get

I don't want to sound like I'm trying to shift the blame, but the reality is I rarely get enough information to determine the exact cause of a specific problem. I'm often not told of the symptoms at all beyond the ever-popular "It doesn't work."

Without detailed information about the problem, there's little hope of getting detailed information about an answer.

I get that it's not always possible to know what information to provide. That's why I wrote an article on the topic: What Information Should I Provide When Asking for Help? It's a great place to start.

Step-by-step answers often require step-by-step instructions to reproduce whatever problem is at hand. And while not all problems are of the step-by-step variety, I can say this for sure: it's better to provide too much information than too little.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Consider symptoms

When you experience a computer problem, you see symptoms. A symptom might include an error message, unexpected behavior, or a lack of expected behavior.

The symptoms are not the problem; symptoms are clues to the problem.

What does it mean if your leg hurts? Most commonly, it's simple muscle strain, but it might also be an insect bite, infection, blood clot, cancer, or a variety of other things I can't begin to think of. We need more information. As TV doctors might say, "We need to do more tests."

The same is true of computer problems. When you report symptoms, you're reporting clues I use to diagnose the cause of the problem. Sometimes, the clues are enough. More often, though, they are not. The same symptom might have hundreds, if not thousands, of different possible causes.

Asking questions

Since I can't sit at your computer and diagnose your specific problem, I can't "run more tests". Like a doctor, I need to ask you more questions about the symptoms you're experiencing to clarify what is happening.

I might also give you suggestions to further diagnose or repair the problem yourself.

Much like that leg pain, resolving your computer's problem involves understanding more about what was happening prior to the symptoms' onset. Many people experience similar symptoms — or there might be a situation I've never encountered before.

In understanding more about what's happening, I'll probably suggest things to try or look at.

No two computers are alike

Computers, like people, are incredibly complex. No two are exactly alike, no matter how you configure them.

Different hardware, operating systems (and versions thereof), applications, customizations, ways of connecting to the internet, and methods of using the computer make each computer as unique as the individual user.

As a result, blanket solutions to specific problems are rare. Obviously, I try to find them when I can, but often, what works for one machine will not for another, and certainly not for all.

What to try and how to go about further diagnosing the problem yourself, however, does work, as evidenced by the many people who take that guidance and resolve their issues.

Unfortunately, computers are not yet like toasters: they don't "just work". That means that at some point, each of us will face the responsibility of some diagnostic detective work.

There are lots of folks like me available to help, but ultimately, it'll take someone at your keyboard to collect the information we need to perform the final diagnosis and repair...

...and that someone is you.

Podcast audio

Tip of the Day: Keep Your Backup Drive Full

2025-09-18 08:00:03

If you have a backup drive, make as much use of it as you can.

External Hard Disk Drive
(Image: canva.com)

I know this is counter-intuitive, but bear with me for a moment.

I'll put it another way that is perhaps less jarring: keep as many backups as space allows.

You never really know when you'll need something from your backups or how far back you'll need to go. You may find that you really want that file you deleted accidentally three months ago, but if you only keep two months' worth of backups, it's long gone.

The right length of time for you is impossible for me to say, just as it's impossible for me to say how often you need to back up. The rule of thumb, however, is that more is better than not enough.

Many backup programs support deleting the oldest backups to make room or using some other space-defined condition. Some even do it automatically. One way to increase the probability that you'll be able to find what you need when you need it is to make sure your backup strategy, whatever it is, fully uses the space available.

On Trusting and Not Trusting Microsoft

2025-09-17 08:00:54

Worried Microsoft is peeking at your files in OneDrive? The truth is more complicated and perhaps surprising. I’ll look at what scanning really means, why avoiding OneDrive may not be enough, and how trust in Microsoft’s products comes down to risk, reality, and choice.

An interesting inconsistency.

by

Worried Microsoft is peeking at your files in OneDrive? The truth is more complicated and perhaps surprising. I'll look at what scanning really means, why avoiding OneDrive may not be enough, and how trust in Microsoft's products comes down to risk, reality, and choice.
A large, cartoon-style magnifying glass hovers over a stack of digital files in a Windows folder, with a OneDrive cloud in the corner
(Image: ChatGPT)
Question: You should never put your files in OneDrive. Ever. It just gives Microsoft the ability to steal all your stuff. They scan it, take it to train their AI, and use it in other ways you never agreed to.

That's a synthesis of comments I see frequently when discussing OneDrive.

Some people are adamantly against cloud storage of any sort. They are convinced that large companies like Microsoft use it as a way to slurp up content for nefarious purposes.

I have bad news for those folks. Microsoft can do that whether you use OneDrive or not.

TL;DR:

Microsoft, OneDrive, and trust

If you don't trust Microsoft with OneDrive, why trust Windows? Both give Microsoft full access to your files. While scanning for illegal content or legal demands is possible, there's no proof of anything further. If you truly don't trust Microsoft, avoiding OneDrive alone won't help.

They're not scanning your data

I want to be clear before I go any further.

I do not believe that Microsoft is scanning your data (on OneDrive or anywhere else) for nefarious purposes.

I apologize if I get repetitive on that point below. People seem to insist on taking my words to mean they are. They are not.

I can think of exactly two reasons they might examine your data, and both make sense. They're important to understand, and I'll talk about them below.

What Microsoft does or does not do with your OneDrive data isn't the point of this article.

Here's the thing: you've already given Microsoft access to everything on your computer by running Windows.

It's Microsoft Windows, after all.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

What does scanning mean, anyway?

Scanning can mean any number of things. What most people worry about is that the contents of their documents or photos are being examined and copied for other purposes, or, in some cases, judged (say, for legal reasons).

Scanning can also mean tracking only the metadata: filenames, file sizes, file properties, and, in some cases, computed file hash values for comparison against other known files.

Some also worry that an actual person does the scanning — i.e., looks at your photos — rather than a computer program. The only way scanning could happen at scale, of course, would be via automation.

The operating system can do anything

People can be surprised to read in a TOS74 that they've granted the software or service the right to read their files.

Well, of course. How could it be otherwise?

Think about it. If Windows can't read your files, you wouldn't be able to do something as simple as copying a file from one folder to another.

The ability to read, write, and manipulate your files is fundamental to any operating system's ability to do what you ask it to do. That's why it's often part of the TOS.

It's so fundamental that we don't even think twice about it.

The operating system could do anything

What that means, of course, is that any operating system could scan all your data for whatever reason it wants.

If Microsoft wanted to scan your data for AI training or anything else, they don't need OneDrive to do it. It's already within their grasp to do so from within Windows and send the information back to Microsoft.

Again:

I do not believe that Microsoft is scanning your data — on your computer or anywhere else.

But they could. We trust that they don't, but they could.

And that's where things get weird.

OneDrive and Windows are both Microsoft products

If you don't trust OneDrive with your files, why do you trust Windows with them?

I'm not trying to be a jerk about this; I'm trying to make a point. If you trust Microsoft to handle the data on your computer with any modicum of privacy, it makes no difference whether you put your files in OneDrive or not.

In theory, your concerns should apply equally to both.

Some people don't trust Microsoft, period

I hear regularly from people who don't trust Microsoft or have become so annoyed at the company's behavior that they walk away completely.

They don't use OneDrive. They don't use Windows. Most have switched to Linux for its transparency and lack of corporate shenanigans or gone with other open-source alternatives.

I get that, I truly do. If you don't trust Microsoft (or Apple or Google or whoever), it makes complete sense to take all the steps you can to avoid using their products. It's not always easy, but it makes sense if that's your belief.

Is it really all or nothing?

OneDrive and Windows are both Microsoft products. If you don't trust one, you probably shouldn't trust the other.

But that makes this an all-or-nothing decision, and, as we know, life is never that simple. Life is full of risks, risk management, and probability. So, no, it's not necessarily all-or-nothing. It's more complicated than that.

The perception is that the risk of Microsoft scanning what's stored in OneDrive is higher because it's already on their servers. It would be difficult to detect at any technical level. To prove it would take a data leak of some sort that a) could only be traced back to Microsoft actions and not some randomly hacked account, and b) could only have come from someone's files stored in OneDrive and nowhere else.

There's been no proof that I'm aware of, but the fact that it's conceptually easier for Microsoft to pull off makes some believe it's a higher risk. Hence, they feel less exposed keeping their data on their own Windows computers while avoiding "somebody else's computer" — a popular definition of the cloud — when that other computer belongs to Microsoft.

Those two legit reasons

I mentioned there are two reasons your data might be scanned that, to me, make a certain kind of sense.

I'm not saying I necessarily agree with either, and Lord knows they're both subject to abuse, but conceptually, at least, they make sense. Those two cases seem inevitable and are covered publicly in Microsoft's Terms of Service and other official documentation.

Here's the thing: they can do all that for files stored in OneDrive, of course. They could do it for any internet-connected PC running Windows.

Again:

I do not believe that Microsoft is scanning your data — on your computer or anywhere else.

But they control technology that would allow them to do whatever they want. We trust that they don't.

Why I'm not concerned

The backlash of any actual content scanning, copying, or re-use that goes against the terms of service you've agreed to would be a legal and PR nightmare for Microsoft. While it's true they have had those in the past, this would be particularly egregious, and, most importantly, costly.

It would quickly put them at a greater competitive disadvantage compared to other companies that make privacy a top selling point.

What's also often overlooked is that corporations — Microsoft's largest customers, after all — would throw an absolute fit if it came to light that their sensitive documents were being used for anything not formally agreed to in a corporate contract.

The cost of failure is too high, and the potential benefits for Microsoft are too low. They can use other things to train their AI without poking around in what people are storing in OneDrive.

Podcast audio

Footnotes & References

76: Terms of Service, License Agreement, or AUP, Acceptable Use Policy.

77: I don't trust them not to hold my OneDrive files for ransom, for example.

Tip of the Day: Don't Bother Blocking Senders

2025-09-17 08:00:01

Blocking an email sender is ultimately ineffective in most cases.

Blocked Senders
Blocking senders of junk email. (Screenshot: askleo.com)

Some email programs allow you to block senders. This adds their address to your personal list of undesirable contacts, causing their emails to go to your spam folder instead of your inbox. It's tempting to use this on annoying spam, but the bottom line is, it doesn't work. Not in the way you want it to, at any rate.

Here's the problem: "block senders" works based on the email address in the "From:" field only. Spammers constantly send from different ones. They'll fake, spoof, or just use literally millions of different email addresses as the "From:" email address. You may block one sender, but you'll have done nothing to block the next.

The same is true for "block domain" (the part after the "@" in an email address). Because spammers use otherwise legitimate email addresses they've stolen or faked, if you block an entire domain, you'll block legitimate email from that domain as well.

Instead, just mark the message(s) as junk or spam and move on. Your email program should learn what spam looks like and eventually start filtering it to the spam folder automatically. If it doesn't, it might be time for a different email program or service that does.

I've written about this in more detail in the past: Why Doesn't Blocking Email Senders Work?

Tip of the Day: Confirm Your Time Zone

2025-09-16 08:00:56

Having an incorrect time zone setting can result in major or subtle failures. It's worth a check.

(Video: askleo.com)

If your time zone setting is incorrect, it can cause problems or odd behavior. That's why I recommend you confirm it on your PC. (Right-click the clock in the taskbar and click on Adjust date/time.)

If it's set improperly, problems range from missed notifications to websites that refuse to connect. While the latter is pretty serious, the former — and many side effects like it — can be subtle and difficult to diagnose.

While you're there, confirm that "Adjust for daylight saving time automatically" is set the way you want it. Normally, leaving it on is the most appropriate.

Finally, the definitions of which time zones apply where or when daylight saving time should apply change from time to time. Windows Update keeps this all up to date, so make sure it's running.

How Does a VPN Protect Me?

2025-09-15 08:00:45

A VPN can keep your online activity private, especially on open Wi-Fi, but it’s not magic. I’ll show you what a VPN hides and what it doesn’t, so you can decide if it belongs in your security toolkit.

The Best of Ask Leo!

Hiding from prying eyes.

by

A VPN can keep your online activity private, especially on open Wi-Fi, but it's not magic. I'll show you what a VPN hides and what it doesn't, so you can decide if it belongs in your security toolkit.
VPN
(Image: canva.com)
Question: So there's a lot of talk about using a VPN to hide what we do from our ISPs, and you've mentioned using it when using open WiFi. So just how and what are the protections of this versus just connecting through my ISP? What limitations does this have? Can they "see" what I'm doing (like using a BitTorrent), and that that activity is coming from my account?

A VPN, or Virtual Private Network, is one approach to connecting securely to a remote resource. Depending on the VPN, that privacy can extend from one end of the connection to the other or can protect you only for a certain portion.

I'll describe the different scenarios, and how you are — and perhaps are not — protected by a VPN.

TL;DR:

VPN Protection

A VPN encrypts your internet connection so hackers, hotspot owners, and your ISP can't see what you're doing. It's great for open Wi-Fi, but not perfect. Your VPN provider can still see your traffic. Some sites block VPNs.

No VPN at all

I'll use this scenario as the base. Say you're at an open Wi-Fi hotspot, connecting to a remote resource like your email or your bank.

Open Wi-Fi Data Path
(Image: askleo.com)

All the connections are unencrypted. (This assumes no https is being used. More on that in a moment.)

The largest area of concern is the connection from your laptop to the Wi-Fi access point. That open Wi-Fi signal traveling through the air can be "sniffed" (or read) by anyone in range with a laptop and the software to do it.

Open Wi-Fi Vulnerability
(Image: askleo.com)

Lately, however, there's been additional concern about the fact that your ISP can monitor what you're doing. Specifically, they can see every remote site or service you connect to and examine all unencrypted data you exchange with those servers.

WPA encryption

WPA Encrypted Wi-Fi Path
(Image: askleo.com)

The traditional approach to protecting yourself from open Wi-Fi sniffing is to use the WPA75 encryption built into Wi-Fi.

This secures the path between your computer and the Wi-Fi access point. Hopefully, that's how your home Wi-Fi is configured; that prevents nearby homes or others from connecting to your Wi-Fi, and through it, to your network.

There are problems with using Wi-Fi.

That last point is important, because all the traffic is visible to the hotspot's owner, should they care to peek, and to the internet service provider to which that hotspot is connected.

A VPN service

To protect yourself further, a VPN is a common solution.

(Image: askleo.com)

A VPN securely encrypts the entire path from your computer to the VPN provider. No one along that path can see your data: not other Wi-Fi users, not the people managing the hotspot, and not the hotspot's ISP.

For open Wi-Fi or other situations with questionable security (such as connecting to the internet at a hotel), a VPN can be a great solution.

But it's not perfect.

There are some things to note.

Using a VPN, the ISP you're connecting through can't see that you're using BitTorrent (for example), but the VPN service can. Your ISP would still see that:

End-to-end encryption

True privacy is achieved with end-to-end encryption. Unfortunately, that isn't possible in many cases, since the service you are connecting to must support it.

HTTPS is end-to-end encryption.

An https connection
(Image: askleo.com)

Connections you make via HTTPS are completely encrypted along the entire path from your machine to the remote server you're accessing. That's why banks (and other services that allow you to access sensitive data) should use HTTPS.

Similarly, when configuring a POP3, IMAP, or SMTP connection in your email program, choose SSL or TLS. That's the underlying encryption protocol used by secure connections like HTTPS. That way, your email uploads and downloads — as well as your log-in information — are completely encrypted along the entire path to your mail server.

Note, however, that even when using HTTPS, your ISP can still see which sites you connect to. Only a VPN can hide that information from them.

HTTPS over a VPN?

Just to complete the picture, if you're using a VPN and you connect to an HTTPS website, your data is doubly encrypted for part of the trip.

Https on a VPN
(Image: askleo.com)

There's really no practical harm. One benefit is that the VPN prevents your ISP from seeing which site you're connecting to.

Podcast audio

Footnotes & References

78: Ideally, WPA2 or WPA3, but that's a detail that doesn't affect our conceptual discussion.

Tip of the Day: Try Another USB Port

2025-09-15 08:00:30

When a USB device begins to fail, it's logical to blame the device. Logical, but not always correct.

USB ports
(Image: canva.com)

It's not uncommon to hear of USB drives and devices that fail.

It's also common to assume it's the drive or device causing the failure.

Don't. Before you give up on that device, try a few things.

The key here is to realize that it's not just the device that might have a problem. It could be the cable, a hub, or even the computer that's interfering. Do a little more research before discarding or replacing what may be a perfectly good device.

Where's My Disk Space Going?

2025-09-13 08:00:00

Running out of disk space can be frustrating, especially when you don’t know what’s eating it up. I'll show you how to track down the culprits with a free tool so you can see exactly where your space is going.

How to find out.

by

Running out of disk space can be frustrating, especially when you don't know what's eating it up. I'll show you how to track down the culprits with a free tool so you can see exactly where your space is going.
Full
(Image: canva.com)
Question: Our disk drive is split into a C: and a D: drive. We only ever save on the D: drive, but the C: drive has only about 540MB left available! Apart from about 5GB of photos, I can't understand what is taking up all the memory disk space. The memory disk space seems to continually go down and is now getting to a critical level. I have run malware checks and deleted all critical errors, but still have not been able to free up any memory disk space. I can't even defrag as I need 20% free to run this option.

(Why "memory disk space"? I'll address that below.)

No matter how much we have, disks never seem to be large enough. As we collect pictures, videos, and programs (and the programs themselves collect data), more and more disk space is consumed. With so much happening on our computers these days, it's difficult to understand what's taking up the most space.

Fortunately, I can recommend a free tool that can give us some very helpful data.

TL;DR:

Losing Disk Space

Disk space can disappear fast, even if you think you're saving files elsewhere. A free tool called TreeSize shows you exactly what's taking up space on your drive. With that information, you can decide what to delete, back up, or move to keep your computer running smoothly.

TreeSize Free

TreeSize Free is a free tool that shows you what's taking up all of the space on your machine. (A paid version is available with additional features, but for what we're doing, the free version will suffice.)

Treesize Free download
Downloading Treesize Free. Click for larger image. (Screenshot: askleo.com)

Download TreeSize Free from the JAM Software page and install it.76

Upon completion, run it. You'll be asked if you want to restart the program as administrator.

TreeSize as Admin?
Run TreeSize as administrator. Click for larger image. (Screenshot: askleo.com)

I recommend choosing "Always start as administrator". This allows TreeSize access to everything and will generate more accurate space usage reports.

As TreeSize scans your hard drive, it updates its display in real time. Once the circular progress bar disappears, the results are complete.

TreeSize progress indicator.
TreeSize progress indicator. (Screenshot: askleo.com)
Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

A typical machine

This is the result of running TreeSize on C:\ of a basic Windows 10 installation.

TreeSize on a typical machine.
TreeSize results on a typical machine. Click for larger image. (Screenshot: askleo.com)

The primary information here is a list of all of the top-level folders on the C: drive and the amount of disk space they consume. It's sorted by decreasing disk space, so the biggest space consumers are at the top.

Unsurprisingly, it shows that the Windows folder and everything it contains uses the most space.

Digging deeper

You can see the contents of the next level of folders by clicking the greater-than sign (">") to the left of the folder name. Here's the Windows folder expanded.

TreeSize on the Windows folder.
TreeSize details on the Windows folder. Click for larger image. (Screenshot: askleo.com)

You can see right away that the "WinSxS" folder contains the most data of all the subfolders within C:\Windows. (This is normal, by the way.) You can also see the relative size of the other folders within Windows. If you want to drill down deeper, keep expanding subfolders.

TreeSize on user files

It's useful to see what's stored in your user account folders. In Windows, that means looking at the contents of "C:\Users\%USERNAME%." In my case, that's C:\Users\leon.

TreeSize on a user folder.
TreeSize reporting on a user folder. Click for larger image. (Screenshot: askleo.com)

You can see that AppData and its contents take up the most space in my account.

Your machine

Now, as to what's eating up the disk space on your machine, there's no way for me to know. However, using a tool like TreeSize, you should be able to see what's taking up all that space and take appropriate action.

Aside: Disk space is not memory

People confuse these terms a lot, and it's very important — particularly when asking for help — that the terms you use accurately reflect what you're talking about. To oversimplify a little:

Another good difference to note is size. My laptop, for example, has 16 gigabytes of memory, but a terabyte (1024 gigabytes) of disk space. Disk space on a machine is much greater than its RAM.

Podcast audio

Footnotes & References

79: Yes, this does make the somewhat ironic assumption that you have enough space to download and install the tool. Fortunately, it's not large.

Tip of the Day: Windows Remembers Size and Position (Mostly)

2025-09-12 08:00:57

Most of the time, Windows does what you want.

(Video: askleo.com)

I've been asked how to get a program to open to a specific size and position on the screen.

The answer? Set it to the size and position you want and then close it.

The next time you open the program, it should open the way you left it. If you then change the size and position or the maximized state of the window and exit again, the next time you open the program, it should open to the last size and location.

Windows usually remembers the on-screen position and size of a program's primary window when you exit the program, and will open it to that state or size the next time you run it. It's not 100%: even in the example above, the second size change retains the size, but not the position, of the window.

Naturally, this can be affected by things like your hardware or screen resolution changing after you exit the program and before you start it again, at which point Windows makes a "best effort" to approximate how you left things the last time.

I did have to say "usually" above. This works for most programs, but not all. Programs can override this behavior and do whatever the heck they want. If you run into a program that isn't behaving as described, check that program's documentation (or complain to that program's creator) to find out if it's possible to change that behavior.

Can I Tell If Something's Been Pasted Instead of Typed?

2025-09-12 08:00:02

Is pasted text the same as typed text? Usually yes, but not always. Hidden clues, formatting quirks, and even spyware can reveal the difference. Learn when copy/paste is truly invisible, when it’s not, and why it matters if you’re tempted to take shortcuts.

Not usually, but then again...

by

Is pasted text the same as typed text? Usually yes, but not always. Hidden clues, formatting quirks, and even spyware can reveal the difference. Learn when copy/paste is truly invisible, when it's not, and why it matters if you're tempted to take shortcuts.
Hands Typing.
(Image: canva.com)
Question: If I have received a .rar file that contains many jpeg files, and I have to type it in Notepad, but I am doing copy-paste from the image in the Microsoft notes, and then copy from there and paste it into Notepad, and I save the document as .txt, can that be detected?

On the one hand, the answer seems obvious. (Spoiler: no.) However, there are possibilities we need to consider. (Spoiler: maybe.)

The devil, as they say, is in the copy/pasted details.

TL;DR:

Copy/Paste versus typing

Copying and pasting usually looks the same as typing, but sometimes hidden details, formatting, or OCR mistakes give it away. In most cases, no one can tell. But spyware, intentional errors, or assignment rules might expose you. Don't cheat. Follow instructions.

There should be no difference

Pasting text into a document should be no different from typing it in.

Highlight this sentence, copy it, switch to Notepad, and paste it. The result will be exactly the same as if you had carefully typed it in by hand.

That's the theory behind the clipboard and copy/paste: it's a shortcut to make life easier by saving us keystrokes.

However.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Obvious differences

Highlight this sentence, copy it, switch to Notepad, and paste it. The result will be different. The word "this" will not be italicized, because Notepad doesn't support rich text.77

This is an example to show that in some applications, copy/paste can copy and paste more than the text you see: it can include "metadata" — the data about the data.

What the metadata is, what it says, or even whether it's there at all depends on where you are copying from. It could be visible, as in "this word should be in italics", or it could be invisible, as in "these words link to that website".

What happens to metadata depends on the program you're pasting it into. It could be ignored, as Notepad ignores the instructions to italicize a word; it could be copied verbatim, as in preserving a hidden link as a hidden link, or it could be changed, perhaps unhiding that hidden link by applying default formatting for links to it.

As a result, more could be copy/pasted than you think, and some of that data could give away the fact that it probably hadn't been typed in by hand.

Intentional or accidental differences

In the original question, an OCR of an image of text transformed a picture of text into a series of individual characters that can be copy/pasted.

Even though it's constantly improving, OCR is rarely perfect. If you are supposed to type what you see, and OCR sees something different, then pasting the OCRed text will not match, since the OCRed version may include errors.

For example, is this the number one or the lower-case letter L: l?

Depending on the font, they might be virtually indistinguishable. Only through context might you be able to know. (And even then, in this example, there's no context to give any clues.) OCR errors like this are common and have patterns that are easy to look for and detect.

As we'll see in a moment, the error might be intentional. If I purposely misspell a word, give you an image of the text containing the word, and tell you to type what you see — do you take that literally and include the typo? Or do you fix the typo? A copy/paste will never fix a typo — it'll copy exactly and only what was there to begin with.

The difference can be telling.

Spyware

Again, for reasons that will become apparent shortly, I have to include spyware of some sort in the mix. Spyware can tell exactly what you did, right down to the keystroke. It will make it glaringly obvious that you didn't type something, but copy/pasted instead.

If you're using a school or business computer, they have every right to monitor your activity with spyware.

They can tell.

What I think is going on

In this case, I believe that students or employees have been given an assignment to specifically retype text given to them as an image, and they're trying to cheat by using OCR and copy/paste instead.

The worst case, I suppose, would be a typing class where you're supposed to be practicing your typing. Copy/paste isn't practice, but it might seem a lot easier.

Regardless of the reasons, my gut tells me people are trying to take a shortcut where they're not supposed to and are concerned about being found out.

I have two pieces of advice for those folks:

  1. Ask for clarity in the assignment: ask for explicit permission to OCR and copy/paste. If the task allows it, it can absolutely speed things up.
  2. Don't cheat. Follow your instructor's instructions or your boss's rules.

As we've seen, while in theory copy/paste isn't detectable in most cases, it could be accidentally exposed by various means.

It's now more than pasting text

As I revisit this article, I see an interesting parallel to the increasing use of AI.

Currently, it's generally easy to determine that something wasn't written by a real person. However, just like OCR, AI is getting better and better, and it's getting more and more difficult to tell.

Whether that's acceptable in the workplace for getting a job done is one thing. Clearly, OCR has its role, as does AI-written content. But particularly in educational environments, they seem like inappropriate shortcuts — more colloquially known as cheating.

Podcast audio

Footnotes & References

80: Well, it didn't used to. My experiment with the current Notepad seems to show that formatting is still removed on paste, even though you can then add the formatting manually.

Can Your Video Chat Be Intercepted and Recorded?

2025-09-11 08:00:12

Your video chats are usually private and encrypted, but nothing is foolproof. The real risk isn’t hackers; it’s the person on the other end, who can record everything. Learn why interception is rare, where the real danger lies, and the one rule to follow if you’re unsure.

Yes, but...

by

Your video chats are usually private and encrypted, but nothing is foolproof. The real risk isn't hackers; it's the person on the other end, who can record everything. Learn why interception is rare, where the real danger lies, and the one rule to follow if you're unsure.
A video chat in progress.
(Image: canva.com)
Question: Hi, Leo. I had a private video chat with my girlfriend. I'm afraid that it could be recorded by someone and released on, say, a porn site. We used personal laptops. When I got a doubt, I scanned both systems with an anti-virus tool, and they're clean. So, there's not really a virus, but I'm still afraid that someone will record it for monitoring and all.

It's impossible to prove that it can't be (or wasn't) recorded: you can't prove a negative. Ultimately, if this is something that really concerns you, then don't do that!

I don't think there's going to be a problem here. In practical terms — with one exception that most people don't think about — it's highly unlikely.

TL;DR:

Recording private video chats

Video chats are hard to intercept since they're usually private and encrypted. The biggest risk is the person you're chatting with, who can record the call and use it later. If you're not sure you can trust them, do nothing on camera you wouldn't want shared publicly.

Fear of intimate interception

If you look through the comments on this article, you'll see person after person (after person) ask what is essentially the same question. What's scary is that they're asking after the fact, and most are scared out of their wits that the answer is, "Yes, your intimate chat could have been intercepted and recorded."

It's also scary how many don't bother to read the article they're commenting on, which answers the question. (Which is why comments on this article remain closed.)

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Three reasons you might be okay

There's probably no intermediary

Most (but not all) video chat is over a direct machine-to-machine connection. To deliver the video stream as efficiently as possible, the data goes directly from your computer to theirs. There's no server or service in the middle processing (or capturing) the video stream.

Most chats are encrypted

Depending on the service you use, the data is likely to be encrypted. Even someone who could intercept the data — like your ISP, for example — probably can't decipher it.

You're just not that interesting

I'm sorry to disappoint you, but you and I just aren't that interesting to the people who would have to spend time and effort intercepting and watching whatever you did on video.

Yes, all three of those points are qualified: "probably", "most", and, of course, you could be "interesting" if you're in a position of power or have some other sensitive role. But it's extremely unlikely someone would take the time and effort to try to intercept your video chats.

The most common reason why you might not be okay

The most common reason videos get recorded has nothing to do with technology, intermediaries, or your position in life.

It's simple for the person at the other end to record your video. Screen-recording software does it easily. The only requirement is that it be running on the computer at one end of the video conversation, and there is nothing you can do to prevent that.

That's a scenario I hear about. Someone is lured into an intimate video session that is captured by the person at the other end. That person then uses that video for blackmail.

The only other scenario where video recording is theoretically possible is if you or your video partner has malware on your machine. I've never heard of this happening.

Podcast audio

Tip of the Day: Configure an Email Program (Even if You Don't Use One)

2025-09-11 08:00:08

Accessing email by web browser vs. email program are not the same thing. Sometimes you want both.

Using your web browser to access your email is convenient. Fire up Chrome, Firefox, or Edge, and you can access your Gmail, Outlook.com account, Yahoo! mail, and many others from any machine you like, including your mobile devices.

It's how I live. Nearly all of my PC email time is spent in my browser viewing my email accounts.

There's one drawback, however: you can't use your computer's "Send to mail recipient" function from a web browser.

If you're working on something on your computer and want to send it to someone via email, you can do so through a menu like the one pictured above. This function requires an email program to be configured on your machine. Not the web browser you use to access your email, but an actual email program.

There are a variety of solutions to this problem, but the simplest is to configure the email program already installed on your computer with your email account credentials. That way, when you "send to" a mail recipient, this program will send the mail.

It's not perfect. Depending on the email program and account you use, the contact list you maintain in the online web interface may or may not be available to you in the PC-based email program. But you'll at least be able to quickly and easily send the message.

There's a strong argument to configure only the SMTP (sending) component of your email account. That way, the email program will not accidentally download your email when you're not expecting it. Whether this is possible and how you would do so depends on the email program you're using and the email account you're connecting to.

The bottom line: continue using your online web email access as you like. But by having an email program configured and ready to go on your PC, you'll be able to use more of the email-sending features offered by Windows and other applications.

Should I Just Use AI for Searching?

2025-09-10 08:00:36

AI or search engine? Both promise answers, but in very different ways. From accuracy and freshness to bias and even energy use, each has trade-offs you need to know. Before you pick one over the other, find out why the smartest choice might be both.

My answer may be controversial.

by

AI or search engine? Both promise answers, but in very different ways. From accuracy and freshness to bias and even energy use, each has trade-offs you need to know. Before you pick one over the other, find out why the smartest choice might be both.
OpenAI and Google logos on a balance scale
(Image: askleo.com)

Google was once the go-to search engine for the internet. "Google it" even became a generic term for looking up something online. But there's been a big shift to a different type of answer engine: AI chatbots like ChatGPT and others.

Let's review the pros, the cons, the risks, and the impact of these choices.

First, we need to review the differences between the two.

TL;DR:

AI for search

AI and search engines work differently, and each has strengths and weaknesses. Search is good for fresh, direct lookups, while AI is better for questions, summaries, or creative tasks. Both can be wrong or biased, so check sources. The best answer? Use both and always stay skeptical.

Different in concept

Search engines like Google, Bing, and others work by amassing huge indexes of information from having crawled (AKA read) all the webpages on all the websites they can access. These indexes, which consider hundreds of different factors, are used to answer the question, "Which pages on the internet best represent the terms being searched for?"

AI services, on the other hand, are "trained" on massive datasets that range from specific sets of training data to the same "all the webpages on all the websites they can access". The goal of all this training is to answer the question, "What words would best follow the words that have been typed in by a user?"

Put simply, a search engine is basically a lookup — get pages that relate to a word or phrase — while AI (specifically large language models) is glorified auto-complete — return the best next word, and the next, and the next, and so on.

That AI works in place of a search engine is because generally, the "best next words" to follow any question or term are often the very answer we're looking for.

Now that we have an idea about how each works, we can compare the accuracy, citation, timeliness, bias, and environmental impacts of both.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

AI can hallucinate. Search can miss.

I'm sure you've heard of AI "hallucinations" — an AI response that is completely wrong. That whole "best next word" model has nothing to do with accuracy. If the most appropriate response to a question doesn't exist, AI can make it up. AI doesn't know how to say "I don't know".

This is all a function of the training data. The more data AI gets trained on, the more likely it is to have an appropriate and correct answer. Yet, if the data the AI has been trained on is wrong or misleading, the AI wouldn't know.

Search isn't perfect either, though. It relies on the way a search is phrased, so ambiguous and incomplete search terms can lead to wildly off-topic results. In addition, search engines are constantly being "gamed" by individuals trying to get their pages (often poor quality, irrelevant, or even malicious) to rank higher.

Both require us to maintain a healthy level of skepticism and independent confirmation. Unfortunately, many people skip this step for either search or AI.

An answer versus a reference

AI prioritizes giving you an answer to your question or search terms. It may or may not include references to where the answers came from.

A search engine prioritizes giving you references to webpages that presumably contain what you're looking for. Many search engines also include an AI-generated summary that may or may not suffice as the answer you're looking for.

Freshness

Most search engines constantly scour the web for up-to-date information. Websites that change often or produce timely information, such as news sites, are crawled more frequently to include their latest information in search results.

AIs typically train on a snapshot of data, meaning that what they ‘know' is only as current as when that snapshot was taken. To overcome this limitation, some AIs augment their responses with searches that are then factored into their responses.

Bias

Search results are heavily influenced by ads (particularly when those ads are difficult to distinguish from organic search results), SEO tactics used by people trying to game the system, and general website and page popularity.78

More than anything, AI is a product of its training data. If that data is limited in scope or biased in some way, then the AI will be similarly limited and biased. AI is also subject to "guardrails" implemented by each provider attempting to prevent it from generating responses that would be considered inappropriate.

Impact

Perhaps the most controversial topic when it comes to AI (well, next to whether or not it's making us dumber or will lead to our extinction) is its impact on the environment. AI uses a lot of energy. Sure, the Google data center powering Google Search uses a lot of energy as well, but depending on what you measure (electricity use, CO2 generation, or something else), AI is somewhere between ten and hundreds of times more energy-hungry.79

Why? Because a search is a lookup: take the search terms and look up the most appropriate pages from the index of pages crawled. An AI response is a computation, and that takes more work. It's the difference between looking up a word in a book's index versus having to write a paragraph about the word from scratch.

My take on it all

Here's what I do.

In other words, I use both search and AI for what I feel each is best at right now.

More important than anything else, though, is that I remain skeptical of what I'm told, regardless of where it comes from. I try very hard not to let any of these tools (or any others I might try) lull me into complacency. The answers have to pass the sniff test, and I check references if I'm not 100% certain.

Podcast audio

Footnotes & References

81: Normally, when I mention "bias", I get a lot of commentary about political bias from people who believe that a search engine has been explicitly tailored to exclude results that don't agree with some assumed political agenda. This amuses and frustrates me because I get it from both sides: the left believes search leans right, and the right believes that the same search engine leans left. I think it's more likely that the individual doesn't like or agree with the results that are, on the whole, relatively objective. Nonetheless, people will yell at me, convinced it's otherwise.

82: I acknowledge this as a current issue. I think it's an issue that will diminish over time as more and more renewable energy sources come online.

83: Kagi is a paid service. I do not get any compensation from them for mentioning them.

84: I pay for Perplexity as well, and they also do not compensate me for the mention.

85: I pay for ChatGPT. They don't pay me.

Tip of the Day: Run CHKDSK Periodically

2025-09-10 08:00:18

Catching errors early with CHKDSK makes recovering from issues easier.

(Video: askleo.com)

It's not terribly common, but it happens more than people realize. Disk errors can lie dormant for a long time before they raise their ugly head to cause problems.

One day, on a properly operating computer seemingly without problems, you might have cause to run CHKDSK and be surprised to find that there are errors on the disk. These errors are often things CHKDSK can fix (albeit with a small risk of data loss).83

Rather than risk this — having errors that haven't been exposed yet — I recommend running CHKDSK every so often. You can run the command line version in an administrative Command Prompt, as shown above, or by right-clicking on the drive in Windows File Explorer and selecting Properties and Tools. Under "Error checking," click on Check.

You may get a clean bill of health. If not, CHKDSK may attempt repairs, which will work most of the time.

This is worth doing not only on your system drive but on external drives as well, especially any that were disconnected without the "Safely remove hardware" process first.

Of course, the other protection from data loss is to make sure that everything on those drives is backed up.

But you already knew that. (Smile)

Footnotes & References

86: To be clear, the data loss has already happened. CHKDSK doesn't cause the data loss; it simply makes it apparent.

Tip of the Day: You Can't Rely on Damage Assessment

2025-09-09 08:00:04

Missing files can be a sign of malware, but they're not a sign you can rely on.

Virus Detected
(Image: canva.com)

Someone asked me if they would notice if someone had maliciously deleted any of their files.

The answer? It depends.84

If the deleted files are something you rely on and they're suddenly gone, it's pretty likely you'd notice. This applies not only to your data files but to support files used by your software and the files that make up Windows. If any of those are deleted, maliciously or otherwise, you'll probably notice pretty quickly.

However, if the files are things you rarely access, you won't notice anything is amiss until you try to use those files. If that doesn't happen until a month after the deletion, that may be the first you learn of it.

The good news is that most malware with malicious intent will probably damage, delete, or encrypt something important, and you're likely to notice it quickly.

The bad news is that not only will the deletion of infrequently used files go unnoticed for some time, but there's also malware that deletes nothing: for example, malware that installs a bot on your computer.

The bottom line is simple: you can't rely on detecting file deletion or other types of malicious damage.

That's why:

Footnotes & References

87: My most common answer of all time. Smile

How Do I Remove Myself From a Computer?

2025-09-08 08:00:44

Leaving a job and worried about what’s on your work computer? From browser history to email accounts, traces of you remain. Learn what you can (and can’t) erase, and the smartest way to protect your privacy before you walk out the door.

The Best of Ask Leo!

It's harder than you think.

by

Leaving a job and worried about what's on your work computer? From browser history to email accounts, traces of you remain. Learn what you can (and can't) erase, and the smartest way to protect your privacy before you walk out the door.

The scenario is this: you're ending a long and successful relationship with your employer (or maybe a not-so-long or not-so-successful one).

At that workplace, it was acceptable to use your work computer to check your personal email, use an instant messaging client, check in on Facebook, and even surf the web for non-work-related things — all within reason, no doubt.

Now, on your way out the door, you'd like to make sure your personal account information isn't left behind. Perhaps you'd like to clean up a few other traces of your activities as well.

TL;DR:

Removing your traces from a computer

You can't completely erase yourself from a work computer. The only sure way is to wipe the drive and reinstall Windows, which you usually can't do. You can clear browser history, email, and messaging accounts, but traces may remain. Best protection? Never mix personal and work use.

It can't be done completely

Before I begin, I must caution you: there's simply no easy way to ensure that all traces have been completely and irrevocably removed.

The only way to do that is to reformat the machine you're leaving behind, taking care to erase everything on it. I'm going to assume you're not allowed to do that. Even if you were, had your organization installed spyware or been monitoring your network activity — both of which are allowed in most workplaces — the traces you might want to erase might not even be on your computer.

The steps below will make it difficult (but not impossible) to recover your personal account information. Should someone have enough interest and resources, it's possible to recover a tremendous amount of supposedly deleted information. It's not always easy or cheap, but it is possible.

Before you ever use someone else's computer — even "your" computer at work — be aware that you will leave a trail, and behave accordingly.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Chat and instant message software

IM software seems to be a particularly convenient and not terribly intrusive way to stay in touch with friends, family, colleagues, and even coworkers. Recent years have seen the rise of dedicated tools like Slack, which are specifically designed to enable workplace communication.

There are several things you'll want to do before you leave.

Exactly how you do each of those things, or whether they even apply, will vary depending on the specific program you've used.

Web browser

In an effort to be helpful, most web browsers remember a lot of information you've supplied as you've used them. Some things to do before you leave include:

There's a strong argument that you should clear everything your browser allows you to clear.

Email

This will vary a lot based on the email client you use, but here are things to look at.

In the future, consider using only a web-based email reader to access personal email on your work computer.

Windows

Spend time reviewing My Documents or similar folders, including all the subdirectories therein. The Downloads folder is one example where items you've long forgotten about could remain. Be sure to copy any files you want to (and have the right to) take with you.

If you're allowed to download and install apps, consider running CCleaner, the Windows general-purpose clean-up tool. It has options to delete a lot of history, temporary files, and saved passwords, not only for Windows but for several common applications as well. When you're leaving a work machine behind, this is a case where it makes sense to let CCleaner be quite aggressive. It also has a free-space wiping function, which I recommend you run after you've deleted everything you can from the computer.

Podcast audio

Tip of the Day: Pause Cloud Sync

2025-09-08 08:00:09

Cloud storage apps are convenient, but they use bandwidth. Pause them when bandwidth is at a premium.

(Video: askleo.com)

Cloud storage services like OneDrive, Dropbox, Google Drive, and others are popular and provide convenient data storage and backup features.

They all use internet bandwidth. As they synchronize what's on your computer(s) with what's on their servers, they upload and download files as well as communicate to find out which files they should transfer. Normally, this isn't a big deal, and it's what we expect of these services. Keeping our files in sync is exactly what we use them for.

There are times, however, when it's not such a great idea for the synchronization to happen.

I found this out while I was using in-flight Wi-Fi on a recent trip. The internet is (much) slower because of the technology used to get it to the aircraft, so everything counts. I had all three running — OneDrive, Google Drive, and Dropbox — and it brought my connection to a crawl. I assume it affected anyone else using the internet on our flight as well.

Fortunately, all three services include an option to pause synchronization.

Whether it's OneDrive's option to pause for a predetermined amount of time, as shown above, or others to pause indefinitely, it's the right thing to do when you're on a bandwidth-constricted connection.

Later, when you're back home or wherever the bits flow more freely, you can unpause, and the tools will pick up any changes that happened in the interim to the files they contain.

Can Malware Survive If I Reset My PC?

2025-09-06 08:00:58

Worried a reset won’t wipe out malware? While it’s technically possible for some infections to survive, it’s extremely rare. Learn where malware can hide, which reset options are safest, and the extra steps you can take to ensure a truly clean and secure Windows reinstall.

Applies to Windows: 11, 10

Reset is the ultimate malware removal. Or is it?

by

Worried a reset won't wipe out malware? While it's technically possible for some infections to survive, it's extremely rare. Learn where malware can hide, which reset options are safest, and the extra steps you can take to ensure a truly clean and secure Windows reinstall.
A cockroach surviving an explosion.
(Image: ChatGPT)
Question: Can a virus survive Windows "Reset this PC" and "Remove everything"?

Technically, yes, certain types of malware can survive a reset.

Pragmatically, though, these types of malware are rare, especially if you take a couple of additional steps as you "remove everything".

TL;DR:

Surviving a reset

Most malware won't survive a Windows "Reset this PC" command, but a few rare kinds can hide in partitions, rootkits, or even firmware. Use "Remove everything," "Cloud download," and "Clean data" to make a reset safer. For true peace of mind, start with a clean installation media and wipe the hard drive along the way.

Persistent, resistant malware

I'll say there are three places malware could, in theory, survive the default "Remove everything" option in Windows' "Reset this PC" process.

Rootkits

A rootkit is malware that takes additional steps to hide its existence from the operating system. This means that when "Reset this PC" deletes the existing files on a hard disk (or moves them aside into Windows.old), the rootkit could survive to re-infect the resulting clean installation of Windows.

Partitions

Malware could install itself, or a copy of itself, into one of the reserved partitions, including the recovery partition from which Windows will be reinstalled. The "fresh" copy of Windows could then come with malware.

Firmware

Some malware infects the firmware on your machine, such as your BIOS or UEFI. By definition, this is the software that runs on every boot and manages access to certain hardware. It's not affected by "Reset this PC".

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

"Keep my files" is probably a bad idea

When you reset your computer, one option you select is whether to remove your files.

Keep or Remove?
Keep or remove? Click for larger image. (Screenshot: askleo.com)

The default is to keep your personal files. Presumably, this means the files in your "Documents" folder and similar locations, but it's unclear how much is kept. Regardless, if one of those files is infected, then this presents an opportunity for that infection to persist.

So, choose "Remove everything". This does imply that you've got your data backed up or copied elsewhere to restore after the process is done.

"Local reinstall" is probably a bad idea

Next, you'll be asked if you want Windows to be downloaded or if a local copy should be used.

Cloud or Local reinstall?
Cloud or local reinstall? Click for larger image. (Screenshot: askleo.com)

A local reinstall would be faster, but as I noted above, there's an extremely slim possibility that the local copy of Windows used for this reinstall could have been compromised by malware.

If that's a concern, choose a cloud download.

"Clean data" is probably a good idea

Next up is a summary of what's been decided so far.

Additional Settings
Additional settings for the reinstall. Click for larger image. (Screenshot: askleo.com)

Note the phrase "Do not clean the drive". We want to change that.

Click on Change settings.

Clean data options.
Clean data options. Click for larger image. (Screenshot: askleo.com)

Make sure that "Clean data?" is selected. "Delete files from all drives?" is also a good idea.

But that still doesn't cover all the possibilities.

Start with an empty drive

The only way to be sure that everything on the hard drive is truly removed is to boot from a Windows Setup disk and reinstall Windows from scratch. In other words, don't use "Reset this PC" at all, because it relies on possibly compromised software in those hidden partitions.

Even then, there are additional steps to take.

As part of the setup process, you'll be asked what type of installation you want.

Which type of installation do you want?
Windows Setup: Which type of installation do you want? (Screenshot: askleo.com)

Choose Custom, which presents a list of partitions on the disk.

Windows Setup - Partition Management
Windows setup partition management. (Screenshot: askleo.com)

My recommendation is to delete each listed partition (click on each in turn, and click Delete).

Then continue to install Windows normally. Windows Setup will create new partitions and format them as needed.

But even that doesn't cover everything.

The firmware dilemma

Again, it's extremely rare, but malware entrenched in firmware is significantly more difficult to remove.

You can try the procedure outlined by your computer's manufacturer to update your UEFI or BIOS, even if you're "updating" it to the same version as already installed.

Other devices that could be compromised may or may not have similar procedures for updating or replacing their firmware. The problem here is knowing which are installed on your system, and whether this is an option for them.

There's just no easy answer when it comes to firmware.

Podcast audio

Tip of the Day: Get a PIN Before You Go

2025-09-05 08:00:59

Getting a PIN for your credit cards before you travel can be the difference between being able to use them or not.

If you live in the United States or Canada (and possibly other countries), you're used to using a PIN for your debit card but not for your credit card. While the traditional swipe-and-sign credit card use is seen less and less in favor of chip readers and tap-to-pay, most people don't need, use, or have a PIN for credit cards.

If you're about to travel — particularly to Europe — check with your credit card provider and see if you can get a PIN for your credit card. Many businesses there are exclusively chip-and-pin. If you can't provide a PIN, you can't use that card.

And yes, this is the voice of experience.

I recently returned from a short trip to Europe where I could not use my credit cards at most retail establishments. I had no PIN. I had to use cash or my debit card.

I contacted one of my credit card companies to set a PIN — which was mailed to my home address. It arrived three days after I returned home.

You'll have greater fraud protection if you're able to use credit cards rather than debit cards, and that could be valuable as you travel. (Also, remember to check your statements and online activity to monitor for unexpected transactions.)

Why Am I Getting Bounces for Email I Didn't Send?

2025-09-05 08:00:59

Spammers want to send email that looks like it’s coming from someone who can be trusted. They want it to look like it’s coming from you -- and you may end up getting the bounce notifications.

The Best of Ask Leo!

It's a simple yet frustrating scenario.

by

Spammers want to send email that looks like it's coming from someone who can be trusted. They want it to look like it's coming from you -- and you may end up getting the bounce notifications.
A bounce to something you never sent.
You can receive bounces from email you never sent. (Image: askleo.com)
Question: I keep getting a "cannot deliver email" message from someone I didn't send anything to and don't even have in my contacts list. Why is that, and what do I do?

What do you do? Nothing. There's nothing you can do.

I've been seeing an uptick in this scenario recently, and it's very frustrating, not just for individuals like you, but for those of us who manage mail servers as well.

Why is it happening? In a word: spammers. Let's look at what they're up to.

TL;DR:

Bounces for email you didn't send

Spam often appears to have come from someone who did not send it. If that's you, you may get bounce messages when that spam is identified as spam by its recipient or when it is sent to invalid email addresses. There's nothing to be done, as it was never your doing to begin with.

Why did I get a bounce message?

Bounces for emails you didn't send are just a form of spam. They're the result of spammers trying to get people to open the spam and click on the links in the spam message.

Spammers want their email to look like it's coming from someone the recipient might trust. In other words, they want it to look like it's coming from you. "From: spoofing" allows them to do exactly that. They write messages appearing to come from your email address and maybe even your name. It's easy to do; they don't even need to compromise your account. This From: spoofing has been going on for a long time.

If the email address the spammer sent it to belongs to a real person, they see email that looks like it came from you. They often have no idea who you are and may mark it as spam.

Since spammers are simply blasting email out to huge databases of email addresses, they have no idea whether those addresses are legitimate or not. If they send email to an address that no longer exists, never existed85, or recognizes the message as spam, it bounces automatically.

The email delivery system says, "Hey, I can't deliver this email; I'm going to return it to the sender." Because the sender information on the "From:" line looks like it was you, you get the bounce message.

None of this happened on your computer or your account. In fact, it had nothing to do with you other than that your email address appeared in a spammer's database.

Mail server owners are hurting, too

Imagine you run a mail server, like I run the server that sends mail for askleo.com. Now imagine a spammer sends spam that looks like it comes from one of the email addresses on your server; say, leo@askleo.com.

Some of those emails generate a bounce. Some will be identified as spam. All will negatively impact the email reputation of your domain (in my case, askleo.com).

Your domain's reputation may suffer so that when you send legitimate email, it's slightly more likely to be flagged as spam...

...not because of anything you did. There's little you can do other than ensure you have properly configured your domain.86

Podcast audio

Footnotes & References

88: This is often the result of a dictionary-style approach to generating email addresses to send to: tom@somerandomservice.com, dick@somerandomservice.com, harry@somerandomservice.com, and so on — whether or not those accounts actually exist.

89: Meaning that you have SPF, DKIM, and DMARC properly set up for the domain you own and are using to send email. While they do somewhat help preserve your reputation, they're not perfect.

Tip of the Day: Check for Updates to Get the Latest

2025-09-04 08:00:48

Checking for updates manually can remove the delay and get you everything currently available.

Applies to Windows: 11, 10

(Video: askleo.com)

Every time a major (or even not-so-major) Windows release is announced, people ask me, "How do I get it?"

There are two approaches. The most common is to wait. Based on whatever criteria Microsoft has established, you'll get the update eventually. I've seen it take days, weeks, and even months for major updates to arrive.

I'm nowhere near that patient.

With current Windows releases, manually checking for updates will typically trigger it. (Go to Start > Settings > Windows Update, as shown in the video above.) Even if there's no major update available, checking for updates should cause all currently available updates to be downloaded and installed.

Remember, if you're behind on updates, you may need to run "Check for updates" multiple times before the most recent major update becomes available to you.

Are Deleted Files also Deleted from Backups?

2025-09-04 08:00:44

Here’s what really happens when you delete a file and how to make sure your backups protect you without bringing back things you don’t want.

Nope, not usually.

by

Here's what really happens when you delete a file and how to make sure your backups protect you without bringing back things you don't want.
Backup sign.
(Image: Adobe Stock photos)
Question: I back up to an external drive. When I later delete files from my C: drive, will those deletes be removed in future backups on the external drive? I don't want to restore files I no longer want.

It depends on the specifics of how you back up. In general, though, once you back something up, it remains in the backup until the backup itself is deleted.

That's important, as we'll see shortly.

If you delete a file from your hard drive, the file is not present in future backups.

TL;DR:

Deleted files and backups

A backup keeps whatever was on your computer at the time it was made — which is good, since you might delete something by mistake. New backups taken after the delete won't have the file, but older ones still will.

You want the file to stay

One thing that backups protect you from is an accidental delete. What if you didn't mean to delete that file from your hard disk? Don't laugh — it happens all the time. I'd say that backups are used to recover accidentally deleted files more than any other purpose.

Even if you intentionally delete the file today, you might change your mind a week, a month, or even a year from now.

My backups have saved me from both scenarios more times than I can count.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

When you don't want it back

You said you wouldn't want the deleted file to be restored.

Exactly how you go about that depends on the specifics of your backup approach.

For example, if you're taking regular daily image backups87, then you need to restore to a backup image taken after you'd deleted the file. The file will be present only in the backup images taken prior to its deletion.

If you don't have such an image, avoiding that file could be as simple as deleting it again if it shows up after a restore.

If you're using a different backup technique, how you handle this will vary. Sometimes, the file will not be restored; in other cases, you may need to delete it again.

Deleted versus deleted

Many folks are concerned about this for a different reason: they want a deleted file to be deleted everywhere so that others — perhaps law enforcement — can't recover it.

And indeed, one place from which files are often recovered is old backups. The only way to make sure it doesn't happen is to delete the old backup(s) that may contain the file.

If you can. More on that in a second.

I don't recommend doing this unless you have a very specific, important reason for wanting to be sure that the file is no longer recoverable. Otherwise, you're throwing out a lot of backed-up information you may want someday just to get rid of that single file.

Deleted versus deleted — online

Further complicating matters are online services.

If you store a file in a cloud service, it may have taken backups that you cannot access.88 If you need a file, they will not recover it for you from their backups, and if you need to ensure that a file has been completely removed, they will not help. And yet in response to court orders, they may be required to recover a file you thought was completely deleted.

Even if you email a file to someone, the email may have been backed up by email service providers while en route. Once again, the same issues apply: you have no access to this backup, so you cannot recover or remove things from it, while with a court order, law enforcement may be able to access it.

Podcast audio

Footnotes & References

90: In most cases, that means periodic full and more frequent incremental backups.

91: In addition to features like online recycle bins and file history that you are allowed to access.

What Is the "Normal" File Hierarchy in Windows?

2025-09-03 08:00:25

Ever wonder where Windows puts all your stuff? From drives to folders to files, the “normal” Windows hierarchy has a logic, though it’s often hidden by shortcuts and misbehaving programs. Here’s a look at how it works and how to keep your files organized.

To the extent that anything is normal...

by

Ever wonder where Windows puts all your stuff? From drives to folders to files, the "normal" Windows hierarchy has a logic, though it's often hidden by shortcuts and misbehaving programs. Here's a look at how it works and how to keep your files organized.
Conceptual file / folder heirarchy.
(Image: askleo.com)
Question: What is the "normal" file hierarchy in Windows 10 or 11? I have Win 10 and have gone through a few hard drives, system crash/reboots, and multiple "User" files created by techs. I am trying to get things cleaned up and organized, but am having a difficult time knowing what is where and where they should be.

It's surprisingly simple in concept. In practice, though, applications, including Windows itself, often conspire to make the file hierarchy confusing. That, in turn, can lead to a lot of lost, misplaced, or duplicate documents.

Let's take a walk down the standard structure of files and folders that Windows assumes, encourages, and, in some cases, enforces.

But first, we need to make sure we understand some terminology.

TL;DR:

Windows files and folders setup

In Windows' typical file setup, drives hold folders, and folders hold files. Your main drive is usually C:, with key folders like C:\Windows, C:\Program Files, and C:\Users. Each user gets their own folder with subfolders (Documents, Pictures, etc.). However, programs and shortcuts often make things look confusing.

Drives, folders, and files

Let's take a quick refresher on the basic building blocks of data storage.

Drives

Some of the drives on my PC.
Some of the drives on my PC. (Screenshot: askleo.com)

Drives, AKA volumes or partitions, generally represent physical disk drives. These include the hard disk in your computer (whether HDD or SSD), parts (partitions) of the hard drive on your machine, USB thumb drives, network-connected drives, and more. Each drive typically represents a different physical entity.

Drives are most commonly referred to by letters of the alphabet followed by a colon. The most common is "C:", the system drive (and often the only drive) in your computer.

Drives can contain folders and files.

Folders

Some of the folders on my system drive.
Some of the folders on my system drive. (Screenshot: askleo.com)

Folders are a way of organizing the data stored on a drive. The metaphor is that of an old-style paper file folder into which you might place paper documents.

On your computer, folders can contain other folders (if you've ever used paper folders, you've almost certainly put a folder within a folder at one point or another), and files. Folders have names, not unlike what we might have written on a paper folder tab to identify its contents.

Files

Some files on my machine.
Some files on my machine. (Screenshot: askleo.com)

Files contain actual data. The image above is a collection of files that each contain a single image. Files are given names to indicate what they contain. The characters after the last period in a file's name is called its extension, and indicate what type of data the file contains. For example, .jpg indicates a JPEG-encoded image. Microsoft Word-formatted documents have a .docx extension. There are thousands of different file types, but they're all just data collected on disk and organized into a single entity: a file.

Trees

Drives, folders, and files... that's a lot to keep track of. There's a model that makes it easier to conceptualize: the tree. You can see this represented graphically in Windows File Explorer.

"This PC", the base of our tree.
"This PC" is the base of our tree. (Screenshot: askleo.com)

"This PC" is kind of the base of our tree. In the example above, it contains four branches, each representing a drive on this machine. If I expand one of the branches by clicking on the ">" to its left, it displays more branches contained within.

Folders, or "branches" within my C: drive.
Folders are the branches within my C: drive. (Screenshot: askleo.com)

Each folder or branch of the tree can be opened to expose its contents, and so on and so on. Folders can contain both more folders (referred to as subfolders) and files, but eventually you'll reach a folder that contains only files.

A folder containing only files.
A folder containing only files. (Screenshot: askleo.com)

You might consider files to be the leaves of the tree.

Tree notation

Those images are handy when navigating in Windows File Explorer. It's a great graphical way to conceptualize how your files are organized and how to locate them. But it's cumbersome when typing or otherwise referencing a single folder or file on your computer.

Instead, we use a path, or tree notation. It's built like this:

Each of those elements is separated by a backslash ("\").

So, looking at that last example image, the file "ash.exe" would have a full path notation of:

C:\cygwin\bin\ash.exe

On the C: drive, in the cygwin folder, in the bin folder, is the file "ash.exe". That's the full path to the file, often referred to as the canonical path.

Standard folders

Now we can answer your question about the "normal" file hierarchy.

By default, Windows installs to drive C:.

It creates the following folders (among others):

If you look inside of C:\Windows, you'll see many more standard folders (for example, SYSTEM and SYSTEM32) and many files.

C:\Users is where we want to look next.

User folders

Each account capable of signing into the machine is given a subfolder within C:\Users.

User folders on my machine.
User folders on my machine. (Screenshot: askleo.com)

My machine, shown above, has two login accounts: "lnote", which is the first five characters of the email address associated with my Microsoft account, and "leon", which is a local machine account. The other folders are used by Windows for various purposes. (The Default folder, which is normally hidden, includes default settings for new accounts, Public is a folder for sharing things between accounts, and so on.89).

This allows different users to have separate collections of files that only they can access. By default, for example, the user "lnote" cannot access the files stored within the "leon" folder.

I often refer to your login ID as "%USERNAME%", which, if used literally, is replaced by Windows with your current username. In my case, C:\Users\%USERNAME% is exactly the same as C:\Users\lnote.

Your user folder

If you open your user folder (sometimes referred to as your "home" folder), you'll see a long list of folders and perhaps files. (In my case, that's my Microsoft account folder, or "lnote".)

A user's home folder.
A user's home folder. (Screenshot: askleo.com)

There are several interesting aspects to this folder.

It contains your default folders, such as Desktop, Documents, Music, Pictures, and the like. It contains additional folders, perhaps created by the software you've installed ("Google Drive Streaming" is a good example here), and more.

It also normally contains a folder called OneDrive that contains the files you have stored in OneDrive. On this machine, I uninstalled OneDrive and renamed the folder "OneDrive-" to see if anything would break.90

Your standard folders

When I talk about standard or default folders, it's these that I'm talking about:

And that's where any standard organization or hierarchy ends.

It's completely up to you how you organize information within each folder. Some programs may have their own ideas, but that's not a Windows standard as much as it is a particular program deciding how it wants to keep its data organized in your folders.

Shortcut confusion

One common source of confusion is when Windows tries to be helpful by hiding everything I've just described. The default setup of Windows File Explorer includes shortcuts to all those standard locations I've mentioned above.

Windows File Explorer default shortcuts.
Windows File Explorer default shortcuts. Click for larger image. (Screenshot: askleo.com)

These shortcuts completely obscure where the folders live on your disk. If Libraries are involved, they further confuse by referencing multiple different locations.

These shortcuts are also updated to be correct for the currently signed-in user. If "leon" is signed in on my machine, then the Documents shortcut refers to "C:\Users\leon\Documents". If "lnote" is signed in, it's "C:\Users\lnote\Documents".

These shortcuts exist because in Microsoft's mind you don't need to know or care where your Documents folder is on your hard disk. Windows is trying to make your life easier. Unfortunately years of experience say otherwise: you really are better off and better organized if you know where things really are.

We have to talk about AppData

In theory, you should never need to know or care about one specific folder in your user folder: AppData.

The AppData folder.
The AppData folder. (Screenshot: askleo.com)

It's hidden by default. (There are options on the View menu to let you see hidden items.)

The intent is that programs running on your machine (AKA apps) store their data within this folder. This means that each user of your computer has a collection of data separate from other users.

Depending on what you have installed on your computer, AppData is a deep and complex collection of folders and sub-folders. Mine has over 100,000 folders and 250,000 files. I have a lot installed. Smile

The most common question, of course, is what's the deal with Local, LocalLow, and Roaming?

Applications tend to be inconsistent about which of these folders they use. The good news is that for most of us at home or in small businesses, the distinction is irrelevant.

As I said above, in theory you shouldn't need to care about AppData. Unfortunately, it comes up just often enough when configuring programs, or diagnosing problems, that it's something worth knowing about.

Podcast audio

Footnotes & References

92: To be honest, I have no idea where "defaultuser100000" came from. One of the unfortunate realities of Windows is that not everything has an obvious explanation.

93: Nothing broke, and I'll be deleting that folder.

Tip of the Day: Single Click to Open

2025-09-03 08:00:03

You can change a major setting on your computer.

Applies to Windows: 11, 10, 8, 7, Vista, XP

(Video: askleo.com)

The usual way to select or open things in Windows File Explorer is to:

Windows File Explorer has a setting to change that to:

This can be a huge improvement for individuals who find double-clicking difficult or just don't like it. To switch, follow the steps in the video above.

Tip of the Day: Search for Man

2025-09-02 08:00:55

If you're looking for documentation about Linux commands, use the "man" search.

Searching for "man git".
Searching for "man git". Click for larger image. (Screenshot: askleo.com)

No, not "man" as a concept, and not even "the man", whomever that might be.

A man page is a concept in Linux. It generally contains the documentation, or manual, for a specific command. So in the Linux command line, you might enter a command like:

man git

to get the reference manual information about the "git" command.

Not using Linux? Haven't even opened a command prompt? No problem. Use an internet search instead. Enter "man <command>" into your favorite search engine. The image above shows my search for man git, and indeed, the first result is the git documentation page online.

There's one caveat: when run on a Linux (or other) system, "man" will return the manual page for the specific version of the tool you have installed. A generic search won't have that additional context, so it provides the best general result it can find.

 

Tip of the Day: Share What You Learn

2025-09-01 08:00:25

Sharing what you know with others is the best way to learn even more yourself.

an older gentleman teacher holding and pointing to a mobile phone in a classroom in front of a middle aged group of students
This could be you. (Image: ChatGPT)

This isn't a technique to apply to Windows or your computer; it's something you can do for yourself.

Share what you learn. Help others. Teach.

I'll be honest: I've learned more doing Ask Leo! for over 22 years than I ever would have just poking around on my own. By helping others, answering questions, and trying things out as a way to research answers, I gain a better understanding of how things work and more tools in my toolbox.

The best way to learn something is to teach it.

You may feel you're not up to the task, but I'm here to tell you that you are. Choose a friend or a family member and become their go-to tech person. I guarantee you'll learn more than you can imagine. Volunteer to teach or help others at senior centers, libraries, and other facilities, and you'll be helping the people you interact with and helping yourself as well.

There are lots of ways you can take the knowledge you gain and share it with others. You'll find you have more than you think and will gain even more in the process.

 

What Security Software Do You Recommend? (2025 Q3 update)

2025-09-01 08:00:00

My updated guide cuts through the hype with four no-nonsense steps to keep your PC safe. Learn what works, what to avoid, and how to stay secure without overspending or overcomplicating.

The Best of Ask Leo!

Basic protection in four steps.

by

My updated guide cuts through the hype with four no-nonsense steps to keep your PC safe. Learn what works, what to avoid, and how to stay secure without overspending or overcomplicating.
Windows Security
Windows Security home tab. (Screenshot: askleo.com)

Question: What security software should I use? What anti-virus is best? How about a firewall? And what about spyware? Should I use one of the all-in-one packages that claim to do everything? Is there anything else I need?

I get these questions constantly. There's a fair amount of churn and drama in the security industry; things change over time.

It's time once again for my periodic update. Not a lot has changed in the last year, but there are some new things to consider.

TL;DR:

My security software recommendations

  1. Windows' built-in Windows Security remains my recommended security solution for most systems.
  2. Your router can serve as your primary firewall at home or work.
  3. Leave the Windows Firewall enabled unless it causes problems.
  4. Let Windows Update keep your computer as up-to-date as possible.

That's it. Good basic protection in four steps.

Basic security software: Windows Security

Windows Security — previously known as Windows Defender — comes pre-installed with Windows, and Microsoft seems to improve it with every release.

Windows Security does a fine job of detecting malware without adversely affecting system performance or nagging you for renewals, upgrades, or upsells. It just does its job quietly in the background — exactly what you want from your anti-malware tool.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The ratings game

Every so often, Windows Security comes under fire for rating lower in tests than other security packages. I get push-back — often angry push-back — that it remains my primary recommendation.

There are several reasons I stick to that position.

There are also practical reasons I continue to prefer Windows Security.

It's not perfect, but no security tool is.

My recommendation stands. Windows Security remains a solid, free security package with minimal system impact. It should be appropriate for almost everyone.

Alternative security software and additions

I also recognize that Windows Security might not be right for everyone. No single product is.

This is where I run into difficulty making specific recommendations. The landscape keeps changing. More than one tool that was once free has promoted its paid product so heavily that the free version virtually disappeared. People download and install programs thinking they are free, only to discover it's a "free trial" or "free download", meaning if you want to keep it past a certain length of time, you're required to purchase it.

Some programs have become as much self-promotion tools as they are security tools, bombarding you with sales pitches and upgrade offers to the point of impeding your computer use.

Things keep changing, so in terms of the tools I mention below, caveat emptor: "Let the buyer beware." I can't honestly predict that these tools will remain recommendation-worthy.

A short list of top recommendations from around the internet include:

Note that these aren't necessarily free.

There are plenty of others as well. I've selected these because they have shown up fairly consistently in the ratings game over the years. Don't take offense if I've overlooked your favorite.

Caveats with all

I need to reiterate some important points.

  1. Beware of the word free. In most cases, a free trial is just that: a trial of a full-featured product that eventually requires payment. In some cases, the "free trial" becomes a truly free version after the trial ends. In other cases, they are separate downloads. And in other cases, there is no truly free version at all. Be sure you know what you are getting.
  2. Regardless of what you download, you are likely to face upgrade and upsell offers or even an ongoing subscription. Unless or until you know you want this, decline.
  3. Speaking of declining: when installing any of these, always choose custom installation, never the default. The default may include unrelated software you don't need or want.

What else besides security software?

Besides having security software, I recommend three other essential actions to stay safe: enable a firewall, back up, and stay up-to-date.

A firewall

For home and business use, I recommend using a NAT router as a firewall. You almost certainly already have one. They don't have to be expensive and are one of the simplest approaches to keeping your computer safe from network-based threats. If you can trust all the computers on your local side of the router, there's no need for an additional software firewall besides the one already present in Windows.

Back up

I strongly recommend that you back up regularly.

In fact, I can't stress this enough. Up-to-date backups completely avoid 99% of the disasters I hear about.

Macrium Reflect and EaseUS Todo are the backup tools I currently use and recommend.

Stay up to date

Keep your computer, Windows, and all the applications you run as up to date as possible.

This happens automatically as long as you don't take steps to disable it. Needless to say, I strongly recommend you not disable those functions. Let Windows Update keep your system up to date.

Many of the security issues we hear about are because individuals (and, sadly, corporations) have not kept their operating systems or applications current with the latest available patches.

And finally, Internet Safety: 7 Steps to Keeping Your Computer Safe on the Internet has even more tips for keeping your computer safe.

A note about Windows 10

As I update this article, we're a couple of months away from the Windows 10 end-of-support date.

I want to make two specific points.

And you may be able to sign up for the ESU — Extended Security Updates — program for additional peace of mind.

If you're using a third-party security package, check with that provider's plans, but in general, most will continue to work on Windows 10 for a long time after Microsoft's official end-of-support date.

Podcast audio

Why Does Email I Send Fail But a Reply Works?

2025-08-30 08:00:47

If sending an email bounces but replying works, the culprit is usually a wrong address hiding in plain sight. Learn how display names, typos, and auto-complete can fool you, and how to fix the problem so your messages get through every time.

The different places "To:" can come from.

by

If sending an email bounces but replying works, the culprit is usually a wrong address hiding in plain sight. Learn how display names, typos, and auto-complete can fool you, and how to fix the problem so your messages get through every time.
Bouncing Email
(Image: askleo.com)
Question: I have a relative with a Hotmail address. If I send her a message, it comes back undeliverable. Yet if she sends me a message, I can click on Reply and it goes thru. What's up?

You're probably sending to the wrong email address.

I know, I know, you're absolutely convinced you're sending to the right one — but the bounce message would indicate otherwise. I've had it happen to me. I was absolutely convinced... until I saw my error.

Let's look at why the two scenarios are different.

TL;DR:

Bouncing messages

If a new email you send bounces but a reply works, you're probably using the wrong address. Typos, bad contacts, or auto-complete mistakes are common causes. Check the actual email address, not just the name, and fix or delete wrong entries so your messages go to the right place.

An underliverable bounce message
An undeliverable bounce message. (Click for larger image.)

Where the "To:" email address comes from

When you send a new email to someone, the email address you send to comes from either of two places:

Errors can come with either method and can be very subtle.

When you reply to a message, however, the email address you're sending to comes from the email message you are replying to and nowhere else. It can still be wrong, of course, but because it's the email address of the other person, they're the one who typed it in, and presumably, it's correct.91

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Names and addresses

Before we get to the details of how things can go wrong, we need to review what makes up an email address.

There are two parts: the display name and the email address. They're often displayed together:

Ask Leo! <leo@askleo.com>

The display name is, as its name implies, the text we see and recognize as someone's name. The email address follows it in angle brackets.

The first source of confusion is that the display name can look like an email address:

leo@askleo.com <leo@askleo.com>

There's nothing wrong with that, but it's important to realize that even though it looks like an email address, the display name is not the email address. Consider this one:

leo@askleo.com <leeo@askleo.com>

The display name looks correct, but the email address — the email address used to send your message — is wrong.

Finally, in an effort to keep things simple, many email programs only display the display name and hide the email address. Hover over the link below with your cursor, and you'll see the email address displayed in the lower part of your screen.

Ask Leo!

You won't know if the email address is wrong without looking deeper. Even worse is when the display name looks like an email address, but the actual email address is different and incorrect:

leo@askleo.com

It looks right, if you hover over it, you'll see that the actual email address has that pesky typo and won't work.

What can go wrong

Email addresses must be exactly correct, so it's pretty easy to get one wrong by accident.

It's easy to mistype. A keyboard bounce, a slipped finger, and suddenly you're sending to something like "leeo@askleo.com" instead of the correct "leo@askleo.com". Even more subtle might be "1eo@askleo.com", where the initial ‘L' is the digit 1 by mistake. The result will be a message that doesn't make it to where you intend. It may or may not bounce back to you, so you may or may not ever know that it didn't go through.

It gets even more subtle: in some email systems, once you email an address, right or wrong, it's added to the auto-complete suggestion list. As soon as you start typing, say "le", the system suggests "leeo@askleo.com" — an error — which is easy to miss and accept by mistake. The only solution here is to remove the auto-complete suggestions using whatever options are available in your email program or interface. (This is what happened to me.)

It gets worse. Some systems add email addresses to which you've sent email to your address book. These entries define which email address is supposed to be used for what person. If you somehow have a bad entry for "Leo" with a wrong address of "leeo@askleo.com", then as soon as you type "Leo", the email program may enter the incorrect address automatically.

The only solution here is to carefully examine the address book entry for that contact and make absolutely certain their email address is correct. While you're in there, it's worth looking to see if your contact has more than one entry and one of them is wrong.

How to fix it all

Since your emails go through when you reply, look carefully at the email address used when you reply. Make sure you're looking at the email address and not the display name.

Make careful note of it. Perhaps even copy/paste somewhere like Notepad to make it easier to see.

Email address in notepad
Email address in Notepad. (Screenshot: askleo.com)

Search your address book to see if you have an entry for this recipient. Then, either:

OR

Then, compose a new message and start typing the email address you intend to send to. Pay extremely close attention to the suggestions made by your email program. Delete any that are incorrect. (Exactly how to do that depends on what email program or interface you use.)

To: Ask Leo! -- but is the email address correct?
To: Ask Leo! — but is the email address correct? (Screenshot: askleo.com)

After you've entered the email address and the email program has placed it in the "To:" field, hover over it, click on it, or take whatever steps necessary to confirm that it's sending to the exact email address you think it is.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Bounce messages have more detail

One of the more frustrating aspects of dealing with email delivery problems is that saying "the email bounced" is equivalent to saying "it didn't work" — it gives me no information.

The contents of the email bounce message, such as that shown at the top of this article, have a lot more information about why the email bounced. Read the entire bounce message. Look for clues and pass them on to whoever you're reaching out to for help. (In fact, always provide lots of information when asking for help.)

While an incorrect email address is usually the culprit, other things can go wrong. The contents of that bounce message hold clues as to what to do next.

Podcast audio

Footnotes & References

94: No one would be able to reply to them if they got it wrong, so that generally gets fixed pretty quickly.

Tip of the Day: the History in the Back Button

2025-08-29 08:00:30

The back button does more than revert to the last page you were on. It can show a whole history of visited pages.

(Video: askleo.com)

Right-click (or, on some systems and/or browsers, click and hold) the back button in your browser. You'll be presented with a list of recently viewed pages within the current tab.

This represents the pages your browser would take you to if you just hit the back button repeatedly. This way, you can jump directly to that page five pages ago without having to go through all the intermediate steps.

In most browsers, there's also a convenient link to access your full browser history.

Bonus tip: If you do go back in your history, then the Forward button (usually next to the back button) will show you the list of pages you could move forward to as well.

Does Installing Lots of Programs Really Mess Up Your PC?

2025-08-29 08:00:11

Worried that too many apps will wreck your PC? Learn the real risks, how “software rot” happens, why portable apps aren’t always harmless, and why backups are your best defense.

In theory, it shouldn't, but we all know how theories go.

by

Worried that too many apps will wreck your PC? Learn the real risks, how "software rot" happens, why portable apps aren't always harmless, and why backups are your best defense.
Broken Binary Digits
(Image: depositphotos.com)
Question: I try to limit the number of programs I install on my system. I do this because I feel intuitively that the more programs I install, the more quickly Windows reaches that corrupted state that we all know too well, and has to be reinstalled from scratch. I really could make good use of quite a number of programs I don't have installed, but I worry about hastening corruption. I do assume that I can load as many portable applications as I like without worry. Am I on the right track? Or is my thinking just incorrect?

In theory, installing lots of different programs shouldn't destabilize the system regardless of how they're installed.

Reality says otherwise.

The real answer is, it depends more on the specific software than on how you install it.

TL;DR:

Installing lots of programs

Today's systems are incredibly complex. Installing lots of software can destabilize them. In addition, uninstalling software also contributes to instability (or software rot). Avoid experimenting with lots of software. Try portable versions if available, and, of course, back up regularly. Within reason, install and evaluate what you need and use.

Software rot

What you're talking about has a name: software rot. It refers to the gradual decrease in quality and performance of software, and thus of your system, over time.

Today's systems and software are so complex. Installing software — even if it's just the first run of a portable application (the kind that requires no setup program) — is also complex.

Subsequent updates and uninstalls all add to the complexity.

As a result, it's easy for settings — both the settings you see and the thousands of internal settings used only by the applications and Windows — to get confused. Depending on the software you're running, that confusion can do nothing — or it can cause the software, or even Windows, to misbehave.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Trials

The most common culprit in generating software rot is installing and uninstalling software you just want to try out.

It's important to evaluate software to see if it meets your needs. To do so, you typically install it and run it. If you decide it's not what you need, you uninstall it.

If you do this often, it's a bigger cause of system destabilization or software rot than simply installing and keeping the software you use regularly up to date.

The good news is that things have improved dramatically in recent years. I frequently install and uninstall software and rarely suffer because of it. Don't stop trying things out; your machine should meet your needs.

I have one recommendation, though.

Back up

Before you install something you're just trying out, back up your system completely. Ideally, you're already doing this by virtue of having a daily backup solution in place.

That way, if something goes wrong with the trial or its uninstall, or if it includes PUPs, malware, or worse, you can quickly, easily revert to a state prior to the installation.

Besides, things can go wrong for reasons unrelated to software installations, trials, or software rot. Backups protect you from it all.

Portable apps

I want to share a thought about portable apps.

A portable app is an app that requires no setup or installation process. You copy it to your machine and start using it. To uninstall it, you delete the files or folders you copied.

In theory.

But portable apps often install or configure things the first time you run them. In a sense, there's still a setup process; you just don't see it.

Portable apps do little in the way of setup, but there are no guarantees. That's why I fall back to being more concerned about what software you're installing, not how much or whether it's portable or not.

Unfortunately, it's nearly impossible to determine how an application will behave prior to installing it. But if your portable, no-install-needed app includes a link or instructions to uninstall, chances are it has done something in the way of installation.

Podcast audio

How to Safely Change Two-factor Authentication

2025-08-28 08:00:36

Changing two-factor authentication apps isn’t hard, but doing it incorrectly can lock you out of your accounts. Here’s a safe step-by-step approach to make the switch smoothly, protect your access, and keep your accounts secure.

A little planning is called for.

by

Changing two-factor authentication apps isn't hard, but doing it incorrectly can lock you out of your accounts. Here's a safe step-by-step approach to make the switch smoothly, protect your access, and keep your accounts secure.
 two smartphones each displaying a two-factor app and code, with a floating arrow pointing from one smartphone to the other
(Image: ChatGPT)
Question: I'd love to hear your feedback about how to correctly move to a different 2FA app (on a mobile device). I've read that removing a 2FA account from an Authenticator app can cause issues, potentially locking you out of your account. If I wanted to move my 2FA codes/accounts to a different authenticator app, what is the recommended way to do this?

Safety, or more specifically not getting locked out of your account, is a common concern when it comes to switching your two-factor authentication app or technique.

Sometimes you can move an app-based 2FA from one app to another, but a) it's not terribly common, and b) not everyone uses this type of two-factor app. When using SMS or other forms of two-factor authentication, there's no secret key or anything to share even if you could.

The good news is that my approach is conceptually simple and works with all forms of two-factor authentication.

You just need a little preparation.

TL;DR:

Change two-factor authentication

To safely switch two-factor apps, sign in first, prepare recovery options, and be at a trusted location on a familiar device. Turn off your old 2FA and then turn it back on with the new app. Always save recovery codes so you're never locked out.

"Have you tried turning it off and back on again?"

Here's the approach I recommend.

But wait!

Before you run off and do that, there's some important preparation to do so that nothing trips you up along the way. We do want to do this safely, after all.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

You must be signed in

I can't stress this enough. Many people want to change their two-factor authentication method specifically because they can't sign in; they've lost the old one, or it's not working.

That's not how this works. Your ability to sign in proves you have the right to make the change. If you can't sign in, then for all the service knows, you're some random hacker trying to break in. You know and I know you're not, but the service has no way to confirm it unless you are able to sign in.

If you're having trouble signing in, particularly due to your existing two-factor not working, you'll need to use the account recovery techniques offered by whatever service you're using. Once you're signed in, you can (and should) set up a new two-factor mechanism.

Being signed in may not be enough

This might seem counterintuitive, but having successfully signed in may not be enough, at least to remove the existing two-factor authentication. Some services ask for additional confirmation that you are who you say you are.

Similarly, if you're trying to make this change while traveling, the service may also think that suspicious and throw up additional authentication challenges.

My recommendation:

When you remove the existing two-factor, either of two things will generally be required:

Or, if you don't have that available:

If you can't confirm that you are who you say you are with one of those techniques, you may not be able to remove the second factor. That could put you at risk of being locked out of your account.

My own recent experience

I recently went through this exact scenario. Proton introduced its own two-factor authentication application that works on both desktop and mobile. My prior tool, Authy, ended desktop support some time ago.

I'd moved all of my two-factor codes to 1Password (the convenience far outweighs a teeny tiny decrease in security, and it makes two-factor much easier to deal with). Unfortunately, I faced a chicken-and-egg scenario. My 1Password account is itself protected by two-factor authentication, but that's one code that, while I can (and do92) store in 1Password, it's impossible to use from there (the chicken and egg: you need the code to open 1Password, but you'd need 1Password to already be open to get the code). So, in addition, I'd kept Authy running on my phone specifically for that.

So, I:

The move went smoothly, and I can access the codes from my desktop once again if I need to.

Podcast audio

Footnotes & References

95: I store it there anyway, but clearly not for actual use. It's just another way for me to securely save the 2FA secret key.

Tip of the Day: Play a Sound for Caps Lock

2025-08-27 08:00:58

A quick setting allows you to be alerted when you accidentally press the Caps Lock key.

Applies to Windows: 11, 10

The Caps Lock key is controversial to say the least. Many people love it, and many people hate it. (Personally, I rarely use it.)

For the haters, there are two approaches. You can disable Caps Lock, but it requires third-party software or a registry hack (the subject of a prior tip).

Another approach is to have Windows play a sound each time you press the Caps Lock key so you are alerted when it is enabled, rather than typing a paragraph and then noticing is in in all caps.

In Windows Settings, search for "caps lock". You'll be taken to "Keyboard Ease of access" (Windows 10) or the Accessibility keyboard (Windows 11) settings. Scroll down to find the setting "Play a sound when you press Caps Lock, Num Lock, or Scroll Lock", and turn that on.

Play a sound when you press Caps Lock,...
Enable an alert sound to play. (Screenshot: askleo.com)

Now when you accidentally (or on purpose) hit the Caps Lock key, at least you'll hear about it.

How to Transfer Your Email From a PST to Thunderbird for Free

2025-08-27 08:00:16

Switching from Outlook (classic) to Thunderbird? You don’t need to buy tools. With a little time and a free email account, you can move your messages yourself. I’ll walk you through the steps to transfer your email safely and reliably.

No additional tools required.

by

Switching from Outlook (classic) to Thunderbird? You don't need to buy tools. With a little time and a free email account, you can move your messages yourself. I'll walk you through the steps to transfer your email safely and reliably.
Email flysing from Outlook to Thunderbird
(Image: askleo.com)
Question: Must I buy a PST-to-MBOX converter to get moved over to Thunderbird?

This is a question I get from time to time from people who use Outlook (classic)93 (aka the big, powerful, Outlook email desktop client included with Microsoft Office/365/CoPilot) and are looking to switch to a different email program to run on their PCs. Typically, they're moving to Thunderbird, but there are, of course, many options.

Getting your email from one to the other? Well, that takes a little effort.

TL;DR:

Moving from Outlook's PST to Thunderbird

You can move email from Outlook to Thunderbird without buying a converter by using a free IMAP transfer account. Upload messages from Outlook to the transfer account and then download them in Thunderbird. Contacts and calendars require separate exports.

PST (and OST) formats

PST and OST are file formats used only by Outlook (classic) to store email. The formats are complex and proprietary (though they are documented), making moving your old email more difficult than it is between other email services.

There are third-party tools available to do this, both paid and free, of varying reputation and quality. For what is typically a one-time conversion, I'm reluctant to purchase anything. With just a little legwork and time, you can do the conversion yourself.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The starting point: Outlook (classic)

An example PST file in Outlook (classic)
An example PST file in Outlook (classic). Click for larger image. (Screenshot: askleo.com)

The example above shows two email accounts I've configured in Outlook(classic), both connected via IMAP, and both whose email is stored in OST files.

Below them is "ExamplePST", which is a PST file representing local storage on the PC only. It's not associated with any email account.

In Account settings, you can see their respective locations.

Outlook Datafiles in Account Settings.
Outlook data files in Account Settings. Click for larger image. (Screenshot: askleo.com)

It's the contents of this PST file we want to move to Thunderbird.

Without using a third-party tool.

Step 1: Upload to a transfer account

There is no direct Outlook (classic) to Thunderbird copy. Instead, we need to use an intermediary email account to perform the conversion.

  1. Create an email account at any free provider that supports IMAP. I'll use Gmail in my examples.
  2. Configure Outlook (classic) to connect to that email account using IMAP. Now your transfer account appears in the Outlook (classic) account list.
  3. Copy the email you want to move to that account. (I recommend copying rather than moving as a safety measure. If a copy fails, the original will not have been deleted.)
Drag and Drop Copy
Drag and drop the emails from your PST file into your transfer account. Click for larger image. (Screenshot: askleo.com)

In the example above, I've selected all the messages in the folder "SavedNewsletters" in my ExamplePST and am about to drag them to the Inbox of my transfer account, askleotest2@gmail.com. NOTE the plus sign circled in red as part of the pointer icon: this indicates the operation will be a copy, as opposed to a move. Hold down the CTRL key and ensure that the plus sign appears before releasing the mouse pointer.

Because the transfer account is connected via IMAP, any email you copy into its folders in Outlook (classic) will be uploaded to the account online. You can confirm the upload by signing into the transfer account in your web browser.

Email in the transfer account online.
Email uploaded to the transfer account online. Click for larger image. (Screenshot: askleo.com)

The only "catches" here are:

Step 2: Download to Thunderbird

It's that simple.

Email downloaded in Thunderbird.
Email downloaded in Thunderbird. Click for larger image. (Screenshot: askleo.com)

Now all the messages that were in your PST are available in Thunderbird.

Step 3: Organizing and cleaning up

Depending on your intent, there are several cleanup steps you might consider.

Step 4: But what about...

There are two elephants in the room when it comes to moving things from Outlook to Thunderbird. (Actually, these are very common account management issues regardless of where or how you're moving email data.)

Contacts. There's no seamless way to move contacts other than to export them from one program and then import them into the other (Thunderbird, in our example). There will almost certainly be some form of data loss, as not all contact applications keep track of the same information in the same way.

Calendar. I have yet to encounter any reliable approach to transferring calendar information except for specific services (like Proton) being able to copy from specific other services (like Gmail). For calendar data stored in a PST, I've yet to find a viable option.

What about OSTs?

OST files represent an IMAP "window" on the master copy of email stored online. To move an OST file to Thunderbird, start at step 2 using whatever account you have in Thunderbird.

The difference is that when PST files are used, the email typically resides only in the PST, and we need a way to get it out. OST files are typically a copy of a master email repository that is stored and accessible elsewhere.

Alternatives to Thunderbird

You can move email from Outlook (classic) to any desktop email program you choose. I tend to prefer Thunderbird because:

But any email client (ideally one supporting IMAP, as most do these days) will do. My only advice is to double-check that you're not locking yourself into proprietary storage formats. When standard formats are used, you can avoid the hoops we just jumped through should you ever need to move to a different email program again in the future.

Podcast audio

Footnotes & References

96: I'll continually refer to this as "Outlook (classic)" so as to differentiate from the other programs also called Outlook which are nothing like the original Outlook email program that comes with (or came with) Microsoft Office 365. Only Outlook (classic), for example, deals with PSTs.

97: PST is a portable data file format. You can copy PSTs and open them in other instances of Outlook (classic) easily. They're also the default format for POP3 connections. OST, while similar, is less portable in that it's often encrypted and tied to a specific Outlook instance. OST is used for IMAP connections.

98: In theory, you could use POP3, but IMAP is safer in case anything goes wrong with a download.

Tip of the Day: Don't Answer the Phone

2025-08-25 08:00:45

Phone scams are on the rise. One easy solution? Don't answer.

Security Tip

A mobile phone recieving a call, which is declined.
(Image: Gemini Veo 3)

I know this seems harsh, especially if you were raised to be well-mannered and always answer the phone politely, but it's become a necessity in today's scam-rich world.

Don't answer the phone.

At least, don't answer it unless you know who's calling. If the caller ID on your landline or mobile phone displays a name or number you recognize, then answer if you feel like it.

But if it's someone you don't recognize? Just... don't.

My logic works like this:

This does require some kind of caller ID feature as well as an answering machine or voicemail. Honestly, I can't imagine living without either in today's environment.

You'd be shocked at how many leave no message. That's fine by me; it must not be important to them. And for those who leave a message, it's also surprising how many are obvious scams.

Can't I Just Copy Everything to Back Up?

2025-08-25 08:00:19

Just copying your entire drive is not a safe backup, Learn why a real backup program is safer, faster, and more reliable when disaster strikes.

The Best of Ask Leo!

Kinda, sorta, maybe... no.

by

Just copying your entire drive is not a safe backup, Learn why a real backup program is safer, faster, and more reliable when disaster strikes.
Backup 74% Complete
(Image: canva.com)
Question: For security in case of a crash, can I just copy everything — like my entire C: drive — to an external drive as a backup rather than using a backup program? At the present time, I am just copying My Documents to a flash drive, but am concerned that to recover, I would have to rebuild all the files and updates if I had a crash.

Sure. You can do that; just copy everything. It provides a level of protection, and it's way better than doing nothing at all.

But your safety net has some big holes in it.

The problem is you can't really "copy everything". You'll miss some things that a traditional backup program would catch — things you'll care about when the worst happens.

TL;DR:

Copying everything to back up

Copying everything seems simple, but it misses key files (like the Windows registry), skips files in use, and can overwrite older versions you might need. A real backup program captures it all, keeps past versions, and can restore your entire system quickly after a crash.

Copy everything to another drive

The scenario proposed here is to back up C: by copying all of it to an external drive, like F:. If you're familiar with Windows Command Prompt and the xcopy command, it might look something like this:

C:> xcopy /e /h c:\ f:\

There may be other options that would make sense, but I've included the important ones to copy the contents of all files and folders from the root of the C: drive to the root of the F: drive, and copy hidden and system files as well. It would have to be run "as administrator" to pick up files that normal accounts don't have access to.

In theory, it seems simple, and it's conceptually close to what a backup program does.

But it misses some very important things.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

What "copying everything" misses

Many important files are not backed up by this approach.

Most importantly, many95 files open in running programs at the time of the backup will not be copied.

And some files are always in use.

The most notable may be the Windows registry — the storehouse of settings and configurations used by Windows and installed applications. If Windows is running, files containing the registry are locked from outside access.

Without the registry, if your hard drive were to die, you're still looking at a complete reinstall of Windows, followed by a complete reinstall of your applications, onto a replacement drive.

The registry is just the tip of the iceberg. Windows has many other files open when running, and they therefore won't be backed up with a simple copy procedure. Other applications may also be running with locked and uncopiable open files.

A backup program really can copy everything

Backup programs are specifically designed to have access to protected files and files in use.

In other words, a backup program really can copy everything.

There are a couple of other less-critical yet handy benefits to using a backup program.

Most backup programs are easy to set and forget. Once configured, they run and back up automatically. Yes, test your backups, but you won't have to waste much energy thinking about them regularly; they just happen.

But there's an interesting scenario in which a backup program can save the day that doesn't involve a hard-disk crash or other catastrophic failures.

How "copy everything" backups lose files

Imagine this scenario.

  1. You create an important file. I'll call this version 1.
  2. Your nightly file copy backup backs it up.
  3. The next day, you change the file, creating version 2.
  4. Your nightly file copy backup backs up version 2, overwriting version 1 in the backup.
  5. The next day, you realize that those changes to version 2 were a horrible, horrible mistake.

You really want version 1 back, but it's gone. It's been overwritten everywhere, including your backup, by version 2.

Had you been using a good backup program, that scenario might have had a different outcome.

Incremental backups

Imagine this scenario instead.

In this scenario, you can. An incremental backup has two important differences from the "copy everything" approach:

  1. It only adds files to the backup, never deletes them.
  2. It adds only files that have changed since the previous backup.

That means that version 1 of your file is still there, ready to be recovered with your backup software.

Incremental in practice

I configure my backup software to:

That means I can revert any file to the state it was in on any day in the preceding 60 days.

Now, aside from the "files in use" problem I talked about earlier, you could probably devise a system using batch files and copy operations to mimic much of this. But a backup program is more reliable, easier to use, and worth every penny.96

"Copy everything" can work sometimes

To be fair, there are scenarios where simple file copies work well enough.

For example, I have some drives that contain only data, and no files are in use in the middle of the night. I just copy or "mirror" those drives to other drives nightly using a simple file copy operation, much like the command line example shown above. There's no need for a more sophisticated backup, and the mirrored drive is simply there, on my network, ready to be used at any time.

Copying files to back up can also be a space saver under two conditions:

and

It's a completely valid way to back up, as long as you know it's sufficient for your situation. For many people, a complete reinstall would mean a couple of days of lost work, whereas a backup program could have taken care of it in an hour or so.

And that brings me to my final point about using copy operations as backups: restoration.

Restoring your copied files

As we've seen from our original example, a reverse copy of the entire backup on F: back to C: would not restore your system. Certain critical files, such as the registry, would be missing. Your restored drive could not boot. You could recover data files from your backup, and perhaps some other files, but that's about it. It wouldn't restore your entire system.

Podcast audio

Footnotes & References

99: Some will be, but many will not. It depends on the restrictions placed on the files when they are opened by the programs involved.

100: Which can often be no pennies at all, since there are free solutions.

No Extension? No Problem: How to Identify Almost Any File Type

2025-08-23 08:00:44

Got a mystery file with no extension or an ambiguous one? You may be able to uncover what it is by checking its signature. I’ll show you how to peek inside with a free tool and match the clues to known formats.

Let's get a little geeky.

by

Got a mystery file with no extension or an ambiguous one? You may be able to uncover what it is by checking its signature. I'll show you how to peek inside with a free tool and match the clues to known formats.
Identifying the first two bytes in a file using HxD.
Identifying the first two bytes in a file using HxD. (Screenshot: askleo.com)
Question: I downloaded a few video files without extensions. I tried inserting all of the common extensions, but none of them would play. Is there a way to determine which format the files are in?

For video files, my gut answer is to say, "I don't know". Video file formats are a complex maze of twisty passages.

But we can get a few clues — not only about your video files, but about other types of files as well.

TL;DR:

What kind of file is that?

You can figure out a file's type by looking at its "signature" ' the first few bytes of a file, which identify it. Use a hex editor like HxD to see those bytes and then match them to a file signature list. It's not foolproof, but it can give strong clues.

File signatures

Many — though certainly not all — files begin with a series of fixed values that identify the type of file they are. This is referred to as a file's "signature", or sometimes its "magic number".

A great example is the .exe file. All .exe files begin with two bytes: 4D and 5A. That's the hexadecimal (or just hex) value for the uppercase letters MZ, which are the initials of the Microsoft engineer who defined the original file format97. If the first two bytes of a file are MZ, then you're looking at an .exe file or one of its derivatives, like a .dll file.

The approach is to examine the first few bytes of a file and then use what we find there to see if we can determine the file format.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Examining the file

The MZ example happens to use printable characters. If you open an .exe file in Notepad, you'll see MZ at the beginning. But signatures aren't always printable characters.

That means we need to look at the contents of the file in hexadecimal. The tool I use is the freeware HxD.

Caution: HxD is a Hex editor, meaning you can modify files with it. Be careful not to accidentally make changes. You could corrupt files, your system, and/or your hard drive by modifying the wrong things. Fortunately, HxD makes it obvious that you're changing things by displaying changes in red, and it includes proper confirmations and backup files by default.

Let's say that we're looking at a file called "example.foo". The image at the top of the page shows it open in HxD.

Here, we can see that the file begins with the hex character values 3F, 5F, 03, 00, 00, and so on. The first two happen to be values for the question mark character and the underscore character. We don't yet know if that's intentional, but it doesn't matter. What we care about are the values in hexadecimal.

Finding the signature

There's no definitive list of file signatures, but the Wikipedia page List of file signatures is pretty good.

We simply scan down the table to look for an entry that begins with the first character: 3F.

.hlp file signature
The file in question is an .hlp file signature. Click for larger image. (Screenshot: askleo.com)

In fact, there's only one. As you can see, files that begin with the characters 3F and 5F are typically associated with the old Windows Help utility. I can confirm that because I was on that Microsoft team. 3F, 5F represents a question mark and underscore (?_), and that's not a coincidence.98

Signature confusion

As if the hexadecimal search and display weren't geeky enough, I have to caution you to take care when scanning the table of signatures for matches. Make sure that what you have matches what you see; if there is more than one possibility, choose the longest candidate that matches.

The file format you need may not be there.99 I haven't found an exhaustive list.

The file format you need might be ambiguous. Several signatures list more than one application. Perhaps the additional knowledge you have of where the file came from will help distinguish among the possibilities.

Knowing the file format might not be enough. .AVI files are a great example; they're container files that can contain audio and video in many encodings.

Podcast audio

Footnotes & References

101: And, coincidentally, the first person to interview me when I applied to Microsoft.

102: They were a crude attempt to mimic the WinHelp program's icon: a question mark and its shadow. Very old WinHelp icon.

103: My personal favorite, 4C 4E, is not listed. That's LN, the signature for the character-mode help files I created in the days before Windows.

Tip of the Day: Back Up and Then Delete Windows.old

2025-08-22 08:00:58

Windows.old can take up a lot of space. Back it up first and then free that space.

Applies to Windows: 11, 10

Previous Windows installation(s)
Disk Cleanup app. (Screenshot: askleo.com)

If you've upgraded your computer from one version of Windows to the next, you may have a folder called "Windows.old", usually found on your C: drive. It contains your previous Windows installation and many of the files that were contained in your account folder (for example, C:\Users\%USERNAME%\Documents).

It can take up a lot of space. If it's been a while since you upgraded Windows, you can free up that space, as it's unlikely you'll need anything within it.

Back it up anyway!

I honestly don't care how you back it up — make a copy elsewhere, use your backup program, realize it's been in your image backups all along — the important thing is that you back it up and save that backup. Just because we probably won't need something someday doesn't mean we definitely won't. (And yes, that's the voice of experience talking.)

Then use Windows Disk Cleanup to clean up system files. On its opening screen, look for "Previous Windows installation(s)". That's "Windows.old" by another name. Check the checkbox to its left, click OK, and that space will be freed.

Why Doesn't Someone Simplify Computers For Seniors?

2025-08-22 08:00:52

Tired of feeling left behind by today’s tech? It’s not your fault. I'll look at why computers aren’t getting any simpler, what basic devices exist, and how the right attitude and support can make all the difference.

Why I'm not holding my breath.

by

Tired of feeling left behind by today's tech? It's not your fault. I'll look at why computers aren't getting any simpler, what basic devices exist, and how the right attitude and support can make all the difference.
A frustrated older gentleman throwing a laptop to the ground
We've all been here. (Image: ChatGPT)
Question: Bottom line here is that someone needs to simplify today's computer operations for seniors, whose goals are likely quite different than younger and institutional users. Surely someone can come up with a "Jitterbug" laptop!?

I have good news, and I have bad news.

The good news is that you are absolutely right. Seniors — or, since it's not really an age thing, those with different priorities than the more technologically inclined — are underserved. I totally agree.

The bad news is that it's extremely unlikely to change.

But I do have a couple of options to share.

TL;DR:

In search of a simple computer

Big tech doesn't always care about making computers easier for people who struggle, especially older folks. But that doesn't mean all hope is lost. With the right tools, a little help, and a good attitude, it's still possible to make technology work.

Ageism, internal and external

From a tech company's cold, bottom-line perspective, addressing an older audience is by definition a shrinking market. It's certainly less lucrative than the next shiny thing they want to invest in.

From my perspective, it's not an age thing as much as an interest or ability thing, and those things cross all ages. In my recent article, Too Old for Tech? Nonsense, I address my feelings on the matter. There are many legitimate reasons to be overwhelmed by or have difficulty with technology, and most of them are unrelated to age.

Nonetheless, most big tech companies seem indifferent to the issues regardless of their origin.

That means it's up to us.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Attitude is everything

I am in no way criticizing your question or your approach. Your frustration is completely warranted and quite common — as are bad and even sometimes embarrassing past experiences.

But the reality is that the only thing we have true control over is our willingness to adapt and cope.

From my perspective, this isn't just Stoic platitudes or theory; I see it play out all the time: people with even a slightly more positive attitude have better luck overall. They experience fewer problems than their less positive counterparts.

It's not that the problems are easier or harder; it's that there are fewer problems. It's the weirdest thing, and I'm sure there's some deep psychological reason for it all, but that doesn't matter. I can confirm that a better attitude leads to fewer problems.

The good news? Our attitude is within our control.

About that Jitterbug

Jitterbug is a mobile phone designed for and marketed as "simple cell phones for seniors". Their smartphone has a larger, simplified display and applications customized for its target audience. They also have a bigger-button flip phone.

Even with the aggressive marketing to seniors, the phones might make great devices for anyone who struggles with technology, regardless of age.

So far, there is no Jitterbig laptop, but I do have three products you can investigate.

The Chromebook. I think of Chromebooks as an Android phone with a real screen and keyboard (or larger touchpad) and no phone. It's a fine solution for people who just want to surf, email, watch YouTube videos (or even stream), and more. Many of the apps in the Android Play Store are available, or there's an equivalent. I find it much less complex than Windows or macOS.

The iPad and other tablets. I know several people who use tablets almost exclusively. This can be a comfortable middle ground. They're very smartphone-like (iPads run iOS, the same as iPhones, and most other tablets run a version of Android, the OS on most non-Apple mobile phones), and can run a wide variety of available applications — or not, if you want to keep things simple. You can add a keyboard, if you prefer, and make use of voice-to-text to dictate email or documents.

The GrandPad. I have an 84-year-old relative using one of these, and it's been a good experience. It's limited, simple, and designed to be administered by a more tech-savvy family member to gate what the user can and can't do for their safety. It includes email, YouTube, and the like, but not, say, completely open web surfing. I never expected my relative to do email, for example, and yet they've been communicating with my wife regularly that way for a couple of years now. The GrandPad has been a great, if somewhat limited, solution for them.

I think of Jitterbug as being somewhere between these options. I don't know of a more comparable computer equivalent.

It's also about support

Whether a device is useful to tech-challenged users also depends on what kind of support is available. I mean support in two ways: from the manufacturer and from your personal network.

Jitterbug phones, for example, have a variety of support options, some of which include direct, personal contact with an individual to help you. Grandpad includes similar levels of support. The support for more generic devices, like iPads, tablets, and ChromeBooks, varies based on where you purchase them.

That next level of support, though, is all about who you can reach out to for help within what I'll call your personal network. That can include anyone from your more technically inclined family members to support options at local senior centers and libraries.

How you will get help using the device can sometimes be even more important than which device you use. In fact, one piece of advice I often give is to factor in who can help you into your initial purchase decision. If you have several iPad owners in your circle of friends, for example, that might tip the scales a little towards buying the same device.

Podcast audio

Should I Still Avoid Standard Folders If I'm Not Using OneDrive?

2025-08-21 08:00:31

Even if you avoid OneDrive, using standard Windows folders might not be as safe as you think. Microsoft’s been known to make changes you didn’t ask for. I’ll explain why I don’t trust those folders or Microsoft, and what I do instead to keep my stuff organized and safe.

It's a matter of trust.

by

Even if you avoid OneDrive, using standard Windows folders might not be as safe as you think. Microsoft's been known to make changes you didn't ask for. I'll explain why I don't trust those folders or Microsoft, and what I do instead to keep my stuff organized and safe.
a Split image: one side is a chaotic closet stuffed with apps and files labeled
(Image: ChatGPT)
Question: Since I have set up [Windows 11] and am using a Local User account, and refuse to have anything to do with OneDrive, can I still use the default document folders (Downloads/Documents/Pictures/Music/Videos) for storing and saving, or should I unpin them and add new folders?

I advise against using the standard Windows folders.

I have a couple of reasons for doing so. One is just a matter of how I like my data organized, and the other boils down to trust... or lack of it.

TL;DR:

Still avoiding standard folders

Even if you don't use OneDrive, Microsoft might mess with your files in the standard folders, like Documents or Pictures. Apps clutter them, and Microsoft could sneak changes in later. It's safer and cleaner to make your own folders somewhere else, and stay in control of your data.

Standard folders and OneDrive

The issue is that the OneDrive backup "feature" may move the contents of your Windows standard folders (Documents, Pictures, etc.) into OneDrive. On the surface, the advice is simple: don't use that feature. Unfortunately, it's easy to turn the feature on without realizing you've turned the feature on, and at that point, the damage is done.

The next level of advice is not to use OneDrive at all. Ideally, that means uninstalling it completely. Unfortunately, that's not an option for everyone. OneDrive is, after all, a useful tool when used properly. Even the backup "feature" can be useful if you know what it does and are okay with how it operates100.

Signing in with a local account and never using a Microsoft account is another way to sidestep the issue.

However, as strange as it sounds, that might not be enough.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Microsoft has lost my trust

Even if I turn off or avoid the OneDrive backup "feature", I don't trust that Microsoft won't turn it back on (or fool me into turning it on) in the future.

If I've uninstalled the OneDrive app on my computer101, I don't trust that Microsoft won't reinstall it in a future update.

If I don't sign in to the OneDrive app on my computer with a Microsoft account — one way to keep it from doing its job — I don't trust Microsoft not to sign me in anyway if I use a Microsoft account for any other reason on my computer. Signing in with a local account is protection, to be sure, but I worry that signing into anything else — say, a Microsoft service online — might connect OneDrive as a side effect.

Even with OneDrive completely out of the picture, Microsoft has shown that it's willing to alter how the standard folders work in confusing and potentially destructive ways with the OneDrive backup "feature". I don't trust Microsoft not to do something unrelated to OneDrive but involving the standard folders in the future.

So, yeah, there's a theme. I don't trust Microsoft not to do something destructive in the future.

Standard folders are standard

The other issue I have is less conspiratorial and more pedantic.

One thing that's come to light with the OneDrive backup "feature" fiasco is that so many applications also use those folders for their default storage — sometimes in ways that cannot be avoided.

That's fine for them, I suppose. Some have suffered from OneDrive's shenanigans, but that's not my real issue.

Even though I'm not using it myself, my Documents folder is a mess. There are over a dozen folders created by applications I use (or have used), all containing who-knows-what. In checking the folder as I write this, I find many files I don't even recognize.

Like I said, it's a mess. And, again, that's fine for the programs that end up using it. There are certainly some legit reasons to do so.

I just don't want my stuff to be part of the mess.

Non-standard standard folders

It's an easy thing to avoid. I create my own "standard" folders.

For example, you might create:

C:\MyStuff
C:\MyStuff\Documents
C:\MyStuff\Pictures
Etc.

Of course, the name is completely up to you.

Many people have been doing this for a long time as a way to move their working folders to a different drive. For example:

D:\MyStuff
D:\MyStuff\Documents
D:\MyStuff\Pictures

This allows them to reinstall Windows or wipe the C: drive without affecting their data.

Moving the default doesn't help

One comment I've gotten suggests that people move their standard Documents (and other) folders to a different drive.

The location of the Documents folder.
The location of the Documents folder. (Screenshot: askleo.com)

This is certainly a way to put the folder on a different drive. However, it remains the system's default documents folder. That means:

The bottom line is that it doesn't address either of my concerns.

But isn't it all Microsoft's?

If I don't trust Microsoft to handle my default folders correctly, how can I trust them not to muck about with my files regardless of where I place them?

It's a valid point. In fact, it's a point I've made to many people who are concerned about exposing their data to Microsoft via the cloud. You don't need to put your files in OneDrive; Microsoft already has access to everything on your computer; it's Microsoft Windows, after all. If you don't trust them with files in OneDrive, then why do you trust them with the files on your PC?

I'm in a similar position, but about organization, not privacy.

My rationalization is simply this: I can kinda understand the design decisions that went into the OneDrive backup "feature". In no way do I come close to agreeing with them, but I can understand the misguided path that led them there.102 One key aspect is that all machines have a "standard" layout that they could assume and rely on for the feature to be implemented. It would be easy for them to use that standard layout for other misguided adventures in the future.

I'd rather not risk that. Hence, my decidedly non-standard approach to organizing my files myself works for me. Could they stomp on it someday? I suppose they could, but it seems significantly less likely than their making assumptions about an organization they can find on every machine.

Time will tell.

Podcast audio

Footnotes & References

104: For the record, I know what it does, and I'm not OK with how it operates. I'm also not OK with the dark patterns Microsoft uses to get people to turn it on unintentionally.

105: As I have.

106: I'm sure it seemed like a good idea to someone at the time. Heck, maybe it still does, measured against priorities we're unaware of.

Tip of the Day: Visit (and Clean) the Temp Folder in Windows Command Prompt

2025-08-21 08:00:29

Using Windows Command Prompt can be a quick and easy way to view and clean up temporary files.

Windows Command Line Tip

(Video: askleo.com)

Windows maintains a few folders (also known as "directories") specifically for temporary files. Occasionally, it's interesting to view the contents and clean out leftover files.

I find it easiest to do so in Windows Command Prompt.

In Windows Command Prompt, type:

CD %TMP%

followed by Enter. Your "current directory" will be changed to the temporary folder for your login account.

Type DIR followed by Enter to view the files currently stored there. As in the example video above, you'll likely find many with obscure names and random dates and times.

One way to clean up the Temp folder is to try to delete everything in it. While you have it as your current folder (as shown within the prompt), type:

RD /S .

This is actually from a previous tip. It says, in essence, "remove the current directory" (the "." option), and everything in it (the "/S" option to include subdirectories).

After asking for and getting confirmation from you... it will fail.

There are two types of failures:

That's ok, because it will also succeed. Everything that can be deleted in the current directory will be.

You'll have cleaned up your Temporary folder.

Tip of the Day: Open Command Prompt in File Explorer's Displayed Folder

2025-08-20 08:00:29

Here's an easy way to open a command prompt for the folder you're viewing in Windows File Explorer.

Windows Command Line Tip

(Video: askleo.com)

You're viewing a folder in Windows File Explorer. For whatever reason, you decide what you really need is a Windows Command Prompt opened with that folder as its current folder.

For example, let's say you're looking at the contents of a folder at C:\MyStuff\Documents.

One common (yet slow) approach would be to open Windows Command Prompt (or Terminal or PowerShell) and carefully type in:

CD C:\MyStuff\Documents

Even with command completion, that's tedious. Other approaches aren't much better, including:

Instead, click in the address bar so the entire path is highlighted (most easily done by clicking just past the end of the displayed location).

Type "cmd" followed by Enter.

A Windows Command Prompt window will open to whatever folder you were viewing in Windows File Explorer.

How to Save or Recover Your BitLocker Recovery Key

2025-08-20 08:00:11

BitLocker could be running on your PC without your knowledge. Without the recovery key, you risk losing everything. I'll show you three ways to check, find, and save your key.

It could mean the difference between recovering your data or losing it forever.

by

BitLocker could be running on your PC without your knowledge. Without the recovery key, you risk losing everything. I'll show you three ways to check, find, and save your key.
Bitlocker Logo
(Image: askleo.com)

In some pre-configured Windows Pro or Home editions, BitLocker may encrypt the system drive without your knowledge.

Unfortunately, when encryption is on by default, you're not prompted to save the recovery key. You need to find it and save it before you need it.

TL;DR:

Finding your BitLocker recovery key

You can find your BitLocker Recovery key:

Regardless of how you get it, save it somewhere safe.

Traditional BitLocker setup

If you explicitly turn on BitLocker full-disk encryption, at some point in the process, you'll be encouraged to save the recovery key.

Back Up The Recovery Key
The prompt to back up your BitLocker recovery key. (Screenshot: askleo.com)

It's important to take one or more of these options. The recovery key is your way back in should you lose the ability to sign in to Windows or should you ever need to move the drive to a different machine.

It's important to keep the recovery key somewhere safe to avoid losing access to everything on that drive should something go wrong.

Great. But what if you didn't take this path?

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

BitLocker on by default

There are a few ways that BitLocker could be enabled by default. Who knew?

That has several implications.

The last point is the most concerning. Without a recovery key, you could lose everything on the drive. Let's explore three ways to find and save it.

The quick way: using your Microsoft account

Visit this URL and sign in, if needed, to your account.

https://account.microsoft.com/devices/recoverykey

This page lists all the BitLocker keys associated with the Microsoft account used to set up your computer(s), or the account that was in use when BitLocker was turned on.

Bitlocker Keys
BitLocker recovery keys. Click for larger image. (Screenshot: askleo.com)

Above is the list shown in my personal Microsoft account. There are a couple of interesting things to note.

  1. One machine is listed multiple times. Each likely represents a reinstall of Windows and a re-creation of the BitLocker encryption. Technically, I probably don't need the older ones, but there's no reason not to leave them there.
  2. One machine's name is incorrect. This implies that the key was saved before I changed the name of the machine from its auto-generated default to my NOTEN-based naming scheme.

If you see keys listed here, back up this information to an additional location for safety. Take a screenshot of the page and save the image in a safe place, for example.

This is great, particularly if you suddenly need a recovery key for a drive you didn't realize BitLocker has encrypted.

My question, though, is how do I know if these recovery keys are up to date? Like my machine listed twice above, how do I know of if the keys listed are current, or that I haven't somehow created a new key?

I don't.

Windows File Explorer: back up your recovery key

Windows File Explorer is sure to have the current recovery key. Right-click on the drive and look at the options in the resulting pop-up.

Manage Bitlocker option.
"Manage BitLocker" option in Windows File Explorer. (Screenshot: askleo.com)

If the menu includes "Turn on BitLocker", then BitLocker is not enabled for this drive. There's nothing you need to do. (If the menu has no BitLocker option at all, then you probably have the Home version of Windows without explicit BitLocker support. See below.)

If, however, there's an option to "Manage BitLocker", click on that.

Manage BitLocker, highlighting Backup your recovery key.
Backing up your recovery key. Click for larger image. (Screenshot: askleo.com)

Click on Back up your recovery key, and you'll have options to do exactly that. My suggestion is that you back up the key to both your Microsoft account (to be listed online, as shown above) and in some other form. Once you have that other form, store it somewhere safe where you can find it if needed.

The Command Prompt: Windows Home or Pro

Third option: if the drive is currently accessible, you can see the recovery key via the Windows Command Prompt. This is useful if you don't use a Microsoft account, you're running Home Edition, or if your machine isn't shown in your account online.

In an administrative Command Prompt or PowerShell, run:

manage-bde -protectors -get C:

Replace "C:" with the drive letter of interest. If the drive is encrypted, it'll display something like this:

BitLocker key being displayed using Command Prompt.
BitLocker recovery code displayed in Command Prompt. (Screenshot: askleo.com)

The "Password" shown under "Numerical Password" is your BitLocker recovery key. Save that somewhere. Again, you can take a screenshot and save the image, or you can select the text on the screen and copy/paste it into a simple Notepad document to be saved somewhere.

You may get the message, "No key protectors found."

Bitlocker No key protecetors found error message.
Command Prompt displaying the "No key protectors found" message. Click for larger image. (Screenshot: askleo.com)

This means the drive is not BitLocker encrypted, so there's no recovery key to save.

Podcast audio

Tip of the Day: You're Responsible

2025-08-19 08:00:57

Regardless of the tools you use, YOU are your biggest risk factor.

Security Tip

I don't mean this to come across as harsh or as an accusation, but it's something many people seem to forget.

Your security is your responsibility. Period.

No hardware or software, anti-malware tool, firewall, or system protection feature can protect you from yourself.

Too many people rely on getting the "best" tool or set of tools to keep themselves and their data safe.

Then they let down their guard.

That's when disaster strikes.

We certainly don't have to run scared — I know I don't — but we need to be aware of the risks of using technology and how easily all the tools we so carefully select can be bypassed.

They're not bypassed directly by hackers; they're bypassed by us. We ignore warnings, we disable tools, we download random things, we don't back up, we don't research the safety of sites and services; we even call unknown numbers or click on unknown links where unknown individuals will help us "fix" unknown problems if we give them unfettered access to our computer.

You are ultimately responsible for dealing with the results.

You must take responsibility for dealing with safety and security up front to avoid those negative results.

Have suitable tools in place, but don't absolve yourself of the responsibility for being both the weakest link and the most important factor in your online security.

Tip of the Day: View Keyboard Shortcuts on Menus

2025-08-18 08:00:13

Windows can indicate which keystrokes work as shortcuts for various menu and ribbon items. Here's how to turn that on.

Applies to Windows: 11, 10

Here's a tip for people who like to operate from the keyboard. In Windows Settings, search for shortcut, and click on the result referring to underlining access keys or similar. (Unfortunately, the terminology seems to change from update to update.) The resulting page includes a simple setting.

Enable shortcut underlines
Enabling shortcut underlines in Windows 10. (Screenshot: askleo.com)

 

Underline access keys
Underlining access keys in Windows 11. (Screenshot: askleo.com)

Turn that on.

Programs with traditional menus will now have the shortcut keystroke for each menu item underlined.

For example, in Notepad, ALT+F opens the File menu; hence, the "F" is underlined. With the menu open, typing "N", "O", "S", or "A" will open the "New", "Open...", "Save", or "Save As..." menu items respectively; thus each letter is underlined.

For apps using a ribbon interface, it's often enough to simply type the ALT key once to display the shortcut keys.

With Windows File Explorer open, the ALT key will cause (among other things) a "V" bubble to appear near the View menu item. Typing "V" then opens the View ribbon, with bubbled letters indicating the respective keyboard shortcuts to the available controls.

Are There Hidden Files that Save Every Keystroke I've Ever Typed?

2025-08-18 08:00:00

Worried your computer is secretly saving everything you type? It’s not. While there are hidden files and places keystrokes can live temporarily, there’s no master file of your entire typing history (unless malware is involved). Learn what’s real, what’s myth, and how to truly erase your data.

The Best of Ask Leo!

No. But of course, nothing is that simple.

by

Worried your computer is secretly saving everything you type? It's not. While there are hidden files and places keystrokes can live temporarily, there's no master file of your entire typing history (unless malware is involved). Learn what's real, what's myth, and how to truly erase your data.
Typing on a Laptop
(Image: adobestock.com)
Question: This is a multi-part question and pertains to computer forensics — specifically, locating those mysterious, deeply hidden files that (supposedly) contain your computer's entire history — every keystroke ever made. Accessing those files. Viewing the contents. Deleting the contents. Understanding how a utility like DBAN can "find" and nuke them, but I, as the computer owner, can't. And finally, if every keystroke has been recorded to some hidden file, how come it doesn't wipe out available space on my hard drive?

This is a relatively persistent family of questions that come around from time to time, particularly in times of concern about individual privacy.

These questions exhibit several misconceptions.

However, those misconceptions are based on kernels of truth. I can't just say, "That's wrong"; instead, it's more a case of "It's not like that, it's like this."

Let's see if I can clear up the confusion. To do so, we need to talk about keystrokes, loggers, hidden files, erasing files, and really erasing files.

TL;DR:

A record of every keystroke ever?

No, your computer isn't secretly saving every word you type. Some programs and parts of your computer remember things for a short time, but nothing keeps it all forever... unless, of course, you've got malware. Stay safe, and you don't need to worry. Just erase things properly when you're done.

Recording keystrokes

Let's start with this: There is no hidden file containing every keystroke you've ever typed on your computer.

If every keystroke were being recorded somehow, there's no way it would still be some kind of secret. We'd be hearing about a lot more successful prosecution of cyber criminals, along with a plethora of lawsuits regarding privacy concerns.

So no, there is no hidden permanent record of every keystroke recorded by the operating system, drivers, or other official software.

However, there are a few kernels of truth in the question.

It's also worth remembering that all bets are off if you have malware such as a keystroke logger.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Keystroke loggers

Keystroke loggers, or "keyloggers", are a type of malware that hackers use to gain access to your usernames and passwords. As its name implies, keyloggers record or "log" every keystroke and send them off to the hacker, typically over the internet. Once sent, of course, there's nothing you can do.

I often hear from people asking if one technique or another will somehow "bypass" keyloggers so they can log in safely without the keylogger logging anything. The answer is no. There are two important points to realize about keyloggers.

From my perspective, malware, including keystroke loggers, is the only practical reason for concern about keeping any record of your keystrokes.

The good news is that since keyloggers are just malware, the techniques you already have in place to avoid malware will keep you safe.

Hidden files

The amount of data that would be collected by recording every keystroke is no longer a reason why it couldn't be done.

Let's say you're a prolific typist, and you type 100,000 keystrokes a day (that's over three keystrokes every second for a solid eight-hour work day). In a year, that adds up to 36 megabytes of data. Keep your computer for 10 years, and that's 360 megabytes. On today's hard disks, that's next to nothing. You'd probably never notice it.

So are all your keystrokes being written to some hidden file? No.

But there are hidden files on your machine.

As you can see, there's a potential for a lot of hidden information on your PC.

But none of them contains every keystroke you've ever typed. đŸ'‚

Deleting files

We also need to understand how files are deleted, because that can cause a different type of "hidden" file: remnants of previously deleted files.

When a file is deleted, its contents are not removed. Instead, the space the file formerly occupied is marked as available for another file to be written to later. Until the overwrite happens, the original deleted information is still there.

This is how many undelete and data-recovery utilities work. It's also why most of those utilities recommend you stop using your disk if you accidentally delete something; that avoids overwriting the deleted area with something new. So just deleting something doesn't mean it's immediately or completely gone.

The article How Does Secure Delete Work? goes into this in more detail, including the steps to take to make sure that your deleted files are really gone.

Which brings us to DBAN.

Drive-wiping utilities

The utility you mention, DBAN, doesn't find files at all.

But once again, there's a kernel of truth: it erases your files — all of them.

How? It securely erases everything. Paying no attention to what's stored on it, DBAN overwrites the entire contents of a hard disk — every sector, whether used or not.

Podcast audio

Prepare to Lose Your Phone

2025-08-16 08:00:11

Your phone holds the keys to your digital life. If it’s lost or stolen, things can get messy fast. I'll show you simple steps like locking, tracking, and backing up that protect your data and give you peace of mind before the worst happens.

Maybe it'll never happen — but prepare as if it will.

by

Your phone holds the keys to your digital life. If it's lost or stolen, things can get messy fast. I'll show you simple steps like locking, tracking, and backing up that protect your data and give you peace of mind before the worst happens.
 somone on a crowded street having their mobile phone stolen from their pocket by a pickpocket
(Image: ChatGPT)

As more and more of our digital life moves online, much of it ends up in our pockets in our mobile phones or smartphones.

And while hacking and malware make the headlines, the biggest risk is something much more mundane: losing your phone or having it stolen.

Let's prepare for that.

TL;DR:

Losing your phone

Losing your phone can mean losing access to your digital life. Lock it with a PIN or biometrics, turn on tracking, and back up your data to the cloud. Set up recovery info for accounts with two-factor authentication. Take simple steps now to prevent a disaster later.

Why your phone needs special attention

Unlike our desktop computers and more so than our laptops, phones are small, portable, and all too easy to misplace.

Not only are more people doing more things with their mobile devices, but many have only a mobile device. This means that this small, easy-to-lose device carries potential access to your entire digital life.

Everything. In the hands of a stranger who picks it up is one thing, but in the hands of a thief who's explicitly stolen it? That's a whole ‘nother matter.

It's critical to plan ahead before something happens.

All it takes is using two simple features. Additionally, back up your phone and use two-factor authentication for important accounts.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Lock

First things first: set a PIN, configure biometrics, or whatever else is offered by your phone's operating system to lock the phone when not in use. Make sure you have a short auto-lock time, after which one of those security techniques is required to gain access to the contents of your device.

Locking your phone:

In addition, many phones can be configured to erase all data after too many failed PIN attempts.

Remote track and wipe

Make sure the Android Device Manager or iPhone's "Find My" feature is enabled and working. Using them, you can:

This does require that location services are turned on.

There are also third-party tracking and management tools like Prey, Cerberus, and others that may offer more robust control than built-in tools.

Backing up

So many people keep their photos on their phone and only on their phone. As a result, when their phone gets lost or stolen, the photos are lost and gone forever.

It's about more than just photos, of course; this also applies to whatever data is stored only on your device.

Tools like OneDrive, Dropbox, iCloud, and others all offer automatic cloud backups for your photos and videos. I strongly recommend you choose one and make sure it's backing up your information.

Fortunately, most email/contacts/calendar apps are simply interfaces to online services where the information is kept. Make sure you can access all those on the web without your phone. If you find you cannot, investigate tools or alternatives to back them up as well.

Two-factor authentication

I strongly recommend you enable two-factor authentication for all accounts that support it. In most cases, that means using your mobile device to receive a text message or running a TOTP103 app.

So what happens if your device is lost or stolen?

When you set up two-factor, it will ask you to configure account recovery information for the account. Do it. At a bare minimum, make certain to save any recovery codes provided by the service.

If your 2FA is SMS text message-based, be prepared to reach out to your mobile provider to port your number to a replacement device.

The aftermath

Here are a few steps to take after you discover your phone is lost or stolen.

Podcast audio

Footnotes & References

107: Time-based One Time Password, aka "Google Authenticator Compatible" second-factor app.

Loosely based on a previous video: Are You Ready to Lose Your Phone?

Why Do We Suddenly Need AI?

2025-08-15 08:00:49

AI might feel sudden and overwhelming, but it’s not the first fast-moving, world-changing technology we’ve faced. I'll compare AI to the rise of the automobile and explore why understanding and engaging with AI, rather than dismissing it, is probably the smartest move we can make.

We don't. But don't be too quick to dismiss it.

by

AI might feel sudden and overwhelming, but it's not the first fast-moving, world-changing technology we've faced. I'll compare AI to the rise of the automobile and explore why understanding and engaging with AI, rather than dismissing it, is probably the smartest move we can make.
a split-screen image: on one side, a 1920's era scene of a crowd of angry people shaking their fists at a Model T automobile, on the other side a modern scene of a crowd of angry people facing a humanoid looking robot shaking their fists at it
(Image: ChatGPT)
Question: For decades, most people have known AI stands for Artificial Intelligence. That's plain and simple. I am asking about the modern AI that is suddenly a worldwide phenomenon, attracting hundreds of billions of dollars of investments in huge multi-acre AI centers with thousands of employees and huge electrical power requirements that almost demand a dedicated nuclear reactor. Why does the world suddenly need all of this?

You may not like the approach I'm going to take. I'm going to draw a comparison.

Hear me out, as I start by rewriting your question.

TL;DR:

Do we need AI?

We don't need AI now any more than we needed cars in the 1920s. But AI is here, growing fast, and could change everything. It'll bring problems, sure, but it could also improve life in ways we can't yet imagine. The key? Stay curious, get informed, and help shape what comes next.

Why did we suddenly need the automobile?

I am asking about the modern "horseless carriage" that is suddenly a worldwide phenomenon that is attracting hundreds of millions of dollars of investments in huge multi-acre manufacturing plants with thousands of employees and huge power requirements that almost demands we start drilling and drilling for more oil to run them all. Why does the world suddenly need all of this?

That's a question I'm certain was asked by many shortly after the turn of the previous century — say the 1920s. The automobile was the New Big Thing, and it was changing society forever. Many, I'm sure, were asking why we needed this newfangled contraption. We seemed to do just fine without it.

The answer to this turn-of-the-previous-century version of your question is the same as my answer to your question about AI.

We don't.

We don't need any of it. We could have lived without the automobile. Heck, there are plenty of folks who would say it would even be a better world if we hadn't adopted it so thoroughly.

We could live in a world without AI.

The question we don't yet know the answer to is: Do we want to? Would it be a "better" world?

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Hindsight only happens in reverse

In hindsight, there's a pretty powerful argument that we'd be better off with automobiles than we would be without them.

Yes, there are plenty of downsides: pollution, industrial waste, massive acres of pavement, accidents, and more. I won't sugarcoat it. And while we're making progress on some of these, the fact is that the automobile continues to harm society all these years later.

And yet it's offset by massive positive effects. That we can drive anywhere at any time, and that it's even marginally affordable, is absolutely amazing. It enables us to live a life we simply could not have imagined pre-auto. Quick trips to the grocery store104 and cross-country road trips to visit family and friends, or to take part in activities we might never even have heard of in the past105, are just the tip of the iceberg.

Expand that vision to include the increased commerce and trade, and once again, we find we're living in a world our 1920s counterparts could not have imagined.

Much of what the automobile has enabled is so core to what we are and how we live that we take it all for granted now.

We didn't need it, but we're better off because of it.

Foresight is impossible

I'm not saying we'll be better off with AI than without it. We don't know. It's still happening, and we don't yet know the impact it will have.

What the world will look like in just a few years is uncertain for a variety of reasons; AI is just one of them. Will it help or hinder? Will the changes it makes and the impact it brings be net positive or negative? We just don't know.

There are people at both ends of the spectrum who believe strongly that AI will bring salvation or doom. Back in the day, I'm certain some felt the same way about the automobile.

It's impossible to say what the future truly holds.

My bet is on net positive

There will be downsides to AI. There already is environmental and societal impact, "accidents", and more. Just as with the automobile, there will be some massive mistakes and spectacular failures.

The automobile, while continually being refined to this day, is an assumed staple of society and something we all now take for granted. Its massive mistakes have passed into history.

My expectation is that AI will eventually fall into this category. I don't know what it will look like, because again, it's too early to say. But I believe it will continue to be refined and improved upon, including actions to mitigate the negative impacts we've already identified.

I expect that someday, AI will be something we take for granted too.

Do we need it? No. Could our lives be better because of it? Very possibly so.

Only time will tell.

Podcast audio

Footnotes & References

108: Which I literally did just before writing this article.

109: Indeed, there's a possible road trip in my future as well.

Tip of the Day: List ALL the Accounts on Your Machine

2025-08-15 08:00:39

Command-line tools can examine more accounts on your machine than are normally displayed.

Windows Command Line Tip

List Accounts
Command Prompt listing all user accounts. (Screenshot: askleo.com)

The Settings App or Control Panel will show you most of the accounts on your machine, but in fact, there are more. Some accounts — like the true Administrator account — are hidden; others are utility accounts used by Windows or other installed programs.

To run an Administrative Command Prompt, right-click on Start and click on Command Prompt (Administrator), or right-click on a shortcut to Command Prompt and click on Run as administrator. In that command prompt, type:

net user

followed by Enter. This will display a list of all the accounts configured on your machine.

You can get more information about a specific account by entering:

net user account-name

For example, "net user leon", from the example above, returns additional details about the account.

Account Details
Details about a specific user account. (Screenshot: askleo.com)

Items like the creation date can help you understand why an account exists — for example, that date might coincide with the installation of some software.

Do I Need a Spare Computer?

2025-08-14 08:00:55

I'll help you decide if having a spare computer makes sense, what your backup options are, and how to prepare without spending more than you need to. Peace of mind might be easier than you think.

Maybe. Maybe not.

by

I'll help you decide if having a spare computer makes sense, what your backup options are, and how to prepare without spending more than you need to. Peace of mind might be easier than you think.
a laptop computer inside a wall-mount fire extinguisher container behind glass with the words "in case of emergency break glass" stenciled over the glass
(Image: ChatGPT)
Question: Should an old man who lives alone and is pretty much housebound have a backup computer? Old people tend to feel insecure and like having redundancy. Everybody is tied to the Internet these days, for Uber cars, online banking, Amazon shopping, license renewals, tax payments, etc. What if one's computer fails? Please comment and advise.

There's no single answer to this other than my old standard: "It depends." Smile

There are two things to consider: the alternatives you might already have and the impact of not having a computer.

TL;DR:

Keeping a spare?

If losing your computer would be a big problem, having a backup, or at least a backup plan, makes sense. You might use an old machine, a phone, or just borrow a computer temporarily. Even a cheap spare could be enough. What matters most is being ready so you're not stuck if something goes wrong.

Why it matters

As you pointed out, we're tied to our computers and all the online conveniences that we now take for granted.

A few things that at least become more difficult should your computer fail include:

The underlying concept is increased isolation and the stress of being cut off.

Understanding your alternatives can be important to your peace of mind. This means you should consider either a backup computer or having a backup plan for what you might do without one.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Existing alternatives

Before deciding on a second computer, it's worth exploring the alternatives you might already have available. They vary in capability and inconvenience, but they could come in handy in a pinch.

Friends or family. Especially younger family members may already have spare or lesser-used computers they could part with for you to use. This could be a quick solution that could gain you some time to make more permanent plans.

Libraries and senior centers often have computers available for public use. They aren't as convenient, as you have to travel to them, and you may be limited in how long you can use them since they're shared with others.

Computer repair facilities. While not common, it's not unheard of for computer repair shops — particularly local, independent operators — to have loaners available. If your primary computer fails, you may be able to borrow something while it's being fixed.

Computer stores. Here in the U.S., and likely elsewhere, big-box stores can provide a replacement computer the same day. That could be a viable safety net without needing to purchase anything beforehand.

Your mobile device(s). If you have a smartphone or a tablet, that could be enough to tide you over, at least for many common tasks like email or basic web surfing.

All these options rely on some amount of flexibility in your situation.

Inconvenience or disaster?

If losing access to your computer would be only an inconvenience, the alternatives I've mentioned so far might be enough.

But what if it's more than an inconvenience? If you need immediate access after a computer failure, then having a spare might make sense.

For example, I have backup computers, plural. This is my business, after all. One is my laptop, which I sometimes refer to as Ask Leo! World Headquarters when I travel. Since it's capable in its own right, it would work as an instant (albeit temporary) replacement for my desktop should that suddenly fail.

Your backup computer

One easy way to get a backup computer is to keep your old one when it comes time to replace it. I do this and refer to it as the trickle-down approach to hardware obsolescence.

Assuming it's functional, your older computer can serve as a temporary replacement should something happen to its replacement. If it's not functional, it might make sense to have it repaired (if that's cost-effective).

Of course, if you're not at the point of replacing your computer because it's working fine, then realizing you need a backup computer could serve as your excuse to get a new one anyway.

Cold versus warm backup

There are two types of backup computers to consider. I'll call them "cold" and "warm" backups.

A cold backup computer is one you never touch until you need it. When the time comes, you bring it out, hook it up, and spend some time bringing it up to date and up to speed.

A warm backup is one that's connected and more or less ready to go. You might fire it up on occasion to make sure it's working and up to date. If you have tools that synchronize — your browser sync accounts, OneDrive/Dropbox tools, password vault, etc. — this is a good time to make sure the data they manage is up to date as well.

You certainly don't need to keep it running all the time, or even often. Just fire it up once in a while.

Don't forget the cloud

Everything you have stored in the cloud will be available to you regardless of what happens to your computer or which machine you use.

Email is a great example. If you're using online services like Gmail, outlook.com, Yahoo Mail, or others, it's all there online as soon as you sign in.

Similarly, services like OneDrive, Dropbox, and Google Drive make sure you can access your documents from any computer.

And, of course, password managers like Bitwarden or 1Password maintain your credentials and let you log into important services from a borrowed or replacement machine.

A word about cost

One common objection to having a spare computer is the cost.

Here's the thing: as a temporary replacement, it doesn't have to be high-end. Your old computer, for example, might feel somewhat underpowered if you press it into service, but it'll work and it won't cost extra.

If you're specifically shopping for a backup computer, consider second-hand machines or machines with lower specifications than you'd get if you were purchasing a new, primary machine. For example, a less expensive Chromebook might tide you over if your needs are mostly online or primarily in the Google ecosystem.

Podcast audio

Tip of the Day: A Shortcut to Lock Your Computer

2025-08-14 08:00:23

A desktop shortcut to quickly lock your computer.

Create New Shortcut
Creating a shortcut. (Screenshot: askleo.com)

+ L is a quick and easy way to lock your computer. But if your hand is on the mouse rather than the keyboard, a desktop shortcut can be easier.

Create a new shortcut with the "location of the item" set to:

rundll32.exe user32.dll,LockWorkStation

You can then name this shortcut whatever you like. "Lock" seems an obvious choice.

Double-click on that icon, and Windows will lock your machine.

Tip of the Day: CTRL+ESC for the Start Menu

2025-08-13 08:00:58

CTRL+ESC brings up the Start Menu.

The Keyboard - Because sometimes it's faster

Windows 11 Start Menu
Windows 11 Start Menu. Click for larger image. (Screenshot: askleo.com)

Possibly the shortest tip ever: hold down the CTRL key and type the ESC key to bring up the Start menu.

Bonus tip (so it's not SO short): after doing so, the arrow keys can move around in the displayed menu. The Enter key will then run or open whatever is currently highlighted.

Is It OK to Reuse Passwords on "Unimportant" Sites?

2025-08-13 08:00:29

Reusing passwords on sites you don’t care about might feel harmless, but it still can open the door to bigger problems. I’ll look at why even “unimportant” accounts matter more than you think, the risks of cutting corners, and simple ways to stay safe.

No, but we all do it.

by

Reusing passwords on sites you don't care about might feel harmless, but it still can open the door to bigger problems. I'll look at why even "unimportant" accounts matter more than you think, the risks of cutting corners, and simple ways to stay safe.
Chalkboard on which is written "Password: password123"
(Image: canva.com)
Question: Does this/my attitude below expose me in ways I'm not aware of? I'd NEVER reuse a password for financial, shopping, insurance, social media, email, or government sites! BUT I reuse a few easily memorable ones for subscriptions to Web media comment sections. I do this only because sites annoyingly request re-entering a password periodically, and I don't want to interrupt my flow to look them up. On those sites, I don't care if someone hacks in'and no one would even bother!

I will question some of your assumptions, but I'll also admit that yeah, I do it too. And it's not great.

We all have gazillions (technical term, that) of accounts we need to manage. It can be a pain to manage all the associated passwords.

It might be OK, in some situations... but even then, it comes with risks.

TL;DR:

Reusing passwords

Reusing passwords on "unimportant" sites might feel harmless, but it's risky. Hackers reuse leaked passwords everywhere, and even so-called "unimportant" sites may reveal too much information about you. A password manager helps you stay safe by enabling you to use unique, strong passwords everywhere, even for the stuff you don't think matters.

Pro: Reusing passwords (or using less secure ones)

There are several arguments in favor of reusing passwords or using weak passwords.

The justification, as you point out, is that not all accounts are equal in importance. Some are so unimportant that we don't care if that account gets hacked.

Some sites just don't matter.

Or do they?

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Con: Risks of reusing or weakening passwords

Once a password is discovered in a breach, hackers try it everywhere. They do "bother", to use your terminology.

If a password is revealed somehow (Pwned Passwords will tell you if yours is known to be "in the wild"), they absolutely will try that password across a wide variety of sites and services to see if it works. It's all automated, so it's trivial for the hackers to do.

If that password is used for another account that is or has become even marginally "important" to you, you risk losing it.

Of greater concern, and easier to overlook, I think, is the fact that even "unimportant" sites have information hackers can use. Your name, birthdate, email, links to your social sites, and more are all things they can harvest and use for targeted phishing emails or even identity theft. So even if account A has none of that information, if it gets hacked and exposes your password, hackers may use that to access account B (or C, or D, etc.), where more sensitive information might be present.

Even if that doesn't happen, any account that is compromised can be used to post spam or promote scams under your name. Ultimately, it can affect your reputation and trustworthiness.

Even if it's "just a forum."

Middle ground

While I'm vocal about password hygiene and security, I realize that no matter what security experts suggest, people will continue to reuse passwords and set weak ones. As I said, I'm guilty of it myself at times.

So, here are some suggestions to make life a little easier.

Use a password manager. You knew this was coming. It's one of the most important things you can do; it makes it easy to use long, strong passwords that are unique for every site. It makes proper security easier.

Have tiers of importance. You're already kind of doing this (important versus unimportant sites), but I want you to rethink it. It's too easy for an account we consider "unimportant" when we set it up to become more important than we thought. Even then, don't reuse passwords. At worst, maybe dial back the complexity.

Use email aliases. One additional level of security is to use a different email address for some accounts. You might use a throwaway Hotmail account for less important things or use a unique email address for every important account. The key here is that by varying the email address, you're making it harder for hackers to discover the correct email address/password combination for any specific account. It's not completely effective, but it makes it more difficult to hack, even if a password is weak or reused.

Dangerous reuse

Never reuse passwords, and always use a strong password, for:

When in doubt, use a strong, unique password.

And use a password manager to keep track of it all.

Podcast audio

Tip of the Day: Get the Windows Version Quickly

2025-08-12 08:00:42

A quick way to learn which version of Windows you're running.

Windows 11 Version
"About Windows" tells you which version of Windows you have. (Screenshot: askleo.com)

This is a quick way to see what version of Windows you're running.

The result will be a dialog displaying the current version of Windows, as shown above.

When you need to know which build of Windows you have, this is a quick and easy way to find out. It also works in previous Windows versions.

Windows 7 Version
Win7 version dialog. (Screenshot: askleo.com)

Is Copyright Still an Issue If Something's Not Available Anywhere?

2025-08-11 08:00:29

Just because something’s old or unavailable doesn’t mean you can make copies of it. I'll explain why copyright still matters, how technology complicates things, and what you need to know before making that backup or download. It’s simpler and more important than you might think, even if you don't like the answer.

The Best of Ask Leo!

Yes. Availability has nothing to do with it.

by

Just because something's old or unavailable doesn't mean you can make copies of it. I'll explain why copyright still matters, how technology complicates things, and what you need to know before making that backup or download. It's simpler and more important than you might think, even if you don't like the answer.
Copyright?
(Image: askleo.com)
Question: I want to be able to copy some old VHS tapes to DVD via my PC. Your site answers all the questions except one, as 99% of my VHS tapes have copyright restrictions. Is there a device I can obtain that will allow me to copy these tapes? As most of these movies are now ‘out of production' and unobtainable, I do not see copyright as an issue.

Before I dive in, I need to be super clear: I'm not a lawyer. Never have been, and don't plan on becoming one. This is not legal advice; use it at your own risk, no animals were harmed, some objects may appear smaller, your mileage may vary, and so on and so on.

That being said, I have a clear opinion which I believe to be relatively accurate.

The bottom line: copyright is most definitely an issue.

TL;DR:

Copyright vs copy wrong

Even if something's not available anywhere, it's still protected by copyright. You can't legally copy it without permission, no matter how rare it is. Copyright gives the creator control, not you. Just because it's easy to copy doesn't mean it's legal to copy.

What is copyright?

A copyright says that the person (or entity) who creates an original work has the right to say what can and cannot be done with it. They control or own the "right" to "copy."

Pretty simple.

Copyright law codifies that: those rights are protected by international law, and violating those rights — say by making copies of someone's work without their permission — is illegal.

Also pretty simple.

Sometimes copyright can seem pretty silly. For example, as I understand it, if I own a DVD of a movie, it is illegal for me to make a backup copy of that movie to protect my investment in the DVD, or for me to copy that movie to my laptop's hard disk as a convenience to watch elsewhere.106

It's important to realize that copyright law didn't make that rule — the owners of the media did. It's the law that allows them to do so. Whoever owns the copyright on a particular original work decides what you're allowed to do. In the case of my DVD, they said, "No copies of any kind, for any reason, period."

Seems silly. But it is what it is. It is their right to assert that restriction on the content they've produced.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Availability and copyright

Let's clear this up from the original question also: availability and copyright are completely unrelated.

Just because there may not be a legal way to get a copy of something does not magically remove copyright or copyright restrictions. Copying copyrighted material without permission is illegal, whether or not it is otherwise available.

If there's no legal way to get a copy, then you can't get or make a copy without breaking the law. Period.

There's no rule that says things must always be available. Some things just aren't. If I choose to produce something in limited quantity and then stop making it available, that's my right. In fact, it might even be my intent.

Even if the copyright owner doesn't have the resources or inclination to make something available in a format you prefer, unless they say otherwise, it's still not legal for you to make the copy yourself.

And yeah, sometimes that sucks. I agree it would be nice if everything previously available on VHS tape were now available on DVD, but it's not. "Would be nice" means nothing.

Technology and copyright

Technology is often used in an attempt to enforce copyright. "Copy protection" schemes are widespread. The example in the question, known as Macrovision, is a technology used to prevent analog VHS tapes from being copied to other media. (There are probably devices to circumvent it.)

Encryption is another technique; you'll find most DVDs and Blu-Ray disks have copy protection using encryption. As I understand it (insert my "not a lawyer" statement here again), the act of circumventing those copy protection schemes may be illegal.

Here's a hard one to grasp: technically, copyright and copy protection are completely unrelated.

If there's a copy protection scheme in place, that's certainly a pretty good sign that the copyright owner doesn't want that material copied and doing so is probably illegal. But the copyright owner could — for reasons I can't envision — decide otherwise.

More importantly, copyright does not require copy protection. Audio CDs, for example, are not encrypted, but they are still typically copyrighted and illegal to copy. Same goes, for example, for the ebooks I sell: they are not encrypted, but it's still illegal to make copies107.

Downloads and copyright

I was tempted to call this section "BitTorrent and copyright", but that would miss the point. At its core, BitTorrent has nothing to do with copyright.

BitTorrent and other peer-to-peer file sharing programs are file-copying programs — nothing more, nothing less. It's fairly nifty technology, but ultimately, it's just about copying files from one place to another.

Any technology used to download or copy a file can be used legally or illegally. The technology you use to download a file has no relationship to copyright.

Yes, BitTorrent is used for a lot of illegal file sharing. But BitTorrent itself isn't illegal. What's illegal is sharing copyrighted files without permission. And it's illegal no matter what technology you use to download them.

The "problem", if you want to call it that, is that computers have made copying digital media trivial. On top of that, the broadband connections have made transferring files trivial. It's not unrealistic for many people to download a 4.7 gigabyte file — the size of a DVD.

All that makes downloading copyrighted material extremely easy. Not legal; just easy.

What is copyrighted?

Knowing what is and is not copyrighted is both simple and really, really ugly.

In the U.S., at least, anything created is copyrighted immediately, with no action needed by the creator. They don't have to say, "This is copyrighted" with some year for the copyright to be in place; it's in place by default. The additional statements, and even registering copyright with the U.S. Copyright Office, are simply steps that remind honest people to remain honest and make the results of any legal actions clearer, and sometimes more costly, to the offender.

When downloading something for free, the best rule of thumb is: if it's too good to be true, it's probably illegal.

You can see where I'm going.

Here's where it gets ugly.

There's a lot of stuff that really is free. Media shared under what's called the Creative Commons license is free with varying degrees of usage limitations. Public domain is free. Individual and independent artists often make some or all of their work available for free for a variety of reasons.

One great example: I give away a free edition of my Internet Safety ebook when you subscribe to my newsletter, and you are free — encouraged, even — to share copies with others. My other ebooks? Not free. If you get them for free from anywhere that isn't my site, someone's ripping me off.

Sometimes it's hard to tell. I get that. But most people asking already know the answer.

It might be confusing (though most often it's not), and we might not agree with all the ramifications — I know I don't — but it is what it is.

Podcast audio

Footnotes & References

110: As I understand it, this potentially breaks a couple of laws by breaking the encryption as well as making a copy.

111: Here's where I differ from the movie industry: I don't care if you make a copy for your personal use and convenience, and (of course) to back up. Just don't make one for your friends; they should buy their own copy. Or you could buy one for them.

Two-Factor Might Be Hackable. USE IT ANYWAY!

2025-08-09 08:00:54

Another scare about two-factor authentication being hackable? DO NOT let that stop you from using it.

Seriously. Please.

by

Another scare about two-factor authentication being hackable? DO NOT let that stop you from using it.
Two factor code being displayed on a mobile device.
(Image: depositphotos.com)

Not long ago, I wrote about SMS two-factor authorization being hackable and why you should use it anyway.

It's an important enough topic that when I saw another article discussing a potential two-factor exploit — ˜You can't relax': Here's why 2-factor authentication may be hackable — I just had to jump in to reinforce my message.

Use two-factor authentication anyway.

Even if two-factor is technically hackable, it's essential.

TL;DR:

Two-factor authentication hacks

Two-factor is a barrier

The short, simple answer is this: Two-factor authentication erects another barrier to unauthorized individuals seeking to access your account. It's a barrier most hackers won't bother trying to penetrate. Instead, they'll move on to other, less protected accounts.

Seriously, that's all it takes to add significant value to your account security. Make it harder for the hackers, and they'll go find an easier target.

That alone should convince you to use it. It keeps hackers out even if it is technically hackable.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Your account is less secure without it

I stand by the position I took in my previous article: your account is less secure — potentially significantly less secure — if you protect it with only a password.

You're relying on that one piece of information remaining a secret forever.

Ask anyone whose account was compromised because the service they were using was hacked how well that worked for them. They did nothing wrong. They used long, strong, secure passwords and never shared them with anyone. Something completely out of their control exposed their password, and — poof — their account was in the hands of hackers.

Two-factor authentication could have prevented that, even if it is technically hackable.

Possible does not mean easy

That two-factor authentication can be hacked doesn't surprise me. These are complex systems we're dealing with. Bring enough firepower to bear, and I suppose anything is possible. There's no such thing as perfect security, after all.

But that doesn't mean it's easy or commonplace.

The previous "OMG! Two-factor can be hacked!" scare required access to the telephone company systems that process SMS text messages for the targeted account. Read that again: it required access to a telephone company! Possible? Sure. Easy? No.

The scare that got my attention for this article requires your participation. You need to be targeted for and fall for a phishing scam that uses the two-factor information you type in to access your account. Let's face it, two-factor or not, all bets are off if you fall for a phishing scam.

Another type of scam, SIM swapping, requires fooling your mobile provider into reassigning your mobile number to a scammer. To protect you from this, most providers allow you to set up a PIN that you have to give them before they will make any changes to your account.

Different forms of 2FA

The objections above apply almost exclusively to SMS-based two-factor authentication. Other forms of 2FA, including email, Time-based One-Time Passwords (Google Authenticator compatible), and hardware keys, are more resilient. They aren't perfect, but they are much more difficult to hack.

So yes, if you have the option to choose something other than SMS text-messaging-based two-factor, do so.

But if SMS is the only option, it's still better than not having two-factor at all.

Podcast audio

Tip of the Day: Plan for the Worst

2025-08-08 08:00:23

By planning for the worst, you can assess your security and be prepared for the multitude of smaller issues that are more likely to happen.

Worst Case Scenario
(Image: canva.com)

This is a thought exercise I go through when I'm about to go on a business trip.

What would happen if I lost everything I had with me? I mean everything: technology, wallet, perhaps even clothing.

How would I start over while on that trip? Sure, after seeing to my physical safety, I might borrow a computer — but then what? My digital world is locked down so tight that it would be difficult for me to gain access without my second factor (as used for two-factor authentication), or my mobile phone (often used for the same thing), not to mention my password vault, since the vast majority of my passwords are beyond memorization.

How would I bootstrap my digital life?

By bootstrap, I mean to gain access to one key piece of information (perhaps a one-time passcode in a safe location secured by a very strong yet still memorable passphrase) that would allow me to bypass a two-factor authentication requirement and gain access to the next level (perhaps a password vault, at which point I could access my critical accounts).

To be clear, I'm not suggesting you weaken your security for this "just in case" scenario. For example, don't turn off two-factor; just make plans for how you might securely bypass it in an emergency.

It's a worthwhile scenario to run. You will not only confirm your overall security but also provide yourself with a safety net.

You know... just in case.

Where Should I Put .EXE Files?

2025-08-08 07:00:49

Where do you store an .exe file so it works best? I'll break down your options and show you the smart, safe ways to store and use portable programs on your PC.

Such a simple question.

by

Where do you store an .exe file so it works best? I'll break down your options and show you the smart, safe ways to store and use portable programs on your PC.
A sunny, colorful landscape with road signs labeled
(Image: ChatGPT)
Question: Where do .exe files need to be safely stored to work on my PC?

It's such a simple question... so you know the answer won't be.

Or rather, answers, plural. It all begins with "It depends". đŸ'‚

TL;DR:

Where to put that .exe

Depending on your intended use, .exe files (or portable programs) can be stored in different places.

Just an .exe

Usually, when we download software, we're downloading a setup or installation program. When that program runs, it copies files to proper places, adds shortcuts and menu items, and otherwise makes sure that the program you've installed can be easily run.

"Portable" programs need no setup. You just download them, perhaps extract them from a .zip file, and run them. The question is, where should they live? With no setup program to set up the "proper places", we decide where to put the file(s).

I'll use "incontrol.exe", from the GRC website108, to illustrate the examples below. It's a portable program comprised of a single, small .exe file. The concepts apply to almost all portable programs.

Where we store it depends on our plans for using it.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Just once? The Downloads folder is fine

If this is a one-time thing, you can leave it wherever you downloaded it. More often than not, that'll be in your Downloads folder.

A .exe file in Downloads folder.
An .exe file in the Downloads folder. Click for larger image. (Screenshot: askleo.com)

In the example above, I've downloaded "incontrol.exe" to my Downloads folder.

Navigate to that folder in Windows File Explorer, and double-click the .exe file to run it. That's it.

Alternatively, if this is a command-line utility or you just want to use the command prompt, "CD" to that folder, type the name of the .exe, and type Enter.

Downloads folder in Command Prompt.
Getting to the Downloads folder in Command Prompt. Click for larger image. (Screenshot: askleo.com)

In the example above, I've "CD"ed (Changed Directory) to the Downloads folder and run "DIR" to list the Directory contents showing incontrol.exe. Typing "incontrol.exe", or even just "incontrol", followed by Enter, will run the program.

Since this was a one-time thing, you can delete the .exe file when you're done with it, or archive it somewhere if you like.

More than once? Make a place

If it's a multiple-time thing — meaning you'll be running the program periodically — I recommend creating a folder.

Creating a new folder.
Creating a new folder for programs. Click for larger image. (Screenshot: askleo.com)

Above, in Windows File Explorer, I:

I then cut and pasted (AKA moved) the incontrol.exe file from the Downloads folder to this newly created folder.

To run the program from Windows File Explorer, I navigate to this folder and double-click on incontrol.exe. To run the program from the Command Prompt, I would CD to C:\Users\%username%\programs and then type "incontrol" followed by Enter. In either case, the actions are the same as before; we're just operating from our new Programs folder instead of the Downloads folder.

Why a new folder?

There are a couple of reasons I suggest you create a new folder for programs like this that you want to keep.

As we'll see next, that folder enables something convenient.

Tell Windows about your folder: the PATH

If you use Start-Run (or Windows Key+R) to open the Run dialog box, all you need to do is type in the name of your command for Windows to find and run it. For example, entering "notepad" and clicking on OK will cause Windows to locate notepad.exe and run it.

We can add our newly created folder to the list of places Windows will look. That list is called the PATH environment variable.

In Settings, search for PATH. Click on Edit the system environment variables when it appears. In the resulting dialog, click on the Environment Variables button near the bottom.

The Environment Variables dialog.
The Environment Variables dialog. Click for larger image. (Screenshot: askleo.com)

There are two sections:

There is a PATH109 variable in each section. This contains a list of folders Windows searches when looking for a program by name. Folders listed in the System PATH are checked first, followed by folders in the user PATH. As soon as the program being looked for is found, it's run, and the rest of the folders are ignored. "Notepad.exe", for example, typically lives in C:\Windows\System32, which is the first folder in the system PATH; thus, Windows doesn't need to look further.

We want to add our folder — C:\Users\%username%\programs — to our user path.

Double-click on the PATH item in the user section to open an editing interface. Click on New to add a new entry.

Editing the PATH.
Adding a new variable to the PATH. Click for larger image. (Screenshot: askleo.com)

Enter the path — C:\Users\%username%\programs — or, to maintain consistency with what's already there — %USERPROFILE%\programs. %USERPROFILE% is equivalent to C:\Users\%username%.

Click OK to save the change. Close the dialog with another OK.

Now typing "incontrol" in the Run dialog will cause Windows to locate incontrol.exe in the folder we've created and run it.

Running incontrol
Running incontrol. (Screenshot: askleo.com)

If you're in Command Prompt, you may need to close and reopen it to refresh its knowledge of the PATH. Once you do so, you can just type "incontrol" followed by Enter.

Incontrol via the command line.
Launching Incontrol via the command line. (Screenshot: askleo.com)

Using the PATH, Windows will locate incontrol.exe in our custom folder and run the program.

Using a program on multiple machines

Since we have created a folder to hold these portable programs, we can easily have them appear on all the machines we use. All it takes is a file synchronization tool like Dropbox or OneDrive.

I'll use OneDrive as my example.

First, instead of creating C:\Users\%username%\programs, put it in OneDrive, or C:\Users\%username%\OneDrive\programs. This will upload the contents to OneDrive.com, but more importantly, it will also automatically download the files to all the machines signed into the same OneDrive account.

Second, on each machine, instead of adding C:\Users\%username%\programs to your user PATH, add the OneDrive folder (C:\Users\%username%\OneDrive\programs) to it instead.

As I said, it doesn't have to be OneDrive. I use Dropbox for this. Any file synchronization program will do. The upshot is that placing your portable .exe file into your programs folder on one machine makes it available on all.

Another option is to place all of these files on a thumb drive you take from machine to machine. This is essentially the origin of the term portable as applied to these programs.

Avoid temptation

There's one approach I need to mention so you avoid it.

Some people download their .exe files into c:\Windows\System32. That's where most of Windows itself lives. It's a fairly convenient folder, and it's already in the PATH. Drop your .exe file there, and it'll just work...

...until it doesn't.

This is Windows territory, and there's no real guarantee that what you place there will stay there or will always run there. Much better to do things correctly from the start.

Podcast audio

Footnotes & References

112: It's a utility I discuss in How to Block the Windows 11 Upgrade and Stay on Windows 10.

113: It's actually case-insensitive, but using all uppercase is a useful way to remember that this is an environment variable.

Tip of the Day: Back Up Your Password Vault

2025-08-07 08:00:44

Backing up your password vault can save you an immense headache should you ever lose access to its contents.

1Password export dialog.
1Password export dialog. Click for larger image. (Screenshot: askleo.com)

I don't care which password vault you use, but if you use one (and you should), back it up.

Back it up now.

And then back it up regularly.

Ideally, back it up in a format that is not encrypted — like a plain text CSV file — that you can then secure in some other way. Why? I'll answer that with the story that prompted this tip.

I heard from an individual who could no longer access their LastPass vault. It's unclear what happened, but it had all the hallmarks of forgetting or losing the master password. Without your master password, you cannot get in. Period. Even LastPass cannot help you, as they designed their security such that they don't know your password, and they have no back door from which to retrieve it.

That is as it should be. But.

The contents of the vault, even though stored on their machine(s), were inaccessible. They lost it all and had to start over.

A simple backup to a CSV file securely stored elsewhere would have instantly and completely bypassed this disaster.

Back it up. Now.

What's the Difference Between Google Docs and Microsoft Office 365?

2025-08-07 08:00:00

Choosing between Google Docs and Microsoft 365? They look similar, but there are differences in cost, features, and how they work. I’ll help you decide which fits your needs best.

They're the same in some ways and different in others.

by

Choosing between Google Docs and Microsoft 365? They look similar, but there are differences in cost, features, and how they work. I'll help you decide which fits your needs best.
 a balance scale on a desk with the Microsoft 365 logo on one side, and the Google Docs logo on the other.
(Image: ChatGPT)

Next to email and content consumption like YouTube or social media, word processors, spreadsheets, and other applications may be the most common ways we use our computers. We might call them "business" apps, but they serve a wide variety of roles, ranging from personal to corporate.

Microsoft Office (AKA Office 365, Microsoft 365, and Microsoft 365 CoPilot) has long been an industry standard, but Google Docs is an equally compelling and popular toolset.

TL;DR:

Google Docs vs. Microsoft 365

Google Docs is free, simple, and works well online for everyday tasks and easy sharing. Microsoft 365 is more powerful, works offline, and is better for complex work, but costs money. The right choice depends on what you need and whether you're working alone or with others.

But first, names

Technically, Google Docs refers to the Google word-processing application called "Docs". This means Google Docs would compare to only Microsoft Word.

In practice, though, most people say "Google Docs" to refer to the full suite of applications available, which is what I'll be doing. I'll compare them to Microsoft 365 suite counterparts.

Speaking of Microsoft 365, it's gone by several names over the years.

Aside from typical version-to-version differences, they're all the same and refer to the Microsoft suite of productivity applications that includes Word, Excel, and more.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

What they are

Google Docs
Google Docs' main applications. (Screenshot: askleo.com)

Google Docs (docs.google.com) is the place to start exploring.

Microsoft 365 Apps
Microsoft 365 apps. (Screenshot: askleo.com)

Find Microsoft 365 at office.com.

Key differences

Here are some of the most notable differences.

Feature Google Docs Microsoft 365
Platform Web-based only Primarily desktop, web available
Offline Use Limited using browser extension Full-featured in desktop apps
Storage Google Drive PC and/or OneDrive
Collaboration Real-time sharing Real-time sharing using OneDrive
Cost Free (upgrades available) Subscription (desktop) / Free (web)
Features Basic to moderate Full-featured
Compatibility Best with Google Docs Best with Microsoft applications

In general, Google Docs has fewer features. Even so, the feature set is rich enough that many users may not miss anything.

Microsoft 365 is, in some ways, the gold standard. It includes an extensive set of features and tools. It's perfect for power users and business settings, and has become an industry standard across the corporate and educational world.

Collaboration and sharing

When it comes to collaboration and sharing, differences become more apparent.

Since Google Docs is web-native, it's well optimized for real-time collaboration and sharing. Multiple users can edit the same document at the same time. Users can see each other's edits as they are made, and even see caret and selection movement being made by others. Since documents are stored in Google Drive online, sharing is also easily handled by creating links to the online document with view/edit permissions as desired.

Microsoft 365 also supports real-time collaboration and sharing, but only if the documents are stored in OneDrive online. The older default behavior of storing and working on documents stored only on a PC doesn't allow for this.

Compatibility and file formats

Microsoft file formats, like Word's ".docx", Excel's ".xlsx", and others, have become the standard many businesses use. They are perhaps the most commonly exchanged file formats regardless of the tools being used.

Google Docs saves in its own format, but it can be exported to Microsoft 365 formats. It's important to realize that Google documents are never saved on your computer, even in Google Drive (which saves only a shortcut to the online file). To save the document on your computer, it must be exported from Google Docs.

Like many Microsoft 365 alternatives, exporting in Microsoft file formats does not guarantee complete compatibility. The exchange is relatively easy, since both will read and write both Microsoft and Open Document formats. However, when exchanging a file between Microsoft 365 and Google Docs users, there are usually differences in layout and formatting. The severity of the differences varies depending on the complexity of the documents involved.

Mobile

Both platforms offer mobile apps for your phone or tablet.

Google Docs works best, of course, in the Google Android ecosystem, though it's available on iOS as well. Microsoft apps are also available on both Android and iPhone. You'll find the apps in the respective platform app stores. In both cases, it's easier to start at the cloud storage app (Google Drive or OneDrive, respectively) and open the documents from there.

As always, features vary between free and paid accounts.

Platforms

Google Docs, being a web-only tool, works on almost any browser on any operating system. That means Google Docs is available on Windows, Mac, and Linux. All you need to do is fire up your web browser and visit the site.

The same is true for the free version of Microsoft 365 apps. Since they are also web-only, they should work well from any of those platforms. I say should because Microsoft, of course, prioritizes Windows and its Edge browser.

The downloadable and installable apps for Microsoft 365 are available for Windows and Mac OS. There are no Linux versions.

A note on backing up

As I mentioned above, Google documents exist only in the cloud, not on your PC. If you want to ensure your data is backed up beyond Google's servers, make sure to export the documents periodically to your PC.

Microsoft Office files are on your PC as long as:

Both cloud services have a Recycle Bin (Microsoft) or Trash (Google) folder from which recently deleted files can be recovered.

Microsoft's OneDrive also has a "large number of files changed" detection feature intended to provide additional protection from large-scale accidental deletions or ransomware. This feature requires a paid subscription of some sort.

Cost

Google Docs

Microsoft 365

So which should you use?

First, if you're working with others in an organization, I strongly suggest you use whatever that organization uses to avoid compatibility issues and prevent confusion.

That being said, use Google Docs if you:

Use Microsoft 365 if you:

Podcast audio

Footnotes & References

114: OK, it was clear. The reason was marketing.

Tip of the Day: the Free-Space Wiper You Already Have

2025-08-06 08:00:35

You don't need to download additional tools to wipe the free space on your hard drive.

(Animation: askleo.com)

We use free-space wiping utilities to make the deleted files unrecoverable. They work by overwriting all the free space on a drive so no remnants of previously existing files remain.

In the past, we've turned to CCleaner (or Secure Delete, a utility you can download from Microsoft) to do this job.

It turns out you don't need either. The cipher utility — a command-line tool included in Windows to manage file and folder encryption — has a free-space wipe function.

In Windows command prompt, make the drive you want to wipe the "current" drive (by typing the drive letter, colon and ENTER), and then enter the cipher command.

C:
cipher /W:.

This will take time — possibly a long time, depending on the amount of free space you have. The third-party utilities mentioned above might be faster, but Windows already has the cipher tool, so there's nothing to download or install.

Faking Reality: How AI Images Are Being Used to Scam You

2025-08-06 08:00:23

Scammers take advantage of AI's ability to create fake photos that look very real. From phony images of your car to completely made-up situations, it’s easier than ever to be fooled. Learn how they're made, why they’re dangerous, and what you need to do to protect yourself.

New tools mean new threats.

by

Scammers take advantage of AI's ability to create fake photos that look very real. From phony images of your car to completely made-up situations, it's easier than ever to be fooled. Learn how they're made, why they're dangerous, and what you need to do to protect yourself.
AI generated image of a blue 2025 Rivian R1S, Washington license plate "N7LEO" parked in front of "The Golden Banana" strip club at night.
(Image: ChatGPT)

The image above is not my car.

It looks like my car. The color is close, the model is correct, and the license plate is mine.111 But I've never parked outside The Golden Banana strip club. I have no idea if such a strip club even exists.

That the AI-generated photo looks so real, however, is cause for concern. Deep concern.

TL;DR:

Fake photos to scam you

AI can create fake photos that look real, and scammers are ready to use this to trick you. If an image shows something shocking or too perfect, think twice. It might be a fake made to fool you — perhaps even specifically you. You can't believe everything you see. Always be skeptical.

Son of Photoshop

I think we've all come to be slightly suspicious of photos because of the rise of Adobe Photoshop and similar tools. In the hands of the right person, Photoshop can generate amazing things, ranging from altering existing photos to creating "photos" of things and situations that never happened. With talent and time, a Photoshop artist can create just about anything.

Emphasis, of course, on both talent and time.

AI removes both of those requirements. The image above was created by asking ChatGPT:

Please create a 16:9 photorealistic image of a blue 2025 Rivian R1S, Washington license plate "N7LEO" parked in front of "The Golden Banana" strip club at night.

Two minutes later, the image above appeared. It's plausible enough to pass for real to the casual observer.

Scammers know this.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Example scam

A scam posted on Reddit's r/Scams subredit brought this to my attention.

The original poster (or "OP") asked how the scammer was able to identify his license plate to use in the photo. It turns out that an assortment of information, ranging from vehicle type and characteristics to the name of the owner, is often available. It might be publicly available through shady services, or it might be illegally available to hackers knowing where to look (perhaps on the dark web).

But looking up a license plate associated with a specific person is apparently not that hard for those so criminally inclined.

And as we've seen, using that information to craft a fake yet plausible image to use in an extortion scam takes all of a couple of minutes.

It's about more than your car or your license plate

Using your car's information to create a realistic photo to attempt to scam you is only an example. Scammers don't have to extort you personally; perhaps they use fake images to sway public opinion. There's a range of uses:

It's now trivial for anyone to create images that look real and are completely fake. Scammers, hucksters, and others with less than altruistic intentions are more than happy to use this new technology to fool us.

And fool us, they do, especially if the fake image is of something we want to see or confirms our preconceived ideas.

How to avoid getting fooled

It all boils down to paying attention, and that's very difficult in today's fast-paced, attention-grabbing world.

For example, consider the photo above. There are signs it's fake. The most obvious is that the shadows are wrong: there should be a shadow to the right of the car caused by the bright strip club sign. A close look at the license plate shows it's "fuzzier", for lack of a better term, than the quality of the photo would imply it should be.

Of course, if you can compare it to reality, it becomes even more obvious: the vehicle color is off, and my roof rack is missing.

Yes, those all seem like small, even subtle clues, but they're easy to overlook, and scammers are counting on you to do exactly that. And yet they're exactly the kinds of things you should look for the moment there's any question at all.

And these days there should probably always be a question.

Podcast audio

Footnotes & References

115: A Washington State "vanity" license plate with my ham (also known as amateur) radio call sign: N7LEO.

Tip of the Day: Wi-Fi Speed Is Often Irrelevant

2025-08-05 08:00:08

Marketing Wi-Fi speed when selling internet connectivity is largely misleading.

Network Connections
Wi-Fi and internet connections are different. Click for larger image. (Image: askleo.com)

This is a combination tip and pet peeve.

Internet service providers (ISPs) often claim to offer the fastest Wi-Fi. The problem is that your Wi-Fi speed is completely separate from your internet service. They are two different things.

What I want from my ISP is fast internet service. I want the connection they provide from my location to the internet to be as fast as possible (within the constraints of how much I'm willing to pay). That's what I'm paying them for: my internet connection.

There's no Wi-Fi involved in that equation. None.

ISPs often provide equipment that includes Wi-Fi capability. That's convenient and nice and all that, but it's separate from your internet connection. Wi-Fi is used to connect your computer to the box the ISP provides, and that's all. The connection from there to the internet is separate and different technology.

Here's the kicker: the speed of your internet connection and the speed of your Wi-Fi are unrelated. What's more, if the speed of your internet connection is slower than typical Wi-Fi speeds — which is common — the speed of your Wi-Fi is irrelevant as you access the internet. It's your internet connection that's the bottleneck.

Bonus tip: You get your internet from your ISP, but you can always provide your own Wi-Fi connectivity.

Understanding the difference is important when ISPs aggressively market their services in what is, to me, a misleading way.

Do I Need a New Email Address if Mine Is Involved in a Breach?

2025-08-04 08:00:43

Was your email exposed in a data breach? Don’t rush to get a new address. I'll discuss what really matters, like strong passwords, staying alert, and simple steps to keep your account secure.

Not usually, no.

by

Was your email exposed in a data breach? Don't rush to get a new address. I'll discuss what really matters, like strong passwords, staying alert, and simple steps to keep your account secure.
A hacker type looking at you with suspicion.
(Image: depositphotos.com)
Question: My email address was in one of the breaches we keep hearing about. Is that address still safe to use? Should I get a new email address?

As long as you can still log in to your account, there's no need to get a new address just because your email address was included in a breach.

There are steps you should take, but getting a new account is not one of them.

If you can't log in to your email account anymore, though, you may have no other choice.

TL;DR:

If your email's in a breach

If your email address shows up in a breach, you rarely need a new address. Just change your password for the site that was hacked, and turn on two-factor authorization if you can. As long as you still have access, you're fine. Stay alert, but don't panic.

If you can't log in

If you can't log in to your email account and you've pursued all the approaches to recover access, it's not your account anymore. Email Hacked? 7 Things You Need to Do NOW covers the steps you need to take.

Whether or not it's related to any reported breach doesn't matter. Regardless of how it happened, you've lost access to your account.

When that happens, you have no other option; you'll need to get a new account and let your contacts know you have a new email address.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

If you know which service was breached

If you learn that your email address is part of a breach, and you know which service was breached, the most important step to take is simple.

Change your password with that service.

Change it to a long, strong password you don't use anywhere else.

It's the bare minimum you need to do, but many times, it's all you need to do. You don't need a new email account or address because of it.

If you don't know which service was breached

This is a more difficult scenario:

When this happens, I do two things.

  1. I change my email password in case it was my email provider that was breached. This is probably unnecessary and exceptionally rare, but I'd rather be safe.
  2. I start watching for odd behavior on all other accounts that the email address is associated with (either as login ID or as primary/alternate email).

That last point is frustratingly vague, but it's the best we can do.

And, honestly, it's what we should do whether our email addresses show up in breaches or not.

Additional security

I generally don't panic when news of yet another breach appears because I apply strong security to all my accounts.

I strongly recommend you do the same, starting with your email account.

But there's no need to get a new email address because of a breach.

Podcast audio

Tip of the Day: Turn It On and Walk Away for a While

2025-08-04 08:00:42

Your computer needs to do a lot when you turn it on.

Please Wait
(Screenshot: askleo.com)

A common complaint is that a machine is dreadfully slow to boot up after it's turned on.

A lot happens when you turn on and sign in to your machine. Several programs all attempt to do their jobs. Your anti-malware tools might run a scan. Windows Update might download and install the latest updates. The content indexing service might decide it's time to update its database. Cloud tools like Dropbox, OneDrive, or others might download updates from online servers or upload files that have not yet been copied there.

You can spend a lot of energy trying to control all of this, but not all of it is controllable. A simpler solution is to get in the habit of turning on your machine before you need to work on it. Sign in and walk away for a while. Give it time to do what it needs to do. Hopefully, when you return, it'll be peacefully idling and ready to go to work.

When you leave your machine running 24 hours a day, as I do, this is rarely a problem. However, I still face it. Besides my computers, I have several virtual machines; that's how I can run other versions of Windows without a dedicated machine for each. But those don't run continuously. I have to remember to turn them on and let them update if what I'm about to do requires that they operate speedily.

How to Protect Your Cloud Storage and Backups from Ransomware

2025-08-02 08:00:22

Do you worry that ransomware might lock up more than your files? It can. I'll show you how to better protect your cloud storage and backups using tools like Macrium Reflect, OneDrive, and Dropbox. Even if malware strikes, you’ve got a way to recover.

Extra-destructive malware might call for extra-strong protection.

by

Do you worry that ransomware might lock up more than your files? It can. I'll show you how to better protect your cloud storage and backups using tools like Macrium Reflect, OneDrive, and Dropbox. Even if malware strikes, you've got a way to recover.
Ransomware
(image: canva.com)

In a previous article, I wrote about how ransomware is nothing special when it comes to prevention — it's just malware. The same steps you take to protect yourself against malware are the steps that protect you from ransomware.

Because of ransomware's devastating consequences, however, many people want additional assurance they're protected even if they accidentally allow such malware to reach their machine. In particular, two questions come up often:

There are approaches to specifically ease those concerns.

TL;DR:

Ransomware protection

Ransomware can lock up your backups as well as your files. Tools like Macrium Reflect and features in OneDrive or Dropbox won't stop an attack, but they can save your data after one. Stay alert and back up smart.

Protecting your backups

I'm a big believer in regular, automated image backups. Automation requires a destination for the backups — typically an external drive — that is always connected and ready.

The concern is that ransomware might encrypt files on your backup devices as it encrypts your data. This makes the typical ransomware protection advice — just restore a recent backup — impossible.

Macrium Reflect has a feature called "Image Guardian" in its paid version to protect against just such a situation.

Macrium Reflect Image Guardian
Macrium Reflect's Image Guardian feature. (Screenshot: askleo.com)

The concept is simple: only authorized applications — Macrium Reflect itself and a couple of very specific exceptions — are allowed to do anything to the backup images.

Even attempting to delete such an image in Windows File Explorer will generate an error and a notification.

Macrium Image Guardian in Action
Macrium Image Guardian in action. (Screenshot: askleo.com)

This blocks your backup images from unauthorized modification by malware. (You can delete the file from within Reflect, of course.)

I appreciate this feature because it allows you to safely leave your external drive connected (and your backups running automatically) without having to remember to reconnect the drive.112

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Protecting your cloud storage

Cloud storage and synchronization services automatically back up the files you place in specific folders on your computer to the cloud. For example, if you regularly work in a OneDrive folder, those files are automatically copied to OneDrive.com online each time they change.

This is an effective form of near-real-time backup. Every time you save the file, it's copied to the cloud, and possibly also to any other computers connected to the same OneDrive account.

The concern here is that ransomware comes along and encrypts your files. Because they've changed, those (now encrypted) files are automatically uploaded to the cloud, effectively overwriting your backup.

Both OneDrive and Dropbox have had a form of file history for some time.113 What this means is that if a file has been changed or deleted, you can go to the website and restore the file to a previous version before the change was made. Both also have recycle bins.

This can be burdensome, however, if ransomware encrypts hundreds or thousands of your files.

OneDrive allows you to restore your entire collection of files to a state prior to a given date.

Restore your OneDrive.
Restore your OneDrive. Click for larger image. (Screenshot: askleo.com)

Was your machine infected by ransomware on Tuesday? After you've cleaned your machine of the malware, reset your OneDrive to the state it was in on Monday.114

Dropbox includes a similar feature called Rewind in its paid plans.

It's interesting to note that both OneDrive and Dropbox refer to things "going wrong" in their messages. While lots of different things can go wrong, the most likely cause for these features' appearance and popularity is the threat of ransomware.

Podcast audio

Footnotes & References

116: Paid versions of EaseUS Todo now also include a similar feature called Backup Protection.

117: Paid versions of these services may be required to enable these features. The product offerings do change from time to time, so check to make sure.

118: How far back you can reset to depends on your plan. My advice is not to delay.

Too Old for Tech? Nonsense.

2025-08-01 08:00:25

Think you're too old? You're not. It's not your age; it's a plethora of other things, ranging from society's expectations to bad software design, waging war on your self-confidence. Let me show you why you’re more capable than you think.

Your age isn't what's holding you back. It's something else.

by

Think you're too old? You're not. It's not your age; it's a plethora of other things, ranging from society's expectations to bad software design, waging war on your self-confidence. Let me show you why you're more capable than you think.
an older gentleman teacher holding and pointing to a mobile phone in a classroom in front of a middle aged group of students
This could be you. (Image: ChatGPT)

There's a theme across many questions I get. It has nothing to do with the question; it has to do with the person asking the question.

That theme is age.

More specifically, the person indicates that because of their age, they struggle with technology.

That's. Just. Wrong. And it makes me sad.

TL;DR:

Technology and aging

Saying "I'm too old for tech" is just holding yourself back. It's not your age; it's self-doubt, bad design, or lack of interest. None of that means you can't learn. Please don't let age be your excuse. Keep learning. Keep trying.

Age in society

The phrase I hear often is "I'm too old."

In a sense, I get it.

Many cultures are obsessed with youth. We get the message that we should delay signs of aging for as long as possible. The implication is that getting older is a process of slow decay and growing inability. Our relationship with technology seems to be a particularly common stereotype.

You are not a stereotype.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Age and technology

"I'm too old" is usually followed by "to understand this" or something similar. The feeling is that because you've reached a certain age, you're now incapable.

Pardon my language, but bullsh*t.

More often than not, you are very capable of "getting it" if you give yourself a chance. It's only your lack of self-confidence that's in the way. When that happens, it becomes a self-fulfilling belief. You're "too old to get it" only because you believe you're too old to get it.

Now, other reasons may be making things more difficult for you.

None of that is about age. In fact, those reasons and more — all legitimate — can apply at any age.

But age itself is not a reason. If anything, it's an excuse.

Tech can be frustrating for any age

I often see people blame age when something else is at play.

None of these issues is age-specific. All of them affect users of any age. It's the issue you're facing, not the age at which you're facing it, that matters.

Aging is real

I won't claim that aging isn't a process of change. Our mental and physical processes slow or change as we get older. But none of this is guaranteed to occur just because you've reached some threshold number of years.

If you're not interested, you're not interested, not old. If you're being forced to use a poorly designed website for some service, that's not because you're old; it's because a) you're being forced to do something you don't want to do, and b) the website design sucks. If written explanations are full of incomprehensible gobbledygook, it's incomprehensible gobbledygook, not your age, that's the problem.

Your age alone is often irrelevant. It's your priorities and capabilities that matter, and that's true at any age.

Don't make your age a limiting belief

"I'm too old" is giving up without even trying.

This frustrates the heck out of me. I don't care what age you are; I can point to others your age and older who are not only quite tech capable, but even thriving. My favorite example is the 95-year-old gentleman teaching Android and mobile phone use at the local senior center. Older than everyone in the room, his age doesn't stop him. It is irrelevant.

Your age should not hold you back.

But Leo....

A common response (though less so as I age myself) is "Just you wait, Leo! When you get older, you'll see! It really is all about age!"

I'm still waiting. I'll turn 68 in a couple of months. I'm older than many of the people who already claim they're too old.

I expect to be doing this and playing with technology for years to come.

Use it or lose it

It's well known that muscles atrophy with disuse. Exercise and movement are important to stay fit and healthy and mobile for as long as possible.

The same is true here. It's one reason I love my career: there will always be something to keep my brain busy and "exercising". It's an important part of my mental health and my efforts to keep my brain as sharp as I can for as long as I can.

Don't let technology, and especially not your age, intimidate you.

Podcast audio

Romance Scams: When Loneliness Makes Us Vulnerable

2025-07-31 08:00:42

Loneliness can leave us vulnerable, and scammers know it. I'll cover how romance scams work, the tactics scammers use to build trust and steal thousands, and the red flags to watch for, both for yourself and your loved ones. If you think it can't happen to you, think again.

Scammers leverage an epidemic for evil.

by

Loneliness can leave us vulnerable, and scammers know it. I'll cover how romance scams work, the tactics scammers use to build trust and steal thousands, and the red flags to watch for, both for yourself and your loved ones. If you think it can't happen to you, think again.
a desktop computer with a broken heart on its display
(Image: Gemini)

Loneliness is an epidemic. The COVID pandemic made it worse, but it was already on track.

Besides the negative health impacts, there's a little-discussed yet important side effect: loneliness makes us more vulnerable to being scammed. Scammers are busily at work exploiting this vulnerability — to the tune of $1.3 billion in 2024.

Let's review how these scams work and how to keep yourself and your loved ones safe.

TL;DR:

Romance scams

Romance scams trick lonely people by pretending to care, slowly gaining more and more trust, and then asking for money. Scammers build fake relationships online, never meeting in person. They use guilt, lies, and even AI tools to scam you out of your money. If someone you've never met asks for money, stop. Talk to someone you already know and trust first.

It's a long con

Romance scams are a form of pig butchering: a "long con" (long confidence) game or scam. This means that the scam takes place over weeks, months, or even longer. The scammers use this time to build trust, after which they finally scam the victim, often multiple times. Once the well runs dry, the scammer disappears.

It's common for romance scams to result in thousands of lost dollars.

It starts by targeting a vulnerable individual looking for connection.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

The progression of the scam

These scams have a common sequence.

Initial contact

After creating fake personas and fake online profiles, the scammer reaches out to a target victim. It might be via a supposedly misdirected text message, an email harvested from a public forum or public records, or many other ways. The goal is to engage the person in innocent, innocuous conversation; there's no hint of malicious intent.

The target may never learn how the scammer found them. It could be targeted, or it could be random.

Depending on how they initially connect, most scammers suggest moving the conversation to somewhere more private — perhaps one of the more secure chat services. This allows them to avoid detection by more public or monitored communication methods.

Building trust

Over days and weeks, the scammer maintains frequent contact. Eventually, the conversations turn affectionate. Sometimes they employ a technique called "love bombing", sharing excessive and extreme compliments and declarations of affection.

To deepen the connection, the scammer may also do some homework and pretend to share values, hobbies, and experiences that they've discovered apply to their target (whether or not that's true).

When people are lonely to begin with, these attempts to build trust and a relationship — even without ever having met — are more likely to succeed. They're more likely to fall for the attention they're getting and the connection they're hungry for.

Avoiding meeting

At one point or another, the target is likely to suggest that a real-life meeting occur. Either of two things will happen.

The scammer will respond with a variety of excuses why they can't meet right now. Perhaps they're working abroad, in the military, or dealing with other random issues that prevent an in-person meeting.

Or they'll transition right to the scam and ask or hint at the need for money to help make the meeting happen. They'll say they're unable to pay for something required to meet — a passport, a visa, a plane ticket, or even a bribe. More on that below.

Emotional manipulation

What distinguishes romance scams from other scams is the type of influence the scammers choose to exploit. While many scams are based on fear (fake IRS scams, technology misdirection, and so on), romance scams target the heart.

Scammers work to make the relationship as deep as possible. Some even propose marriage. Creating future plans deepens the sense of commitment between the target and the scammer.

And if the target balks anywhere along the way? Then the scammer applies guilt to imply that the target doesn't care for them as much as they care for the target; otherwise, the target would engage with them more deeply (i.e., give them the money they're asking for).

It's always about money

Asking to meet is an easy way for the scammer to turn to the topic of cash, but there are many other techniques. Almost all involve starting small and scaling up and up and up.

The scammer might ask for money, citing some urgent scenario such as an unexpected medical bill, travel expense, or customs fee. Often, they don't ask directly; they just explain the need. They count on the target being a generous soul, particularly now that they're in this trusting, albeit long-distance, relationship. Some targets offer to pay without being asked.

The first request usually isn't large. If money is sent, the requests become larger and more frequent. Urgency, pressure, and emotional blackmail often escalate along with the amount.

End game

The scammer will not stop until the target does. They'll continue asking for and extracting more and more money as long as the target supplies it. This can go on for months or even years. Every time the target expresses concern, the scammer applies increasing amounts of emotional blackmail — something lonely people are particularly susceptible to.

Eventually, the target stops sending money (sometimes when they've run out of it), and the scammer vanishes, leaving emotional and financial devastation behind.

Red flags

Particularly when we're vulnerable, and particularly when emotions, time, and effort have been invested, it's hard to admit that we've fallen for something.

Here are some red flags that should always raise concern.

Red flags for loved ones

One of the saddest aspects of romance scams is when we see it happening to others, especially family members, before they see it themselves.

Some things to watch for:

If you notice several of these signs, try as best you can to discuss your concerns with your loved one and encourage them to pause communication, verify the person's identity, and seek advice from truly trusted sources.

Just one example

Via the AARP's excellent Perfect Scam podcast: Romance Scammer Poses as Keanu Reeves Using AI

AI has entered the chat... literally

A relatively new twist in the romance scam is the use of AI. There are several ways AI can make the scams more believable and successful.

The bottom line is that you may not be able to believe what you read, what you hear, or what you see.

Podcast audio

Footnotes & References

119: It happens. Reverse image search is an excellent tool to try.

Tip of the Day: Have More Than One Recovery Method

2025-07-31 08:00:09

Stack the deck in favor of being able to recover your account in the future.

Some Gmail account recovery options.
Some Gmail account recovery options. Click for larger image. (Screenshot: askleo.com)

The number one topics I deal with on Ask Leo! are account security and account recovery. All too often, a compromised account or an account for which the password was lost is lost forever.

One way this happens is when the recovery method set up for the account becomes invalid. Perhaps you set up a recovery phone that you no longer have access to or an email address that's no longer valid. Come recovery time, you have no way of proving you are the rightful owner.

Always keep recovery information up to date. However, another technique is to make sure you configure multiple recovery alternatives for accounts that support it. The example above shows a Google account with three different recovery techniques: email, phone, and backup codes. As long as one of those works, you should be able to recover the account if you need to.

And then be sure to update the techniques that have fallen out of date.

Changes for Ask Leo!

2025-07-30 08:00:27

Changes are coming to Ask Leo!, including the removal of outside ads. I’ll explain why this (very) scary step is necessary, how search engines and AI are changing the game, what it means for the future of the site, and how you can help.

The world changes, and so do I.

by

Changes are coming to Ask Leo!, including the removal of outside ads. I'll explain why this (very) scary step is necessary, how search engines and AI are changing the game, what it means for the future of the site, and how you can help.
Ask Leo! - Since 2003
(Image: askleo.com)

By the time you read this, I'll (hopefully) have implemented a couple of technological changes at Ask Leo!.

The big one?

No outside ads.

And that scares the pants off of me. But it's time.

TL;DR:

Advertising and Ask Leo!

Ads are gone from Ask Leo! because they don't work like they used to. Fewer people visit the site, and search engines now show answers without sending folks to my pages. It's very risky, but it's time for a change. You can help by signing up for the newsletter or becoming a patron.

Website advertising is broken

You know what I'm talking about before I even say it: websites are plastered with ads that all too often obscure the content you went to the website to see.

And, yes, Ask Leo! has been guilty of this in the past.

The worst offenders, of course, entice you with clickbait headlines to get you to click. Hopefully, this is something I've avoided.

But it paid the bills. Website advertising allowed Ask Leo! to come into existence almost 22 years ago and has kept it a viable business ever since.

But the industry is changing.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Search engine optimization is broken

The other part of the equation that has allowed Ask Leo! to operate is what's called SEO, or search engine optimization.

In short, by writing quality content and structuring it in a way that was easy for the search engine(s) (OK, mostly Google) to understand116, Ask Leo! articles appeared in results when people searched for an answer to a question. They'd come to the site and hopefully get the answer they were looking for. The ads displayed alongside that answer were the "cost" that paid for me and my staff to do what we do.

Then Google started summarizing answers directly in search results. Rather than clicking through to the websites that ultimately provided the information, people did not need to go further: the answer was right there. This pre-dates AI, but AI, and the use of AI in lieu of traditional search, has exacerbated this.

It's a great user experience — one fewer click for your answer! — but it removes the primary mechanism that sites like Ask Leo! use to pay the bills. If there are no visitors to the site (other than the Google or AI bots), there's no ad revenue. It's come to be referred to as the "traffic apocalypse".

Traffic Trend for the last five years.
Ask Leo! traffic trends for the last five years. Click for larger image. (Screenshot: askleo.com)

Fortunately, YouTube isn't as far down this path and remains viable. But traffic on written articles on websites is clearly declining.

So, if site ads aren't working and are on the decline, why have them at all?

Removing ads

By the time you read this, I'll have removed the advertising network used by Ask Leo!. Even if you visit the site without being signed in, you won't see a wall of ads.

This is a huge risk. While advertising revenue is down significantly, it's not zero. I'm hoping we'll make up for it in other ways, but it's scary. Advertising saved Ask Leo! from shutting down completely around five years ago, so it's not an easy decision to walk away from it today.

But for now, no ads (other than a few ads for patronage or my own products). I may opt to accept sponsorships with simple, single box ads. Should revenue not meet what's needed to run the site, I may rejoin a less aggressive ad network. (Of course, just as before, patrons will not see any ads no matter what I elect to do.)

But the oh-so-common and oh-so-in-your-face wall of ads should be gone for good.

Other changes

While I'm at it, I'm streamlining the Confident Computing newsletter a little to make it easier to put together. If you're a subscriber, you may have already seen that reflected in the most recent issue. Nothing drastic, just a little simpler.

Once the dust settles a little, I'll embark on my next course, tentatively titled Linux Without Tears.

I'm also hoping to increase the rate at which I produce ebooks. That's an idea in progress, though.

As I come up with ideas to make patronage more valuable, you may see some changes there as well.

Podcast audio

Footnotes & References

120: It's more than just "structuring it", of course. There's a lot at play.

Tip of the Day: Avoid Secret Questions

2025-07-30 08:00:17

These days, the answers to secret questions are far from secret.

Security Tip

(Animation: askleo.com)

For decades, "secret questions" or "security questions" formed a standard account-recovery technique. When you created the account, you'd set them up (mother's maiden name? favorite teacher?), and later, when (not if) you forgot your password, you'd answer them again and be allowed back in.

The problem is that they're just not that secret or secure anymore. Given how much of ourselves we share online these days, the answers are often available to someone willing to put in the effort to search for them. Even if we don't post the information ourselves, it can often be divined by the information shared by our friends and family.

If you have the option to use something else — anything else, like an alternate email address, a phone number, anything — use one of those alternatives instead. Avoid secret questions unless they're the only option available.

Choose something else if you can. (And if you must use them, check out How to Choose Good Security Questions.)

Tip of the Day: Scan Those Old Photos

2025-07-29 07:00:01

Scan 'em and back 'em up.

The Notenbooms, circa 1960
The Notenbooms circa 1960. (Image: askleo.com)

It's no secret that I'm a huge fan of going digital.

It's also no secret that I'm a huge proponent of backing up.

To me, they're two sides of the same coin: go digital so you can back up, and back up everything digital.

Photographs are some of our most prized and irreplaceable possessions, yet often we have only one copy117. Of course, it's not backed up if we have only one. If that photograph disappears, it's gone forever.

Scan it. Carefully take a digital photograph of it if you must, but make a digital copy of the physical photo, and of course, back that image up.

If the hard copy original is ever lost or destroyed, you'll be glad you did.

Footnotes & References

121: Because it's the only copy of a photo in existence. It's not a duplicate of a photo kept elsewhere.

And yes, that's me — "Little Leo" — in the middle.

Who Polices Misleading Advertising?

2025-07-28 08:00:33

Online advertising is the equivalent to the wild west. Advertisers use every technique they can get away with to get attention and sales. I'll review what you can do about it and what steps I'm taking as a website owner.

No one, really, unless it's horrifically bad.

by

Online advertising is the equivalent to the wild west. Advertisers use every technique they can get away with to get attention and sales. I'll review what you can do about it and what steps I'm taking as a website owner.
A questionable looking user-car salesman type gesturing towards a "Free Download" button.
(Image: istockphoto.com, askleo.com)
Question: Leo, thanks for your site. Which agency controls or watches the advertisements of all the links that are posted? The big complaint that I have is the sites to clean your PC, which say "Free", and at the end, you have to pay for activation. Should it be a requirement that a big red note says, "This is not a free site"? I fully realize that there's no free lunch, but these lead you to sites and cause you to waste time.

The practical answer to this specific question is: no one. There's not an agency in charge of or actively policing online advertising.

In the United States, there are state Attorneys General, but practically speaking, they're rarely going to step in and help unless it's something really serious and widespread.

Besides, most of these ads have some very slippery wording that keeps them out of trouble.

TL;DR:

Misleading advertising

No official agency watches online ads closely unless they're really bad. Ads can trick you with sneaky wording like free download that doesn't mean what you think. Unfortunately, it comes back to you. Be careful, question everything, and never trust something just because it says it's free.

Weasel words

What I call "weasel words" are words that can be interpreted to mean more than one thing or nothing at all.

The phrase free download is an example. All free download really might mean is that the download is free; you pay nothing at all to download the file.

The advertising is counting on a misunderstanding. You might think free download implies that the program you just downloaded is itself free — but that's not what they said. It meant that the act of downloading that file was free. What happens next may or may not be free. You could download it to your computer without paying anything. Using or running it? That's another matter.

Other examples are things like FREE System Scan or FREE system cleanup analysis (often with the same emphasis on the word free). Again, you can download the program for free. You can even run the program for free, and it will scan and analyze your computer for free. But if you read the offer carefully, it does not offer to fix anything for free.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Sadly, weasel words work

I would love for these advertisements to be clearer.

The examples above are at least honest, albeit with misdirection. And you know why the misdirection is there? Because it works.

If the ads were as clear as we want, then not as many would click, and not as many people would buy.

And enough people do get duped into paying at the end that it makes it worthwhile for these companies to continue to do what they do.

Download

One scam that really bugs me is the misleading download button.

These are ads (again, to be clear, these are paid advertisements) that look like download buttons. The wording is typically vague enough that it feels like it could be a legitimate download for something related to the site the advertisement appears on.

Yet when you click on them, either you get taken to some website trying to sell you something, or you download something you don't want that then installs and is malicious, costly, or both.

Shoot the messenger

One of the underappreciated facts of online advertising is that the websites you visit are rarely in control of the advertisements that appear there. The website owner signs up with an advertising network and trusts it to display ads appropriate to that website's audience.

Pragmatically, there's just no way a website owner could vet all the thousands of different advertisers that might be displayed, particularly given that the ads differ dramatically from one visitor to the next and are based on where the visitor is located.

Some advertising networks are better at filtering out the noise than others. But that noise works: the network and the website make more money when buckets of misleading ads are displayed.

Recourse?

Unfortunately, there is no practical recourse for individuals to respond to these ads other than being skeptical and vigilant.

You can complain to various agencies (like I said, your state's Attorney General might apply in the US), but my belief is that unless it's a horrific lie, they'll slip through on the technicality that they were, in fact, telling the truth: you just misunderstood. Even when it is a horrific lie, most of the watchdog agencies are so overwhelmed that it would have to affect a lot of people over a long period of time to get their attention.

You can complain to the website owner. They may or may not have the resources to act, which usually involves complaining to the advertising network they use. That network then may or may not care to take action.

What I'm doing

I'm dropping my current advertising network at the end of my contract.

My reasons for doing so are more complex than just misleading ads (website advertising is in a state of disarray right now), but it's time to flip the switch.

I'll be switching to one or more of:

(Of course, patrons of Ask Leo! see no ads anyway, when they are signed in.)

By walking away from my advertising network, I'm walking away from a chunk of advertising revenue that helps keep Ask Leo! viable.

And that's the conundrum every website owner faces.

Podcast audio

Tip of the Day: Use Fewer Browser Extensions

2025-07-28 08:00:14

Browser extensions are powerful, but they add risk and can impact performance and functionality.

Extensions in Chrome
Browser extensions in Chrome. Click for larger image. (Screenshot: askleo.com)

Browser extensions are wonderful things. They can add features and functionality that make little sense to incorporate directly into the browser, aren't needed by the vast majority of browser users, or enable functionality in other products.

The downside is that each extension adds risk and potentially affects performance.

We've all heard of malicious extensions. They might silently use your CPU to mine digital currency or actively intercept and steal your personal or sensitive information.

Even well-intentioned extensions can adversely affect performance or browser behavior. One of the first reactions to "My browser is painfully slow" or "This site doesn't work" is almost always "Try it with all extensions disabled." It's not uncommon for that to resolve the issue.

Rule of thumb: think twice about every browser extension you add. Use extensions when they're valuable, but avoid them when you're just not sure.

Tip of the Day: Pay Attention to the Entire Error Message

2025-07-25 08:00:43

Error message boxes include titles that are important to pay attention to.

Message boxes have three distinct areas:

The error message is, of course, the most important part, but it's not the only part. The title bar — the bar of information across the top of the message box — frequently has additional important and relevant information. It's easy to overlook, but it's important not to do so.

The confusion comes from the fact that programs use the title bar inconsistently. Some include the name of the program generating the error (the title bar's intended use, as I understand it). Some include the beginning of the error message. Some include the error message in different words (as in the example above). Some include additional information about the error.

It's a confusing mess, but what isn't confusing is that you shouldn't overlook the information, whatever and wherever it may be.

It's often a clue that helps bring clarity — and occasionally even answers — to whatever the message box is trying to tell you.

Why Disabling Remote Access Doesn't, and What to Do Instead

2025-07-25 08:00:40

Turning off remote access in Windows might feel safe, but it doesn’t block the kind of access scammers use. I’ll show you why those settings aren’t enough, how remote scams really work, and what simple habits will actually keep your computer secure.

It disables one, not all.

by

Turning off remote access in Windows might feel safe, but it doesn't block the kind of access scammers use. I'll show you why those settings aren't enough, how remote scams really work, and what simple habits will actually keep your computer secure.
A computer screen displaying "Remote Access"?
(Image: ChatGPT)
Question: Among the very first few things I did when our family first got our most recent computer was to disable remote access entirely. I no longer remember how I managed to do this, but that's just as well because I wouldn't even dream of re-enabling it!

That's a comment I received from a reader relating to the pernicious tech support scam, where scammers call you, say they've detected problems originating from your computer, and offer to fix it for you — perhaps even for free — if you just give them access to your computer.

Disabling remote access in Windows does not disable this kind of remote access. It does nothing to prevent remote access scams.

I'll review the setting in Windows and compare it to the remote access more commonly used by scammers.

And, of course, I'll review what you need to do to stay safe. There's a good chance it's something you're doing already.

TL;DR:

Disabling remote access

Turning off remote access in Windows doesn't stop scammers because that's not the tool they use. They trick you into using tools that ignore those settings. The real fix? Don't give access to anyone you don't know. Be skeptical. Only use remote access tools with people you absolutely trust.

Windows Remote Desktop

As outlined in "What's the Difference Between Remote Desktop and Remote Assistance?", Windows Home editions don't support being accessed remotely by Remote Desktop, so this section doesn't apply to computers running Home edition.

In other editions of Windows, search for "remote access" or "remote desktop settings" and click on the latter when it appears.

Remote Desktop option in Windows 10
Remote Desktop option in Windows. (Screenshot: askleo.com)

Remote Desktop allows someone to remotely use your computer as if they were sitting in front of it.

It works most seamlessly on local area networks, so if you have multiple machines behind a single router, it can be a very useful tool for that as well.

If it's not something you know you need, leave it off.

Either way — on or off — it's unrelated to the scams we hear about. Scammers rarely use Remote Desktop.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Windows Remote Assistance

Remote Assistance is similar to Remote Desktop because it allows someone else to access and control your computer. However, you must initiate each remote assistance session, and you can watch and interact with whatever the other person is doing.

To find it, search for "Remote Assistance" and click on "Allow Remote Assistance invitations to be sent from this computer".

Remote Assistance setting
Remote Assistance setting. (Screenshot: askleo.com)

I recommend you leave this option off unless you're about to use the remote assistance feature, and then turn it off again when you're done.

Or leave it on. Once again, this is rarely a tool used by scammers.

Remote Access using other tools

There are a myriad of other tools to access computers remotely. I happen to be partial to Google's Chrome Remote Desktop, but tools like TeamViewer, LogMeIn, GoToMeeting, Zoom, and others are all valid and useful tools to access someone's computer remotely.

Scammers try to convince you to install or otherwise use these tools. To be extra clear, the tools themselves are not scams or malicious. Like most tools, though, they can be used for good or evil.

The bad news is that none are affected by the Remote Desktop or Remote Assistance settings I just described. They'll work regardless of those settings.

The good news is that these tools don't start themselves; like Remote Assistance, you have to take steps to let someone into your machine.

And this is exactly what scammers try to get you to do.

Podcast audio

Footnotes & References

122: Since you've been reading Ask Leo! regularly, you probably already are. But for everyone else...

How Can an Employer Recover Information I've Erased?

2025-07-25 08:00:19

Think clearing your browser or deleting files keeps your work computer activity private? Nope. I’ll walk you through the ways employers can recover or track what you’ve done, sometimes even after you’ve “erased” it, and why you should always assume they’re watching.

Pretty easily, in most cases.

by

Think clearing your browser or deleting files keeps your work computer activity private? Nope. I'll walk you through the ways employers can recover or track what you've done, sometimes even after you've "erased" it, and why you should always assume they're watching.
an employee working at their computer, with their manager peering over their shoulder using a magnifying glass
(Image: ChatGPT)
Question: I just saw this article where a company did a forensic investigation of one of their employees' computers. How do they find searches and network activity if one clears their cookies and uses CCleaner?

There's so much more to your computer, as well as your activity history, than just cookies and tools like CCleaner can clean.

So much more.

I'll review a few of the more obvious ways employers can recover or collect information about your activity. I'm not doing this so you can hide things better, but to illustrate the futility of trying.

TL;DR:

What your employer can see and recover

Even if you delete files or clear your browsing history, your employer can find out what you've been up to. Deleted stuff can be recovered, other hidden info might still exist, and they can track you through network activity. If it's their computer, assume they can see everything, because they probably can.

Cookies and CCleaner

Cookies are small files left on your computer by websites you visit. The contents of the files might not be useful, but their presence shows that your web browser has at some point visited that site. It's a way to see where you've been.

Tools like CCleaner can easily and quickly clear cookies.

These tools can also clear other traces of activity, like your browser history, temporary files, the contents of your browser's cache, and much more that can hold information about what you've been up to. They are an easy first step in removing traces of your activity.

But they're not complete.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Resurrecting data

Deleting a file on your PC doesn't delete its contents. Unless you take steps to overwrite the data, there's a possibility someone could recover and restore it. This is what undelete tools are all about: trying to recover deleted files.

Clearing your cookies or history, or whatever else a data-cleaning tool might remove, does nothing more than delete the file(s) containing the information. The files could still possibly be undeleted.

The only way to avoid this is to overwrite the data after a delete. CCleaner and similar tools have a "free space wipe" tool that overwrites all the free space on your hard drive with random data, rendering what was there practically118 unrecoverable.

That may still not be enough to erase all of your tracks, however.

Don't forget backups!

No, not your backups — your company's backups.

In corporate environments, the company should have some kind of backup solution in place for all the equipment used there.

That's great if something goes wrong and your computer dies, or you lose something important. It's a safety net for both you and the company.

But depending on how often backups are created and how long they're kept, they're also a potential source of digital data coming back from the grave to haunt you. Even if you carefully and securely delete a file today, if it was on your PC prior to the most recent backup, it can still be recovered.

Data you're unaware of

Windows is a complex operating system, as are the applications that run on it. Programs store information in places you might not know about, or in places you know about — like the registry — but have no way to remove. Even so-called registry cleaners only remove or correct certain types of information. They are more about the health of your system than removing evidence of your activities.

For example, someone knowledgeable could analyze the paging or hibernation files to collect or infer information about what you've been up to.

There's simply no way to know that there isn't some amount of evidence of your activities left somewhere.

The only way to remove all evidence of activity from your computer is to erase it completely. There are two approaches. One is to use tools like DBan to erase the hard disk. The other is to reinstall Windows from scratch, reformat the hard disk as part of the process, and perform a free-space wipe when the install is complete.

Both are likely to act as warning signs to an employer.

And both may still not be enough.

They may not need your computer

When we think about tracking and evidence of our activities, we immediately think of all the data that's stored on our devices. Your company may not even need access to that.

Remember, they provide your internet connectivity and local networking. That means they can monitor where you go and what you do.

Computer to corporate network to interent
Your computer on a corporate network. (Image: askleo.com)

They don't need access to your machine; all they need to do is monitor your online activity through the devices they control.

Also, it's not your computer

When you use a computer provided to you by your employer, it's not your computer. In most jurisdictions119, you don't have a right to privacy on workplace-provided equipment.

The most obvious implication is that your employer has a right to snoop on what you're doing by examining your computer or monitoring your internet traffic.

More concerningly, though, your employer could legally install spyware on your machine or interfere with the "privacy" implied by HTTPS-secure websites. That means that even if you completely erase what's on your computer, they may have already collected information about your activity and sent it to their own servers for storage and analysis.

Podcast audio

Footnotes & References

123: Sadly, there are no absolutes. For example, there's a tiny chance that data overwritten on magnetic material could still be recovered through extensive (and expensive) forensic analysis.

124: Remember, I'm not a lawyer, and none of this is legal advice. If you need legal advice, get an attorney.

Why Does Edge Have So Many Processes?

2025-07-24 08:00:11

Dozens of Edge processes in Task Manager? Not to worry. It’s not a bug, it’s a feature. I’ll show you why modern browsers split tasks across multiple processes and how it actually helps things run faster, smoother, and more reliably.

It's a good thing. Really.

by

Dozens of Edge processes in Task Manager? Not to worry. It's not a bug, it's a feature. I'll show you why modern browsers split tasks across multiple processes and how it actually helps things run faster, smoother, and more reliably.
a busy kitchen with several cooks, and a head chef wearing a badge that reads "Edge"
(Image: Gemini)
Question: I looked at Edge in Task Manager, and it's got like a dozen processes running. And I'm just displaying a single webpage. Why?

I was tempted to respond with my Why Ask Why? article, but this is deserving of a little more explanation because it's a common question and an occasional concern.

Nope, nothing's wrong. This is how software is designed these days.

And it's a good thing.

TL;DR:

So many processes in Edge

Edge shows lots of processes because it splits its work into smaller parts to run faster and smoother, like helpers in a kitchen each doing one job. It's normal, it's smart, and it helps your browser work better. Nothing's wrong, and there's no need to worry.

So many processes

With only the Edge browser running and displaying a single webpage, Task Manager's process list shows the running programs.

Edge in Task Manager
Edge displayed in Task Manager, indicating 28 subprocesses. Click for larger image. (Screenshot: askleo.com)

Note the number 28 in parentheses (it may be different for you, and it may change as you watch). That's the number of separate processes that comprise the running program, Edge.

If we expand the item (by clicking on the ">" to the left of "Microsoft Edge"), we'll see the full list — or at least what will fit in the window (scroll to see the rest if it doesn't fit for you).

Edge processes.
Task Manager displaying the Edge subprocesses. Click for larger image. (Screenshot: askleo.com)

As you can see, there's a lot going on.

Processes and software design

Each subprocess — sometimes referred to as a thread — represents a separate mini-program running on your PC. It runs independently of the other subprocesses, though it coordinates its work with the other subprocesses as needed.

I won't speculate on Edge's design120, but I can generalize.

Multi-process (or multi-threaded) programming is now common. A single program might be implemented as 28 separate subprocesses; that's simply a design choice by those writing the software, who want the software to do its job as efficiently as possible.

As an example, one subprocess might be responsible for all network interaction — sending requests to a website and getting responses. Another might update what you see on the screen. One task might have to wait for the other; for example, your screen might not get updated if the network had an interruption or was slow.

Multi-process software avoids that interaction. The subprocess in charge of updating the display can move ahead regardless of what the networking subprocess is or isn't doing. The result is more efficient use of the CPU and a better overall experience for the user.

Think of it like a kitchen

Let's say you're in charge of preparing a meal. By yourself, you can do only one thing at a time. You prepare the main course; you prepare the side dishes; you prepare dessert; you set the table. While you might switch from one task to another for efficiency, you're still only doing one thing at a time.

Perhaps the recipe for the main course can be divided into two separate tasks that don't need to be combined until just before you throw something into the oven. Perhaps it's wet ingredients and dry ingredients. By yourself, you must first do one and then the other.

If you had help, though, then you could do one — say the wet ingredients — and your helper could do the other.

That's multi-processing. You're both working on a single program (Dinner), but you've divided up the work into two parts (Main course, wet and Main course, dry) that can be, at least for part of the process, done simultaneously.

Edge has a very, very busy kitchen.

It's not a problem or a flaw

Many people look at the multiple processes spawned (as it's called) by running Edge (or many other software packages running on their PC) and think there's something wrong. Or they think that the software designers are crazy and horribly inefficient.

Just the opposite.

Multi-process or multi-threaded software can be complex, for sure, but it's also an important characteristic of software that does what it does efficiently.

PS: Your browser has a task manager too

I've used Windows Task Manager in the example above, but most browsers now include their own Task Manager that focuses specifically on the processes involved in running that browser. In Edge, for example, click on the ellipsis in the upper right, then More tools, and then Browser task manager.

Edge's built-in task manager.
Edge's built-in Task Manager. Click for larger image. (Screenshot: askleo.com)

This shows roughly the same information as Windows Task Manager, but only on the browser itself. It's a useful way to focus your attention only on browser performance and/or issues.

Podcast audio

Footnotes & References

125: In this case, Chromium's design, since Edge, like Chrome and other browsers, is based on the Chromium browser engine.

Tip of the Day: Check Your Passwords for Hacks

2025-07-24 08:00:09

Make sure your password isn't known to hackers with this useful tool.

Pwned Passwords
Pwned Passwords website. (Screenshot: askleo.com)

Normally, when we think of checking for hacked accounts, we start with our email address. Services like Have I Been Pwned?121 take your email address and tell you if it's appeared in any known large-scale data breaches. If it has, you know to change the password on any other accounts for which you use the same email address and password.

Checking your password is another good idea.

Pwned Passwords, also by the Have I Been Pwned? folks, tells you if the password you enter has been discovered in any breaches.

This matters because it means the password is known to hackers. They're likely to try it in other offline brute force attacks in the future. If you continue to use that password anywhere, you're at greater risk of getting hacked.

In the example above, the password "password" has been seen over three million times. Clearly, that's a password to avoid.

Make sure your passwords aren't in the list, and if they are, change them right away.

"But Leo, I'm telling someone my PASSWORD!!"

Yes, you are, kind of. Technically, the password never leaves your browser. Only a hash is uploaded, which cannot be reverse-engineered into the original password.

But, of course, if you don't trust Pwned Passwords, you shouldn't use it.

I trust it. I trust that it (and the people behind it) is doing exactly what it says: keeping no record and using what you enter only to see if it's in the breach database. I've trusted it many times over several years with no adverse impact.

Footnotes & References

126: Generally pronounced as "owned" with a "p", or "poned".

Tip of the Day: Drag and Drop a Shortcut to Your Desktop

2025-07-23 08:00:39

The desktop can be a convenient place for shortcuts. Creating one is easy.

Basic Tip

Folder Shortcut
(Animation: askleo.com)

Many people find it convenient to keep links to commonly used items on the desktop. Let's use your Documents folder as an example of how to place a shortcut on your desktop.

Start in Windows File Explorer, not maximized, so it doesn't completely cover your desktop. Using the mouse, click and hold on the Documents folder, drag it to an empty area on your desktop, and release the mouse. Windows will create a shortcut to the folder.

When you want to open the Documents folder, you can simply double-click on the shortcut.

You can drag and drop shortcuts to almost any file or folder. Be careful, however: before releasing the mouse, be sure that the text underneath the icon you're about to drop says "Shortcut".

If it doesn't, a drop might move or copy the file, which is generally not what you want for your desktop. Usually, your desktop should only have shortcuts (pointers to where the files live). If you don't see "Shortcut", hold down the ALT key. "Shortcut" should appear, and then you can release the mouse button.

A Hacker's Four Favorite Ways to Get You

2025-07-23 08:00:27

A security professional shared the top four most successful hacks that compromise business accounts. I'll walk through them and show how they all apply to you and me as well.

How not to be an easy mark.

by

A security professional shared the top four most successful hacks that compromise business accounts. I'll walk through them and show how they all apply to you and me as well.
a sneaky cartoon hacker sitting at a desk with four glowing icons in front of them: a phone (impersonation), a laptop with a cable plugged in (remote access), a flashing 2FA popup (fatigue), and a SIM card (swap). The hacker is reaching mischievously toward all of them at once.
(Image: Gemini)

Rachel Tobac, CEO of SocialProof Security, recently posted about four specific hacking attacks she sees impacting businesses these days. From her perspective, "phone-call-based" hacking has the highest success rate.

Since her focus is on business, I want to describe those same four techniques from a consumer's point of view. These techniques have a high success rate among "normal people" as well as businesses.

Let's identify them, the things you need to watch for, and the steps you need to take to stay safe.

TL;DR:

Protecting yourself from a hacker's scams

Hackers trick you by pretending to be someone you trust, asking for your info, or getting into your computer. They might wear you down with 2FA pop-ups or even steal your phone number. Don't share codes or passwords, don't allow remote access, and always double-check unexpected requests.

1. Impersonation

You get a call or a text from someone claiming to be from an IT support helpdesk of some sort. It may be vague, or they may claim to represent an online service you use, such as Microsoft, Google, or other popular platforms.

They present a scenario where, for one reasonable-sounding reason or another, you need to give them your password or your two-factor code. Maybe, rather than explicitly asking for these things, they'll direct you to a link where you can clear up an issue without them needing direct access to anything.

Of course, it's all a scam. If you give your password or 2FA code to someone, they immediately hack into your account. If you visit the link they give you, you'll be asked to sign in, and in doing so, you'll hand over your credentials to a hacker.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

2. Remote access

This is a variation of the impersonation scam above. Rather than asking you to take some action, they'll helpfully offer to take care of it for you by accessing your computer remotely. They'll ask you to download and run a remote access tool122 and then give them access to it. They then have complete access to your computer.

It's all a scam. Once in control of your computer, they can install malware, steal credentials, and much, much more. This often happens faster than you can follow and is sometimes hidden behind crafty software they install.

3. MFA/2FA Fatigue

This is a new one to me, and I have to say that I haven't encountered it personally.

The concept is simple: a scammer attempts to sign in to your account, which is protected by two-factor authentication (2FA) or multi-factor authentication (MFA). The specific type of authentication used means you get a notification — perhaps via email or via another device you're using. Of course, you decline it since you are not attempting to sign in.

So they repeat it again and again and again, until finally, in exasperation or by accident, you allow it.

The attacker now has control of your account.

4. SIM swap

This is one you can't see coming.

The attacker calls your mobile provider pretending to be you or your employer. They claim you've lost your phone but have a replacement in hand. All the mobile provider needs to do is move (transfer, or "port") your mobile number to the replacement device.

If they successfully fool the mobile provider's customer support agent, your phone number is then assigned to the hacker's phone. They start getting the two-factor codes and other messages needed to access your account.

Protecting yourself

The steps you need to protect yourself are simple yet easy to overlook.

Other techniques

Tobac recommends the Be Politely Paranoid Protocol. In other words, be skeptical and paranoid. Politely confirm the veracity of an unexpected request by confirming that they're legit via another channel (one that is not provided by the requestor). For example, if someone claiming to be from your bank calls you and starts to ask for sensitive information, let them know you'll need to call them back using a number you already have for the bank. If the caller balks, it's a strong sign there's something amiss.

If you have the option, use 2FA techniques that don't involve your phone number. That means choosing TOTP (Google Authenticator compatible) techniques or a hardware key like a YubiKey, rather than SMS (text)-based 2FA.124

Of course, that assumes you're using two-factor authentication. 2FA remains the most important thing you can do to protect your online accounts, so be sure to use it if it's available.

Podcast audio

Footnotes & References

127: Which in itself is a legitimate tool.

128: Of course, never say never; there are rare cases where it might be the right or expedient thing to do. But only if you are absolutely, completely, 100% positive that you know the person you are communicating with and trust them completely.

129: SMS 2FA is still better than no 2FA at all, though.

Tip of the Day: Use AI for Whois

2025-07-22 08:00:20

AI can deliver more complete and understandable information than traditional whois services.

(Animation: askleo.com)

"Whois" is the generic term (as well as a specific online protocol) for determining the owner of a website and information about that owner. Typical whois services, like whois.domaintools.com, return a generic list of random information about the specific domain requested.

Try AI instead.

Asking ChatGPT (no account required), for example, "whois askleo.com", returns a fair amount of understandable information about the domain — sometimes even more than a traditional whois lookup.

It's another tool to research the sites and services you interact with online.

How Can I Tell If a Website Is Safe?

2025-07-21 08:00:53

It's important, yet sometimes hard to tell, if a website is safe. You can stack the odds in your favor. I’ll show you simple tools and smart habits to help spot shady sites before they cause trouble, even if there’s no way to always be 100% sure.

There are never any absolutes, but we can stack the deck in favor of safety.

by

It's important, yet sometimes hard to tell, if a website is safe. You can stack the odds in your favor. I'll show you simple tools and smart habits to help spot shady sites before they cause trouble, even if there's no way to always be 100% sure.
A cartoon-style detective with a magnifying glass examining a computer screen showing a mysterious websiteThe background shows question marks and warning symbols, while the detective looks both curious and cautious.
(Image: ChatGPT)
Question: How do I know if a site I'm about to visit is safe? Is there any software or service I can use? Is there some other technique?

There is no simple solution to this problem. There's no single service or tool you can rely on to keep you completely safe. There is no such thing as "safe", after all.

I understand that can be frustrating. You want to know that you're not about to be ripped off by a shady business, or worse: hacked by a malicious site.

You can use tools and techniques to stack the odds in favor of safety, but the ultimate safety tool remains yourself.

TL;DR:

Checking a website for safety

There's no perfect way to know if a website is safe, but you can check with tools like VirusTotal, Norton Safe Web, and Web of Trust. Use good security software, and trust your gut. If something feels off, stay away.

What is safety?

There's no canonical list of what is or is not safe.

One problem is that the word safe has different meanings depending on who you ask.

For some people, safe means you won't pick up malware by visiting the site. For others, safe means there isn't any risqué humor. For still others, the site represents a company safe to do business with.

There are probably as many definitions of what it means to be safe as there are people answering the question.

I don't believe it's possible to get an absolutely safe/not-safe decision from any service or tool. But you can get data to help you make that determination yourself, based on your own criteria.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Online tools

When faced with an unknown site or questionable link, you might consult three online services that rate websites.

Virus Total

At Virus Total (owned by Google), you can upload suspected malware or URLs and have multiple security scanners analyze them.

Virus Total URL scan entry.
Virus Total URL scan entry. Click for larger image. (Screenshot: askleo.com)

The focus here is on security and malicious behavior as reported by a collection of security vendors.

I'm particularly interested in the Details page, which includes technical details of what was found.

Virus Total Details tab
Virus Total Details tab. Click for larger image. (Screenshot: askleo.com)

This can be useful for understanding where URLs redirect to, what trackers are present, and much more technical information about the website being analyzed.

Norton Safe Web

While Virus Total has a community aspect, Norton SafeWeb relies on it a little more.

Norton Safe Web results for askleo.com.
Norton Safe Web results for askleo.com. Click for larger image. (Screenshot: askleo.com)

It's unclear exactly what "Norton Safe Web has analyzed..." means (its results are apparently not included in that of Virus Total), but you'll see a "community rating" section that can be useful.

Web of Trust

Web of Trust became controversial several years ago when it was discovered that they were selling data collected by their toolbar. The solution is simple: don't use their toolbar.

Their online service remains a valuable source of data. The information is crowdsourced: it's generated from internet users, not from some central authority.

Is askleo.com safe? I hope so!
Is askleo.com safe? I hope so! Click for larger image. (Screenshot: askleo.com)

This will tell you if others have found the site to be safe and trustworthy or not.

You do not need to register, sign in, or download the extension, even though it may be offered multiple times.

Crowdsourcing: good and bad

Some of the information provided by the services I've listed above is user-provided: crowdsourced. There is value, but also some concern, in that.

Anyone can post anything. That means crowdsourced information can be abused, primarily in either of two ways.

There are processes to minimize this activity, but like any spam filter, it's impossible to be 100% accurate. View all information on crowd-sourced review sites with a skeptical eye. It's not authoritative, but it can be valuable, additional data.

Aside from online tools, there are several other techniques that may help you determine your online safety: DNS blocking, website blocking, and browser blocking.

DNS Blocking

When you access a website, webpage, or download, DNS looks up the mapping from the domain name (like "askleo.com") to the IP address of the server where that domain is physically located (like 54.85.8.229). Since every domain you access goes through this look-up, it's an opportunity for the DNS service to block access to domains known to be malicious.

Unfortunately, most DNS services don't do that.

OpenDNS, now owned by Cisco, is a replacement for the DNS service provided by your ISP. OpenDNS was originally created to be a faster, independent DNS service, but they support malicious filtering as an option as well.

Changing your DNS is best done at your router, though you can do it on each individual device as well. To use OpenDNS, visit their setup guide to get started.

Website blocking

Many anti-malware scanners and security suites include malicious website detection as part of the service they provide. The quality and intrusiveness of this detection vary based on many things, including not only the specific security package you run but the browser you use, as well as other aspects of your system. I don't have a specific recommendation.

The security package I recommend — Windows' own built-in Windows Security — includes SmartScreen to protect your system from malicious sites and downloads.

Smart Screen in Windows Security.
Smart Screen in Windows Security. Click for larger image. (Screenshot: askleo.com)

Browser blocking

A final class of tools for assessing website safety are toolbars and add-ons to whatever browser you use.

As one example, uBlock Origin is a browser plugin most people think of as a pop-up or ad blocker. It also blocks many malicious or questionable sites.

uBlock Origin security options.
A selection of uBlock Origin security options. (Screenshot: askleo.com)

I've been running it for a while and consider it a fine addition to the toolset.

Podcast audio

Tip of the Day: Don't Delete; Archive Email

2025-07-21 08:00:08

Archiving (rather than deleting) email allows you to retrieve emails from the past.

Archiving Email
Archiving email on Gmail. (Screenshot: askleo.com)

Google's Gmail introduced a feature I find exceptionally helpful. By giving you multiple gigabytes of storage for your email, it becomes practical to keep your email rather than deleting it all.

That's the difference between the Archive and Delete buttons in Gmail. Other mail systems have similar options.

I much prefer to archive my email so I can access it again in the future if need be. More importantly, I don't try to decide in the moment whether or not I should archive or delete — I just archive everything that isn't spam. Why? My "in the moment" decisions are often wrong, and sometimes I find myself wishing I'd kept an archive copy of some message I deleted.

Archiving everything solves this problem.

There is one caveat: you need to trust your email provider with your email over the long term (that's why I picked the particular email message in the example above đŸ'‚ ). But, honestly, you already trust them daily, so having them keep something they've already handled for you shouldn't be a huge issue.

None of this negates the need to back up your email. Should you lose access to your online account, you'll lose access to your archives as well.

Why Must I Re-Enter my Email to Unsubscribe?

2025-07-19 08:00:42

If a website makes you re-enter your email just to unsubscribe, it’s bad design, or worse, a shady tactic. I’ll explain why this happens, what it means, and how to spot when it’s just spam trying to trick you.

A common practice that is anything but a best practice.

by

If a website makes you re-enter your email just to unsubscribe, it's bad design, or worse, a shady tactic. I'll explain why this happens, what it means, and how to spot when it's just spam trying to trick you.
Unsubscribe!
(Image: depositphotos.com)
Question: Why do some websites have you re-enter your email when you click on "unsubscribe"? Don't they already know who I am?

At best, it's because they're lazy.

At worst, it's because they want to make it more difficult to unsubscribe.

I suppose there's an even worse case: it's spam, and you never subscribed to begin with.

These days, there's no excuse for any of those situations.

TL;DR:

Unsubscribe re-entry

If a site makes you type your email to unsubscribe, it's either using outdated tools or trying to make leaving harder. That's lazy, sneaky, or both. Good services let you unsubscribe with one click. And if you never signed up in the first place? Don't click'it's probably spam.

Lazy

The most common reason is outdated or ineffectual mailing list software that doesn't encode your email address into the unsubscribe link.

It's not that hard. For example, while an unsubscribe link might be coded as a link to:

https://somerandomservice.com/unsub.php

There's absolutely no reason it couldn't be:

https://somerandomservice.com/unsub.php?email=leo@askleo.com

The latter link includes the email address as part of the request.

One click and you'd be done.

Almost all legitimate mailing list providers include this functionality. The unsubscribe links in my Confident Computing Newsletter are encoded in a way that may not look like an email address, but the information to identify which email address should be immediately unsubscribed is there.

If the organization sending you email doesn't have or use that capability, the only recourse is to ask you to re-enter your email address.

Instead, they should update to more capable software.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Erecting barriers

This is borderline conspiracy thinking, but I'm convinced it happens at least occasionally: by forcing you to re-enter your email address, they're hoping it's too much work or that you type it incorrectly. They're making it harder to unsubscribe on purpose.

The result is that you stay on their list.

This typically backfires, of course, as the next approach to get off the list is to mark those messages as spam. The sender can still claim a higher subscription number, but does it really matter if the only way to get off the list is to mark it as spam?

Speaking of spam

If you never subscribed in the first place, don't click on an unsubscribe link.

If you didn't ask for them, those messages are spam.

One way spammers harvest email addresses of real, live people is to include an unsubscribe link that asks for an email address. Any email address you give them is immediately "subscribed" to more spam.

Podcast audio

What Happens When You Close an Email Account?

2025-07-18 08:00:21

Thinking about closing your email account? You might want to think again. From lost data to unexpected lockouts, and even someone else ending up with your old email address, I’ll walk you through what happens, and why keeping the account might be the smarter move.

More than you think, but not as quickly as you expect.

by

Thinking about closing your email account? You might want to think again. From lost data to unexpected lockouts, and even someone else ending up with your old email address, I'll walk you through what happens, and why keeping the account might be the smarter move.
A glowing email icon slowly dissolving or pixelating, while other icons like calendar, contacts, and cloud storage blur out behind it. The background is a vibrant digital dashboard.
(Image: ChatGPT)

Annnnnddd we're back to the most common answer on Ask Leo!: it depends.

It depends on the email service, of course.

But it also depends on your behavior after you indicate you close the account.

TL;DR:

Closing an email account

Closing an email account starts a countdown. At first, nothing happens. After a while, all your emails, contacts, and other info are deleted. You may lose access to other services, too. Later, someone else might get your old email address. My advice: don't close it, just in case.

1. A grace period

In most cases, when you close an email account, the account is not closed right away.

What actually happens is... nothing. Typically, that's quite literal: nothing changes at all. Your account continues to receive email, and everything in your account remains in your account.

The only thing that really happened is that a timer has started. This timer, or grace period, allows you to change your mind. If you do anything with the account at all, the account closure is canceled. The assumption is that by using the account, you're saying you don't want to close it.

The length of the grace period varies from service to service. In some cases, it's zero days; in others, it can be several months.

Unfortunately, "doing anything with the account" can be quite literal. For example, if your email account is with a company like Google or Microsoft, which provides other online services, then using those services may be taken as an indication that you want to keep the account. And you probably do, since closing the email account would cancel all the other services associated with it. For example, do you want to lose the YouTube account associated with that Gmail account you just closed?

Be certain that you really want to close everything associated with the account before you do anything.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

2. Housecleaning

After that grace period, which varies from provider to provider, all content associated with the account is deleted.

This includes all email and all your contacts.

It also includes any other data associated with the service, such as calendars, online storage, photos, or whatever other services that are associated with this account.

Once deleted, this data cannot be recovered. You may still be able to sign in to the account and cancel its deletion, but everything within it is gone forever.

If the service sends bounce messages because the account no longer exists (which it may or may not), that function likely starts now.

3. Difficulty signing in

Particularly if you've had the account for any length of time, you've probably used the email address at a plethora of online accounts, either as a primary identifier or login ID, or as a backup "alternate" email address.

Those stop working. Eventually, services like banking, shopping, and social media that still use your old email for sign-in or password recovery will lock you out.

Make certain you change your username everywhere before closing your account.

4. True death

After that grace period, which varies from provider to provider, the account is completely deleted and is no longer recoverable.

You cannot sign in. Email sent to it will probably bounce.

The account is well and truly closed.

5. Resurrection

This is a step many people overlook. At some point (which, again, varies), the email address associated with your account may be made available for re-use.

Let's say your email address was joey@randomisp.com. You closed it, and all the steps above took place. If someone else creates a new account with that same service, they could choose your old address: joey@randomisp.com.

None of your old data would be present (it was deleted in step 2), but any new email sent to your old email address would now go to them. Any account you failed to update with your new email address risks being accessible to the new owner of your old email address. While you might not think they'd know which accounts to try, if a malicious individual was the new owner of your old email address, they could try using it at lots and lots of different popular services. That's exactly what hackers do, and there's a high likelihood you'll have an account one or more.

Not all services allow email address re-use, but even if they don't today, I expect most will eventually.

Podcast audio

Tip of the Day: Save the Originals

2025-07-18 08:00:04

Crop, resize, edit, and play with your images to your heart's content. Just be sure to save the unaltered originals.

When we share or save photos, it's not uncommon to crop, alter, or resize an image before sending it on.

Save the original. You may find in the future that you really want the full-sized original, not a resized or cropped version of it.

As I write this, I'm working with a client on a website. Originally, the photos were 640×480 pixels in size. Ten years ago, that was a pretty reasonable size; it represented a sizeable area when displayed on the screens of the day.

Today, they look downright tiny. There are two options:

What we need are the original images, which were presumably taken at a higher resolution and resized for the common screen sizes of that day.

You may have other uses and needs for your own photos. But I can tell you that what seems like a large image today will be tiny someday. By saving the original, unaltered image, you maximize future possibilities.

Tip of the Day: Don't Focus on Ransomware

2025-07-17 08:00:46

Ransomware is scary, but don't let it blind you to more likely threats.

Ransomware!
(Image: canva.com)

There's no doubt about it: ransomware is scary.

Unfortunately, because it makes for so many headlines and can be so devastating when it strikes, people focus too intently on ransomware to the exclusion of other threats.

Here's the not-so-big secret about ransomware: it's just malware. There's nothing special about it other than what it does when it arrives. Before it takes its devastating actions, it's just like any other piece of malicious software.

Focusing explicitly on ransomware can mean that more common threats — the forms of malware you're more likely to encounter — go ignored.

The bottom line? Protecting yourself from malware — using all the tools and techniques we talk about so often to keep your computer safe — will, as a side effect, also protect you from ransomware.

How to Limit File History Disk Usage

2025-07-17 08:00:08

File History doesn’t let you limit how much space it uses, but there’s a workaround. I’ll show you how to partition your drive so File History stays in its lane, protecting both your backups and your disk space.

Setting boundaries when there are no boundaries.

by

File History doesn't let you limit how much space it uses, but there's a workaround. I'll show you how to partition your drive so File History stays in its lane, protecting both your backups and your disk space.
A desktop PC displaying "File History Disk Full!" on its screen.
(Image: ChatGPT)

File History is a nifty feature in Windows 10 and 11 that allows you to designate a disk — typically an external disk — to act as a not-quite-real-time backup of the files you're working on. Every time you change the file, that file is backed up within some period of time. If you're working on a file continuously throughout the day, for example, File History might contain a snapshot of that file taken every hour all day long. You could recover any one of them if you wanted to.

There are many options you can set in File History, but limiting how much disk space it uses is not one of them.

We can work around that.

TL;DR:

Reining in File History

File History can't limit how much space it uses, but you can. By creating a separate partition just for File History, you can stop it from taking over the entire disk. It's a simple trick that sets boundaries where Windows won't.

Why do all this?

File History has several approaches to controlling what and how much is backed up.

Regardless of those settings, though, it's still possible to completely fill the drive you use for File History. If you're also using that drive for other things, filling it up with File History will impact those other things.

By giving File History a dedicated partition, you limited its ability to impact what happens elsewhere. Here's how.

Control Panel: File History

The old Control Panel is still around. Just click on the Start button, start typing control panel, and click on it when it appears in the results.

Control Panel in Windows 11
Control Panel in Windows 11. Click for larger image. (Screenshot: askleo.com)

Under "System and Security", click on Save backup copies of your files with File History.

File History settings in Control Panel.
File History settings in the Control Panel. Click for larger image. (Screenshot: askleo.com)

This machine has a second drive — drive D: — and File History shows that by default. It could be internal or external.125

This is the drive I want to use, but I would like to prevent File History from potentially filling it up completely and leaving me no room for anything else.

The solution? Partition the disk.

Disk Manager

I've discussed disk partitioning — specifically splitting one partition into two — before, so you'll find step-by-step details at that link.

First, in Disk Manager, shrink the existing partition by the amount you want to reserve for File History.

Shrinking a partition.
Shrinking a partition. Click for larger image. (Screenshot: askleo.com)

In the example above, I've selected "32000" megabytes, or roughly 32GB. The existing partition — the D: drive — will be reduced by that amount, leaving 32GB of unused space on the drive.

Unallocated space.
Unallocated space. Click for larger image. (Screenshot: askleo.com)

Then we create a "new simple volume" in that unallocated space.

New Simple Volume wizard summary.
New Simple Volume wizard summary. (Screenshot: askleo.com)

When complete, the original 128GB physical disk now appears as two separate drives.

The resulting two partitions.
The resulting two partitions. Click for larger image. (Screenshot: askleo.com)

Now we can use that F: drive for File History.

Selecting the drive

Back in Control Panel's File History setting, click the Select drive link on the left. This will bring up a list of drives available for File History to use.

Choosing the drive to use for File History.
Choosing the drive to use for File History. Click for larger image. (Screenshot: askleo.com)

In my example, I'll click on the newly created drive F:, followed by OK.

Then I'll turn File History on.

Podcast audio

Footnotes & References

130: The warning about BitLocker is because my primary drive is BitLocker encrypted, but the File History drive is not. This would imply that files backed up would not be protected by encryption. The solution would be to enable BitLocker on the drive we eventually choose as our File History drive.

How to Block the Windows 11 Upgrade and Stay on Windows 10

2025-07-16 08:00:51

Want to stick with Windows 10 and avoid the surprise of waking up to Windows 11? You have options. I’ll show you a simple, free tool that puts you back in control of system updates, keeping Windows 11 at bay until you decide otherwise.

Applies to Windows: 11, 10

When you can but don't want to.

by

Want to stick with Windows 10 and avoid the surprise of waking up to Windows 11? You have options. I'll show you a simple, free tool that puts you back in control of system updates, keeping Windows 11 at bay until you decide otherwise.
No Windows 11, Thank You.
(Screenshot: askleo.com)

I often hear from two groups of people concerning Windows 11.

And now there are rumors that people have been upgraded from 10 to 11 regardless of their desires, without being asked! I don't know if it's true, but these days I wouldn't put it past Microsoft to do something like this, either directly or by using dark patterns126. The cost the consequences — waking up to Windows 11 instead of 10 on your machine — is pretty high.

This article is for those who want to stay with Windows 10 even though their machine could support Windows 11, regardless of what Microsoft thinks.

TL;DR:

Blocking the Windows 11 upgrade

Use GRC's InControl app to prevent Windows from automatically upgrading your current release. Run it and click "Take Control," and your system will stay at its current version and release until you choose otherwise. You might still see upgrade notifications, but they can be ignored.

InControl

The solution is a simple app from GRC127 called InControl.

Not In Control
InControl home screen as freshly downloaded. (Screenshot: askleo.com)

This app prevents an upgrade beyond any specific Windows version/release.

By default (without the app), you are not in control — meaning you're not in control of what happens to your system. Your operating system can be upgraded without warning.

Using InControl

In the lower left is a "Version / Release" entry that displays your current Windows version (10, in the example above), and release (22H2, the last Windows 10 release).

Click Take Control.

Now you're in control.
Now you're in control. (Screenshot: askleo.com)

The Version/Release entry fields are now greyed. Windows will not be upgraded past this specific combination.

If you're on Windows 10, you're on Windows 10 until you say otherwise.

InControl and Windows 11

InControl isn't about staying on Windows 10 specifically; it's about any upgrade. For example, here's a screenshot of a machine running Windows 11.

InControl in Windows 11.
InControl in Windows 11. (Screenshot: askleo.com)

This Windows 11 machine will now not upgrade beyond Windows 11 24H2...

...until you click Release Control, after which Windows will do what Windows does.

It prevents upgrades, but not nags

InControl prevents your system from being upgraded past a specified release.

However, Windows may still encourage you to upgrade. You can safely ignore those notifications.

Podcast audio

Footnotes & References

131: In my opinion dark patterns are more likely, since it gives them plausible deniability, and it's a technique they've been using to get people to "accidentally" enable the OneDrive backup "feature".

132: Almost all apps from GRC are small and simple. Smile

Tip of the Day: Mark Non-Spam as Not Spam

2025-07-16 08:00:25

You regularly mark spam as spam, but it's equally important to mark misclassified, legitimate email as not being spam.

(Animation: askleo.com)

I hope we're all used to finding spam in our inbox and marking it as spam (or junk, or whatever term your email interface or program uses). This is an important step in training the junk mail filter. Marking messages tells the filter what you consider to be spam; the filter then uses the characteristics of that message to better identify spam in the future.

The opposite is just as important.

If your spam filter makes a mistake and places a legitimate email into your spam folder, it's important to mark that message as not spam.

Once again, exactly how you do this varies depending on your email interface or program. It may be enough to move the message back to your inbox, or you may need to click a button that's visible on the message.

Regardless of how, it's an important step of continuing to train the spam filter, this time telling it that mail like this is not spam, and it can use the characteristics of the message to help it not misidentify spam in the future.

Tip of the Day: Don't Re-Type That URL

2025-07-15 08:00:22

Copy/paste is one of the most powerful time-saving devices in computerdom. Understanding and using it pays off immensely.

Triple-click Copy Paste
Demo of how to triple-click copy and paste. (Animation: askleo.com)

I cringe whenever I see someone intentionally bypass one of the most basic timesaving computer shortcuts and make things harder on themselves.

Consider this URL:

https://somerandomservice.com

You'll note it's not hyperlinked. You need to do something if you want to go to that site.

Most people type the URL into the browser's address bar by hand, hopefully without error, and press Enter. Frequently, there are typos, so they repeat the process more slowly this time, once again by hand.

Ugh.

Instead:

Not only is this easier and faster, but it's not subject to typing errors.

I strongly recommend getting familiar with all the ways you can copy/paste. It'll make your life much, much easier.

Tip of the Day: Photograph or Scan Important Documents

2025-07-14 08:00:46

A quick digital copy of important (or even not-so-important) documents can save time and stress if the original gets lost.

Driver's License
Copies of important documents can make life easier. (Image: canva.com)

This isn't about me being over-the-top digital (though I admit I am); this is common advice: photograph or scan important documents, and save those images in a safe place.

While this applies to more situations than travel, having images of the original documents can speed up their replacement in an emergency when you're far from home. Even though they might not be accepted in place of the original, the images provide important reference information, such as ID numbers and other items that would help fill out forms or assist in what can be a stressful situation.

I am not a lawyer, so this isn't legal advice. I believe there are documents you cannot legally copy. Whether a scan or a photograph would count as a "copy", of course, I don't know. Check with authorities if you're at all concerned.

And don't limit yourself to "official" documents. Copies of your itinerary, lodging and car rental confirmations, and just about anything else on paper that would be an annoyance if lost are all candidates for a quick digital snapshot.

And yes, this is absolutely another manifestation of my favorite topic: backing up. Smile

What Should I Do About the Latest Breach?

2025-07-14 08:00:30

Yet. Another. Breach. Don’t panic, I'll walk you through what you really need to do next. From checking if you’ve been exposed to strengthening your account security, it’s all here in simple terms.

The Best of Ask Leo!

Another day, another breach.

by

Yet. Another. Breach. Don't panic, I'll walk you through what you really need to do next. From checking if you've been exposed to strengthening your account security, it's all here in simple terms.
leo@askleo.com has been Pwned!
leo@askleo.com has been pwned! (Screenshot: askleo.com)

When I originally wrote this in January of 2019, there had been a breach (referred to as the "Collection #1 breach") containing something like three-quarters of a billion email addresses and plain-text passwords. It was newsworthy because it was huge and contained passwords for anyone to see.

As I update this in June 2025, we have yet another report of 16 billion passwords exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable.

Naturally, the question I (still) get most is: what should you and I do?

The same thing we do for every breach, my friends; the same thing we do for every breach.

TL;DR:

If you're in a breach

In most cases, there's little you can do in response to a specific breach other than changing passwords if you know the services involved. Use every breach you hear about as an opportunity to review your account security to ensure it's as tight as you can make it.

Once more unto the breach, dear friends

Breaches happen so often that it's hard to take them seriously. A more likely reaction is "Oh, another one", with little attention paid to the specifics. The most recent breach is worthy of a closer look for a variety of reasons.

It's huge. The original report cited 16 billion entries. It may be the biggest breach to date.

It has email addresses. This is not new, but it is what makes most breaches noteworthy. You want to know if your email address was exposed. The odds are high.

It has passwords. This is the most devastating. Most breaches contain "hashed" passwords or no passwords at all. In this breach, apparently, passwords are there for anyone to see.

It's an example of what's possible. It's a great example of exactly what can go wrong.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

What we don't know

We don't really know where the breach came from.

We can infer from some data what service or services are included and what accounts all those email addresses represent, but we don't know how they were collected. Current theory is that this is an amalgamation of the results of several info-stealers, meaning malware that somehow scooped up credentials on individual machines.

If you find your email address is part of this breach (haveibeenpwned may128 tell you; more on that below), what then? What concrete action can you take?

What to do for any breach

Here's what you can and should do for this and any breach.

One of my passwords has been Pwned!
One of my passwords has been pwned! Click for larger image. (Screenshot: askleo.com)

If you're comfortable doing so, run passwords you're worried about being breached through Pwned Passwords. I realize not everyone is OK with giving their password to a third party like that. I trust them, but you don't have to.

It's simple, really: if you have any concern about a password being compromised, change that password! Change it to something long, strong, and unique.

Podcast audio

Footnotes & References

133: As I update this, it doesn't appear to include the results from this most recent breach yet.

Searching for a Technical Support Support Phone Number? Avoid This Huge Trap

2025-07-12 08:00:21

I'll explain why searching for a tech-support phone number is one of the most dangerous steps you can take when you're looking for help.

You may not be talking to who you think you are.

by

I'll explain why searching for a tech-support phone number is one of the most dangerous steps you can take when you're looking for help.
Phone Support: What You Expect
The phone support we imagine. (Image: canva.com)

Say you've been locked out of your outlook.com or Gmail account. Maybe you forgot the password. Maybe you were hacked. Your recovery attempts have failed, and you're desperate to regain access to your account.

So, you search online for outlook.com or Gmail "support phone number", hoping to talk to a real, live person to get help from the source.

Unbeknownst to you, things are about to go from bad to worse.

TL;DR:

Searching for support

Searching for a tech support number for a free service like Gmail or Outlook.com? Don't. They don't offer phone support. What you'll find instead are scammers, fake numbers, or costly "help" you don't need. Always go directly to the service's official website. Never trust a number you found by searching.

There is no official support phone number

I want to be very clear about something.

For the majority of free services, there is no official telephone support.

There just isn't. It's part of the cost of using a free service. Hiring live human beings to answer the telephone is much too expensive. If they hired customer service reps, your email wouldn't be free.

That cost should be a clue as to what you find when you search for a support phone number.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Search results

I did a Google search for "outlook.com support phone number" and got some interesting results.

At the top was an ad. A company paid to appear first in searches related to outlook.com support.

It was followed by what's referred to as "organic" or "real" search results.

First were two entries to Microsoft support webpages that were legitimate but ultimately unhelpful, since Microsoft provides no phone support for Outlook.com.

Additional entries included results from Microsoft support forums that listed phone numbers. Some of those could be scammers pretending to post legitimate numbers.

However, many of the remaining entries on the first page of search results appeared to offer phone numbers you could call for Outlook.com phone support.

What's up with that?

Scammers get you to call them

It's an alarming scenario: people call these numbers in desperation, thinking they're legitimate, official support numbers (they're not). One of two things happens:

It's much like the Microsoft support scam, where so-called support engineers call you claiming your computer is "causing problems on the internet" — except you've made their job easier by calling them!

After listening to your concerns, a scammer offers to take remote access of your machine to "fix" things, only to install malware or worse. Or they'll insist you purchase expensive software you don't need.

Even if they're legitimate (albeit not from the free service, because free services have no phone support), they can't do anything you can't do yourself. They have no special access or magic wand to help you with your account problems.

All they can do is make your wallet lighter.

Don't blame the search engines

When I mention this scenario to people, their first reaction is to blame Google (or whatever other search engine they used) for allowing these sites to appear in search results.

It's not that simple. Not even close.

There's still more complexity to it.

It's more than Gmail or Outlook.com

I've been using Outlook.com as my example here, but in reality, this issue applies to any popular free online service, most notably Yahoo!, Gmail, and others.

Here's the kicker: I took one of the phone numbers that appeared in the search result for "outlook.com support phone number" and Googled that phone number. The results, as a clickbait headline might say, will surprise you.

Of course, that number appeared for entries associated with Outlook.com, as well as other Microsoft products.

However, that phone number also turned up for Yahoo! and Gmail support. If there was any question before, it should be clear now: this number isn't provided by any of those services, as there's no way they'd do tech support for each other's services.

At best, it's a third party trying to get your business.

At worst, it's a scammer.

So, what to do?

Don't rely on searching for straws to grasp at

There is no telephone support for free email services like Outlook.com, Hotmail, Yahoo! Mail, Gmail, or others.

No amount of searching will make it otherwise, and no amount of search results means otherwise.

There is no official number for you to call.

You need to get help through other means.

Always — and I do mean always — start with the official website for the service. That's outlook.com for Outlook.com, gmail.com for Gmail, yahoo.com for Yahoo!, and so on. If there is help to be had, you'll be directed to it from those sites.

There is no need to search further and every reason not to.

Podcast audio

Tip of the Day: Automate Your Backups

2025-07-11 08:00:49

Computers are great at automating things. Let one of those things be your backups.

Backup Schedule
Scheduling automatic backups. (Screenshot: askleo.com)

It's a mistake for us to rely on ourselves to perform backups.

The problem is, we get busy and we forget. It's too easy to overlook something you need to start manually. It can also be inconvenient: if your backup software affects performance while it's running, there's a disincentive to run it while you're using your computer.

Let the backup software handle it for you.

Every backup utility worth its salt includes the ability to automate the process. Use that ability. Backups are too important to leave to our faulty memories.

If that means leaving your computer running overnight so an automated backup can run without affecting you, so be it. If that means leaving an external hard disk connected so the backup has a place to be stored, do that, too. Backups need to be so easy that they happen without the need for you to do a thing.

How Do I Convert a GPT Disk to MBR?

2025-07-11 08:00:42

Current partition style won't work? I'll walk you through what that means and two ways to convert between GPT and MBR partition styles.

The format before the format.

by

Current partition style won't work? I'll walk you through what that means and two ways to convert between GPT and MBR partition styles.
Converting between GPT and MBR conceptual.
(Image: askleo.com)
Question: While following your instructions in your Macrium Reflect course lesson, "Creating Rescue Media," I ran into an issue when trying to create the rescue media on a USB stick. When I reached the step to build the emergency disk, I received the message: "Removable USB Flash Drive ' Unsupported Disk" and "GPT format not supported."

I'm somewhat surprised that Macrium Reflect didn't just re-initialize the disk for you, but I know it's not the only program that might require MBR over GPT (or perhaps even vice versa).

Let's look at what those are and a couple of ways to convert between them.

TL;DR:

Converting MBR

I'll answer three questions:

Terms

Let's start with some terms, since there's some ambiguity, or at least some common confusion.

MBR versus GPT

MBR, for Master Boot Record, and GPT, for GUID Partition Table (where GUID stands for Globally Unique IDentifier), are two different approaches or "partition styles" for managing the information on a disk that records where the partitions on that disk live and how large they are.

If you've ever been instructed to initialize a disk, it's because no partition style was found.

Disk Initialize dialog from Windows Disk Management.
Disk Initialize dialog in Windows Disk Management. (Screenshot: askleo.com)

You can see that you're given the choice of which should be used.129

GPT is more common of late, as it supports larger disks than MBR, so it's not surprising that a random disk — even a USB stick — would come set up to use GPT.

Switching isn't difficult; it's just inconsistent.

Using Disk Manager

Right-click on the Start menu and click on Disk Manager.

In the lower pane, right-click on the left-hand information box of the drive in question.

Right clicking on Disk 1.
Right-clicking on Disk 1. Click for larger image. (Screenshot: askleo.com)

You'll notice a "Convert to MBR Disk" in the pop-up menu, though it's greyed. All partitions on the drive must be removed before you can convert it. Right-click on each partition, and click on Delete Volume... to remove it.

Removing a partition.
Removing a partition. Click for larger image. (Screenshot: askleo.com)

Note: Removing a partition deletes all data. Make sure there's nothing here you want to keep.

Once you've removed all the partitions, right-click on the left-hand drive information box again, and this time, Convert to MBR Disk should be available.

Covert to MBR Disk option available.
Convert to MBR Disk option is available. Click for larger image. (Screenshot: askleo.com)

Click it to make the conversion.

If it says "Convert to GPT Disk", then your disk is already in MBR style.

I have encountered scenarios where the option isn't just greyed but is not present at all. When that happens, we need to resort to the command line.

Using diskpart

Run an administrative command prompt by right-clicking on the Start menu and clicking on the "(Admin)" version of the command processor listed (Command Prompt, Powershell, or Terminal).

Type "diskpart" followed by the enter key. (The enter key is assumed at the end of every command we type from here.)

Running the diskpart command.
Running the diskpart command. (Screenshot: askleo.com)

Next, enter "list disk".

Dispart list disk command.
Diskpart list disk command. (Screenshot: askleo.com)

Note the disk number for the disk you want to convert, ensuring you identify the correct disk. It should be the same number as in Disk Manager, but be sure to double-check. In our example, it's disk 1.

Enter "select disk 1" using the disk number you've identified.

Next, enter two commands, one after the other: "clean" and then "convert mbr".

Converting to MBR partition style.
Converting to MBR partition style. Click for larger image. (Screenshot: askleo.com)

Your disk is now MBR partition style.

It also has no partitions. In the case of the original question, that's fine, as Macrium Reflect should now be able to create the partition(s) it needs. If you're planning to use the disk in some other way, you'll want to use Disk Manager to create at least one partition so you can use the disk.

Podcast audio

Footnotes & References

134: If you're ever asked to initialize a disk unexpectedly, understand that doing so will erase everything on the disk. If this is not what you want, do not initialize the disk and troubleshoot why you're being asked to.

Could Someone Reopen My Closed Email Account?

2025-07-11 08:00:26

Closing or abandoning an email account can have unexpected and perhaps unwanted side effects. I'll explain what those are and what options you have.

The Best of Ask Leo!

Maybe.

by

Closing or abandoning an email account can have unexpected and perhaps unwanted side effects. I'll explain what those are and what options you have.
Account Closed
(Image: canva.com)
Question: I have terminated my Yahoo account. There's a clause in the form that says that after 90 days, my user ID can be made available to others. Does that mean that if someone then snaps up my old username, they could start impersonating me? Would they see everyone on my contact list? Would my old contacts see them and think I was back online?

Could that person try to impersonate you? Certainly.

Would that person see everyone on your contact list? Certainly not.

This is an important aspect of account ownership that applies to all services, not just Yahoo.

TL;DR:

Reopening a closed account

When you close or abandon an email account, it's possible that after some time, your user ID or email address could become available for someone else to use. While they would not have access to the previous contents of your account, they would have access to email still being sent to that email address, and could use it to try to impersonate you. It's safer not to close or abandon email accounts, but rather check in just often enough to keep them from being reassigned.

Grace period

When you close or abandon your account with any online service provider, they typically make your abandoned username and email address available again after a period of time. To anyone. As if it had never been used before.

All someone has to do is sign up and ask for it.

For most services, if you log in again before time runs out, it tells them you're not abandoning the account and resets the clock. Even if you go through the provider's steps to cancel an account, there's often a grace period during which you can change your mind, log in, and "un-cancel" the account.

Things get a little confusing when people use multiple services from the same provider. For example, your Microsoft account is at once an email account, your OneDrive account, and perhaps your computer's login account. Using any of these services keeps the entire account active. You can't close only your Microsoft email account while keeping your OneDrive account with the same email address. The same is true for all multiple-service providers, including Google and Yahoo!

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

When?

If you abandon or explicitly close your account, exactly when it's returned to the pool of names varies greatly.

For example, if you close your account with your ISP, they could make your ID available again the very next day if they wanted to, and I'm sure some do.

Most free services like Yahoo! and others wait at least 30 days, and most wait much longer.

What happens?

I believe that closing and abandoning an email account are similar processes and follow the same general sequence of events; but remember, this is up to each service provider and can change without warning or notice.

We begin by abandoning the account. That means you don't use it in any way. You don't log in to the account or any service related to the account. Not even once.

After some period, the service notices that you haven't logged in and considers your account abandoned. At this point, typically:

Your account is effectively gone. You may be able to re-open it by logging in again, but all of your previously stored data will be gone.

After some additional period, the service removes the "login to re-open" option completely. You cannot get the login ID (i.e., email address) back once this happens.

At the same time, or perhaps after some additional time, the service will release the email address or ID back into the available pool. Now someone — anyone — could come along and request your old email address and get it.

When someone else has your old email address

It's important to realize that when someone comes along and requests your abandoned email address, they get a completely new account. There is nothing in that account that relates to your old account except the email address/login ID.

As part of the closing process, the service deleted all your stuff before they close it. It's gone. You can't get it, and neither can the person who now has your old email address.

However.

What they will get is any new email sent to your old email address. Deleting your account did nothing to tell the world that the email address isn't yours anymore. Even if you tried to broadcast the change, it's likely that not everyone got the message or updated their records. Chances are that your old email address is still in someone's address book or included on some mailing list somewhere.

The new account owner will get anything sent to your old address. And they will be sending "From:" your old address.

I hope that's all OK because there's nothing you can do about it.

OK, there is one thing.

Don't close the account

If the possibility of someone else getting email intended for you but sent to a long-abandoned email address bothers you, the solution is simple.

Don't abandon it. Don't close it. Keep the account open. Check in every so often so it stays open.

Keep it yours, and you won't have to worry about a thing.

Podcast audio

Tip of the Day: Try the Manufacturer's Support First

2025-07-10 08:00:31

The support sites provided by your computer or software manufacturer should be the first place you look for help.

I'm honestly surprised at how often folks reach out for help when what they need is readily and clearly available at their software or hardware manufacturer's support site.

Why not start there first?

The manufacturer is the most authoritative resource for dealing with whatever problem you're having.

It's true that not all such sites are helpful or even understandable. I've often joked that my job is as much a translator as anything else. If that turns out to be the case, then by all means, perform a more general search across the internet, or visit helpful sites like Ask Leo!

But at least start with the support offerings from the manufacturer of the hardware and/or software you're having trouble with. It might well save you time and get you a more accurate answer than the alternatives.

How to Share Two-Factor With Another Person

2025-07-10 08:00:19

Two factor authentication is one of the most important things you can set up to protect your accounts. Even so, it's possible to share certain 2FA types with multiple authorized people. I'll show you how I do it.

Step 1: trust.

by

Two factor authentication is one of the most important things you can set up to protect your accounts. Even so, it's possible to share certain 2FA types with multiple authorized people. I'll show you how I do it.
Two different phones showing the same two-factor code.
(Image: ChatGPT)
Question: I get two-factor and would use it, except that my wife and I both sign into a shared account, and we each have our own phone. If the 2FA were my phone, wouldn't she have to ask me every time a code was needed? That's a pain.

Yes, it is.

But there's a good chance that it's not needed.

Using a specific type of two-factor authentication, you can set up both your phones as allowed two-factor devices for the same account.

TL;DR:

Sharing 2FA

You can share two-factor authorization by using an authenticator app that supports TOTP codes. Set it up once; then scan the same QR code on both phones. Or use a shared password manager like 1Password that includes the code. That way, either person can log in without extra hassle.

TOTP two-factor authorization

TOTP stands for Time-based One Time Password, which I often refer to as Google Authenticator-compatible two-factor authentication, or just authenticator-based. Once configured, your device (typically an app on your smartphone) displays a six-digit code that changes every 30 seconds. Your ability to present this code correctly when requested acts as your second factor.

Unlike other forms of two-factor authentication, we can set up TOTP on more than one device.

If you don't have a smartphone or a TOTP app you can use elsewhere, or the service you're using doesn't offer TOTP authenticator as a second factor, then this option isn't available to you.

But if it is, we can remove this annoyance for you.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Setting up two two-factor devices manually

The process is pretty straightforward.

Both devices should now show the same changing six-digit number associated with this account.

Either device should now act as an accepted 2FA for that account.

A two-factor authentication QR code.
A two-factor authentication QR code. (Screenshot: askleo.com)

That QR code contains all the magic. By saving it, you can set up multiple 2FA devices for the same account at any time. Should you ever lose your device, it's also a great way to set up 2FA on a replacement without needing to turn 2FA off and back on again on the account.

Save the QR code in a secure place in case you need it later. Maybe store it offline, in an encrypted vault, or somewhere else that's accessible only to you.

Setting up two two-factor devices automatically

Some password managers can also serve as your second-factor authenticator. When you do this, then:

I do both using 1Password.

A two-factor code displayed in 1Password.
A two-factor code displayed in 1Password. (Screenshot: askleo.com)

For example, my wife and I share an online shopping account that has two-factor authentication enabled. The information is stored in 1Password.

It's probably the most convenient way to manage two-factor on a shared account.

Sometimes you can use a dedicated app

Some websites or services offer a dedicated app you can install on your smartphone. Sometimes it's this app that can act as a second factor.

Bank 2FA options, including "Mobile Notification" to the app on my phone.
My bank's 2FA options, including mobile notification to the app on my phone. Click for larger image. (Screenshot: askleo.com)

For example, when signing into a bank that has such an app:

Sharing that second factor is as simple as installing the bank's app on both of your phones and signing in at least once. The next time two-factor is required, both devices will get the notification, and either device can approve the sign-in.

Not all services offer this, but it's another convenient approach when they do.

Podcast audio

Should You Sign Up for Extended Security Updates (ESU) for Windows 10?

2025-07-09 08:00:17

I'll review the security protection for Windows 10 beyond its official end-of-support date: what it means, pros and cons, and what we know about how to get it -- perhaps even for free.

Applies to Windows: 10

That's a definite maybe.

by

I'll review the security protection for Windows 10 beyond its official end-of-support date: what it means, pros and cons, and what we know about how to get it -- perhaps even for free.
A Windows 10 PC on a desk, with an accurate October 2025 calendar placed next to it.
(Image: DALL-E 3)

Microsoft has announced something new: the ability to keep getting security updates to Windows 10 after its end-of-support date.

June 2025 update: They've shared some specifics for how to get it and how you might even get it for free.

Let's look at what's happening, what this offer may be good for, and whether I think it's worth it.

TL;DR:

Extended Security Updates for Windows 10

Microsoft will offer an extra year of paid security updates past the October 2025 end-of-support date. This Extended Security Updates (ESU) option for Windows 10 Home and Pro users will cost $30. While this adds protection, users can safely continue using Windows 10 with vigilant security practices. Microsoft Defender updates will continue until 2028.

Past end-of-[free]-support support

Microsoft's published end-of-support date is not changing. On October 14, 2025, Microsoft will stop supporting Windows 10. That means no more feature updates, bug fixes, or, perhaps most concerning, security updates (with one important distinction regarding Microsoft Defender that I'll discuss below).

In the past, corporate customers have had the option to sign up for Extended Security Updates, meaning that for some (large) amount of money, they continue to receive security-related updates after the end-of-support date. There were still no feature updates or bug fixes other than those relating to identified security issues, and even then, presumably only those of significant enough impact.

I believe this program has been in place for prior versions of Windows as well. As you might imagine, large corporations with a large investment in a specific version of an operating system are loath to take on the expense of upgrading; they are typically willing to shell out the money for security updates instead.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Extended Security Updates For Windows 10

For the first time, Microsoft is making the Extended Security Updates (ESU) program available to consumers who use Home and Pro editions.

From Microsoft's How to prepare for Windows 10 end of support by moving to Windows 11 today article:

And for the first time ever, we're introducing an ESU program for personal use as well. The ESU program for consumers will be a one-year option available for $30. Program enrollment will be available closer to the end of support in 2025.

For $30, you get one year of security updates beyond the October 14, 2025, cutoff date. One year. After that, you're once again on your own.

Again, this includes no feature updates and no bug fixes other than sufficiently serious security issues. What's a "sufficiently serious" security issue? Good question. We don't know Microsoft's criteria. My sense is that it's something that would put significant numbers of Windows 10 users at risk of compromise if left unfixed.

I think of the ESU as buying an extended warranty for your car. For an additional fee, you're getting one year of additional protection. You may never need it, but if you do, it's there.

Getting the ESU

While not available yet slowly being rolled out, Microsoft has announced how ESUs will be made available along with some surprising options on possibly getting it for free.

For individuals: An enrollment wizard will be available through notifications and in Settings, making it easy to enroll in ESU directly from your personal Windows 10 PC. Through the enrollment wizard, you'll be able to choose from three options:

The first one is, to me, a complete non-starter. Windows Backup is not the backup you think it is, and it involves the horrific OneDrive backup "feature". To me, this is clearly a ploy to get more people to put more data in OneDrive and pay for more space when they run out.

For people in countries where the Microsoft Rewards program is enabled, redeeming 1000 points might work best. These points are easy to accumulate (just use Bing search for a long enough). You may already have more than you realize. I checked rewards.bing.com (signed in with my Microsoft account, of course) and discovered that for reasons unknown, I have over 5,000 points. Yay?

Or, of course, you can pay the $30 fee. As of now, it's a one-time fee covering only one year. (Educational and other programs may have the option to extend further; pricing is likely to increase each year.)

But the answer to the most common question is clear: "An enrollment wizard will be available through notifications and in Settings." So keep your eyes peeled for that if you're on Windows 10.

Windows Security

Support for Windows 10 security issues ends on either October 14, 2025, or a year later if you sign up for ESU.

Windows Security — more specifically, Microsoft Defender, the anti-virus software running on your Windows 10 machine — is on a different schedule. Again, quoting the original Microsoft post:

Microsoft will also continue to provide Security Intelligence Updates for Microsoft Defender Antivirus through at least October 2028.

This means that, while Windows itself will no longer get fixes for most security issues, the anti-malware software will continue to get database updates, allowing it to detect current threats through 2028.

Should you buy ESU?

Maybe.

On one hand, I've long said that you can continue to use Windows 10 safely after the end of support as long as you pay attention to what you're doing and take responsibility for maintaining proper security. My response to people who believe they're being forced to purchase a new computer? You're not. Just keep on using Windows 10.

On the other hand, $30 doesn't seem a horrific price for an extended warranty to increase your protection for an additional year. The free options might make the decision even easier. (Just use the rewards points, not the backup offer.)

On the other other hand, $30 per machine could add up if you have multiple Windows 10 machines. (This hasn't been made clear yet, but my assumption is that the fee is per installation.)

I don't have a strong opinion either way. I'll certainly sign up for it on at least one computer just to test and experience it.

Podcast audio

Tip of the Day: Get Rid of Gmail Inbox Tabs

2025-07-09 08:00:14

Gmail tries to guess how to categorize your email. Unfortunately, it's often wrong.

(Animation: askleo.com)

As an email publisher, one of the common support issues I deal with is missing email.

If my subscriber is a Gmail user, inbox tabs are an all-too-common culprit.

Turn. Them. Off.

Please. đŸ'‚

The idea is, Google pre-sorts your email into categories. Presumably, this makes your email easier to manage and thus more effective for you.

The reality is, Google gets it wrong. Even when it gets it right, many people don't remember to look in those other tabs. Even after all this time — I'm updating this tip since it was first published years ago — Google still gets it wrong. Often.

Click on the gear icon and scroll down to "Inbox type". Click on Customize.

UNcheck everything except "Primary" and click Save.

That'll bring you back to a single inbox, where you should find everything you're looking for.

Tip of the Day: Set Another Admin for Your Facebook Page

2025-07-08 08:00:54

If you manage a Facebook page, make sure you're not the only one.

Facebook Page Admins
Setting a backup Facebook page administrator. (Screenshot: askleo.com)

This isn't about your Facebook account; this is about the Facebook pages you have created. For example, I have a personal Facebook account, but I have created and/or manage several Facebook pages, such as Ask Leo!, HeroicStories, Not All News is Bad, and others.

Pages are not accounts. When you sign in to Facebook, you're signing into your account (after which you can act as if you were signed in as a page).

Here's the thing: if your Facebook account is lost, you may lose access to all the Facebook pages you've created unless there's another Facebook account that has administrative access to your page. In my case, for example, losing my personal account would be bad enough, but losing the Ask Leo! Facebook page, or having it defaced by a hacker, would be devastating. A backup admin gives you a chance to retain control.

Tip of the Day: "It Won't Happen To Me" Is Bad Security

2025-07-07 08:00:24

No one may be targeting you specifically, but malicious activity is out there. Don't pretend otherwise.

"You're just not that interesting."

I say that frequently to folks who are unduly concerned about being spied on or specifically targeted by malicious entities. Rarely is anyone looking specifically for you with harmful intent.

While they're not looking for you, that doesn't mean they aren't looking for anyone who falls into their traps. And you are definitely part of anyone.

Assuming bad things will never happen to you is just bad security.

You may not be the target of a specific threat, but the vast majority of malicious software and related activity has a general scope. The bad actors fish for anyone (or any machine) they can get their hands on.

If you think it'll never happen to you and behave accordingly, it's likelier that it will happen to you.

You're probably not that interesting in any specific sense, but you should probably act as if you are.

Fortunately, that's as simple as adhering to the usual litany of steps to stay safe online and never letting your guard down.

How to Run a Full Scan Using Windows Security

2025-07-05 08:00:46

Here's my step-by-step guide on how to run a complete malware scan using Windows 10 and 11's built-in Windows Security.

Applies to Windows: 11, 10

Sometimes, you need to scan everything.

by

Here's my step-by-step guide on how to run a complete malware scan using Windows 10 and 11's built-in Windows Security.
Windows Security
(Screenshot: askleo.com)

On occasion, it's a good idea to run a complete anti-malware scan of your computer. It's advice I often give when someone suspects that there may be malware on their machine.

It's easy to do using Windows Security (previously known as Windows Defender).

TL;DR:

Consider a full scan when your machine is acting up or you suspect malicious behavior.

Step by step

We start in the Windows taskbar notification area. Click on the Windows Security icon (you may need to click the caret in the taskbar — "^" — to expose the icon).

Windows Security notification area icon.
Windows Security notification area icon. (Screenshot: askleo.com)

Click on Virus & threat protection.

Security at a glance: Virus & threat protection.
Security at a glance: Virus & threat protection. Click for larger image. (Screenshot: askleo.com)

Click on Scan options.

Scan options.
Open scan options. (Screenshot: askleo.com)

In Scan options, click on Full scan and then click on Scan now.

Full scan option & Scan now button.
Choosing to perform a full scan. (Screenshot: askleo.com)

The anti-malware scan begins.

Scan running.
Scan running. (Screenshot: askleo.com)

Exactly how long this takes varies based on what else your computer is doing at the time, how fast it is, and how much data is stored on it. As usual, the estimated time remaining can be wildly inaccurate.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Why run a full scan?

Full scans are not something you need to do often. Most of the time, Windows Security's automated periodic quick scans and real-time scans as things change or are downloaded are enough.

Sometimes you need more. "Quick scan" is quick because it doesn't scan everything. It limits its scope to files and folders on the disk that are the most common targets of malicious software. Other areas where malware rarely lives are bypassed.

But rarely isn't never.

I recommend a full scan if you suspect malware has made it to your machine. If your machine is misbehaving, slow, or there are odd things happening, a full scan is a comparatively quick way to rule out malicious software as the cause.

Other scan types

You'll note that in addition to "quick" and "full", there's also "custom" and "Microsoft Defender Offline scan".

Custom scans allow you to specify the folder to be scanned. This is a fine option if you've just downloaded something and you want the additional reassurance of a manual scan. Point Windows Security at the Downloads folder using a custom scan.

Microsoft Defender Offline addresses the case where malware is undetectable or unremovable because it has somehow incorporated itself into Windows system files. The only way to deal with malware of this sort is to scan when Windows isn't running. The only way to do that is to boot into something other than Windows to perform the scan.

That's Microsoft Defender Offline. It reboots your machine into a dedicated recovery mode to run the anti-malware software without Windows running. It's a useful tool if you find you have malware that can't be removed or still suspect malware is present even when a full scan reports none to be found.

Podcast audio

Don't Rely on the Padlock: What the Lock Icon in Your Browser Really Means

2025-07-04 08:00:56

Https is important, but now that it's ubiquitous it's not really protecting you as much as you might think. I'll explain what I mean and why that is.

Not much.

by

Https is important, but now that it's ubiquitous it's not really protecting you as much as you might think. I'll explain what I mean and why that is.
https padlock
(Image: canva.com)

For years — decades, even — we've been told to make sure that we're using an "https" connection when connecting to sensitive websites like banks or email providers. That provided a specific level of security that was particularly important and not always present.

Today, it's ubiquitous. Https is almost everywhere.

As an interesting side effect, the significance of that little https "lock" icon has decreased dramatically.

TL;DR:

The https padlock

The tiny lock icon only shows that your browser uses HTTPS, which encrypts your data and proves that the site owns that name. It doesn't prove the site is legit. Pay attention to a cracked lock icon or error message. Trust the lock for privacy, but judge the website for yourself.

Https defined

Http is the protocol or computer conversational language used for transferring webpages from web servers to your browser.

Https adds two things to http:

Https on askleo.com.
Https icon on askleo.com. Click for larger image. (Screenshot: askleo.com)
Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Https encryption

By definition, http is unencrypted. That means anyone with the ability to monitor an http conversation can see what it contains. This might include your ISP, someone within range of the open Wi-Fi hotspot you're using, or the infrastructure of the internet anywhere between your computer and the website you're accessing.

Before an https conversation starts, your computer and the remote website agree on an encryption key that is then used to hide the contents of your conversation. Only your browser and the remote website can see what data you're exchanging, regardless of who might have access to the stream of data.

Https identity confirmation

Before the conversation even begins, though, https also confirms that the remote site is the site it claims to be. Setting up https involves getting a digital certificate from a third party that is assigned to the specific website domain you claim to be.

For example, when you visit askleo.com using https, your browser first confirms that the digital certificate on the server it connects to is the certificate for askleo.com. This protects your conversation from being intercepted and redirected to an impostor site.

Https confirms you're connected to the site you asked to connect to, not an impostor.

The padlock

The padlock icon is typically at the far left of your address bar, though fewer and fewer browsers bother to display it anymore.

It indicates two things:

Https in use

The mere presence of the icon, or some variation of it, tells you that the https protocol is being used. At a minimum, this means your data is being encrypted between your browser and the remote website you've connected to.

While encryption is good, it isn't enough to consider the connection truly secure.

Https security

The icon can indicate normal or some "broken" form of https security.

Https error.
Https error. Click for larger image. (Screenshot: askleo.com)

When the normal icon is displayed, all is well. Your connection is encrypted, and the site you're connecting to is the site it claims to be.

When the icon has a line through it, is displayed in red, or is replaced by "Not secure" or similar indications, something's amiss. The primary reasons this happens include:

At face value, this error means you can't trust the website you've connected to. (In practice, if you know what to look for, it's not uncommon to use additional information to confirm whether the error is truly significant. For example, we often ignore the error about a certificate having expired if that expiration is less than a day or so. Webmasters occasionally forget to renew.130)

What the icon does not tell you

I chose my words above very carefully:

"...https also confirms that the remote site is the site it claims to be..."

This is not the same as:

"....https confirms that the remote site is the site you think it is." Https does not do this.

Here are two examples of sites that may have valid https certificates and show a normal https lock icon:

The first is legitimate. The second might be a scammer trying to fool you, but the status of https will not tell you that anything is wrong.

Why?

Https is everywhere

Originally, https certificates cost money. This acted as both a barrier to entry and added a level of accountability.

To improve privacy and other aspects of online security, https certificates can now be acquired for free. This is great for website owners with several websites, who would otherwise have to choose between the privacy and security https provides versus the recurring cost of a certificate for each site.

Now, anyone can easily set up https for their websites for free.

And anyone, of course, includes scammers.

Since most websites now use https, its significance has faded. Many browsers don't bother to show the padlock unless there's a problem.

Podcast audio

Footnotes & References

135: I can speak to this with the voice of experience.

Tip of the Day: MSINFO32 Built-in System Information

2025-07-04 08:00:44

Windows comes with a useful system information tool already built in.

Applies to Windows: 11, 10, 8, 7, Vista, XP

(Animation: askleo.com)

There are a variety of both free and paid system information utilities out there. These tools summarize your system, presenting what software is installed, hardware configuration, running processes, and more.

You also already have one on your machine: Windows' own System Information.

Click the Start button and type Run (or Windows Key + R). Type in msinfo32.

Click OK to run the program.

The Windows System Information tool will present a variety of data about your computer. The initial summary is perhaps the most useful, but diving deeper into the various categories listed on the left gives all sorts of geeky and esoteric information about your PC. This information may come in handy when diagnosing issues or providing information to those who are helping you.

Tip of the Day: Install the Manufacturer's Software

2025-07-03 08:00:45

The drivers that come with Windows are usually good. Downloading them directly from the manufacturer is often better.

Logitech Website
A manufacturer's website. (Screenshot: askleo.com)

Windows does a pretty good job at locating and installing drivers (the software that knows how to control the hardware) for just about any device you attach to your computer. Sometimes those drivers come from Microsoft; sometimes they're written by others and provided by Microsoft at installation or update time.

However, if that's all you rely on, for many devices, you may miss out.

If the device comes with a disc, install the software from that disc. If the instructions tell you to download the latest utilities and drivers from the manufacturer's website, do that.

The drivers and software that come with or through Windows are sometimes basic and lack additional features or useful utilities for your hardware. The device will work, but with the manufacturer's software, you may be able to do more or have more control. A great example is webcams, where the additional software may include significantly more camera control than Windows provides natively, as well as recording and special effects utilities.

If you're experiencing problems with a specific device, one of the most common first steps is to check for current or updated utilities and drivers directly from the manufacturer.

Does Getting Bounces to Email I Didn't Send Mean I've Been Hacked?

2025-07-03 08:00:02

Email bounces from messages you didn't send can be disconcerting. I'll explain what's happening, why you probably don't need to worry, and what steps you might take anyway.

Probably not, but...

by

Email bounces from messages you didn't send can be disconcerting. I'll explain what's happening, why you probably don't need to worry, and what steps you might take anyway.
Bouncing Email
(Image: askleo.com)
Question: This is the third nonsensical undeliverable email notice I've received. I did not send anything to this address, to be clear.

Delivery has failed to these recipients or groups:

fo3mYnOuj2E1HXM@google.com
The format of the email address isn't correct. A correct address looks like this: someone@example.com. Please check the recipient's email address and try to resend the message.

Does this mean I've been hacked? I changed my Google password after the second one but this arrived today.

It's extremely unlikely that you've been hacked.

What you're seeing, believe it or not, is just run-of-the-mill spam. You can safely ignore it and/or mark it as spam.

Let me explain what I think is happening.

TL;DR:

Unexpected bounces

Spammers use your email address, so error messages bounce back to you even though you're not the one who pressed Send. It's a spam thing called from spoofing, and it doesn't mean you've been hacked. Just mark spam as spam, keep a strong password, add two-factor authorization, and relax. There's nothing else you can do.

Mail you didn't send

Spammers often use a technique called from spoofing to send email that looks like it came from someone it did not come from. It's easy to craft an email with a fake "From:" address.

From: Ask Leo! <leo@askleo.com>
To: you@youremailprovider
Subject: Dear Valid Shortlisted Beneficiary, You Have Money!
...

That made-up example looks like it came from me — except I had nothing at all to do with it. Nothing. My account was not hacked. My account wasn't even involved. My email provider was not involved. I was not involved.

A spammer can just fake it.

And there's nothing you or I can do about it.131

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Bounces to mail you didn't send

So when spammers send email that looks like it came from you to email addresses that are invalid, guess who gets the bounce message?

You do.

You didn't send the message, but you get the bounce. It's annoying. But again, there's nothing you can do about it.

Why would they send spam to invalid email addresses?

It does raise the question: why are spammers sending to bad email addresses?

I have two theories.

One is that they're using a shotgun approach. They don't have a list of known good email addresses to work from, so they're just making up email addresses and sending out messages. Particularly on a large service like Gmail, <something>@gmail.com is likely to work often enough if you keep guessing millions and millions of possible "<something>". And each guess costs the spammer nothing. Some will work, some will fail. Some will bounce. Some will bounce to you.

The other is that they're trying to reach you. You did get the bounce, and the bounce message came from Gmail. Email from the Gmail system is less likely to be filtered as spam, so it stands a higher chance of getting to you. Your curiosity might be piqued, and you might look at the original message — the spam. And you might even act on it, which is the goal.

Of the two, my money's on the first one. And, of course, there could be other possibilities.

The tiny chance

There's a tiny chance your account has been compromised and the spammer is sending spam from it directly. I say tiny because generally there would be other signs of compromise: messages in your sent folder, notifications that you signed in somewhere, and more.

Changing your password is great. Adding two-factor authentication virtually eliminates this as a possibility.

And, of course, if it continues after a password change, it's even more unlikely that your account was involved at all.

Podcast audio

Footnotes & References

136: Technically, setting up spam-fighting techniques like SPF, DKIM, and DMARC should reduce that email's ability to make it to your inbox, but it does nothing to prevent the spammer from trying.

Two-Factor Authentication: It's Not as Complicated as You Think

2025-07-02 08:00:47

There are some persistent myths about two-factor authentication that stop people from adopting it. I'll clear them up so you can use this simple yet powerful security feature with confidence.

Clearing up some 2FA myths.

by

There are some persistent myths about two-factor authentication that stop people from adopting it. I'll clear them up so you can use this simple yet powerful security feature with confidence.
an office desktop containing a mobile phone displaying a two-factor authentication app and 6 digit code, a flipphone displaying an SMS message and 6 digit code, a yubikey usb key
(Image: ChatGPT)
Two Factor Myths

You mean I have to do this every time I sign in?
If someone gets my second factor, does that mean they can just waltz into my account?
If I lose my second factor, doesn't that mean I'm locked out forever?
Can't a second factor be faked/spoofed/intercepted, and doesn't that make it worthless?
I don't have or want a mobile phone, so I can't use two-factor.

There's a lot of misinformation around two-factor authentication. This can lead people to avoid it, even though it's one of the most effective ways to secure their online accounts.

I want to clear up some of the myths around two-factor authentication. It's not nearly as confusing or as scary as you might think it is.

TL;DR:

Two-factor myths busted

Two-factor authentication (2FA) adds a second check (something you have) to your password (something you know). You only use it when signing in on a new device or browser. Losing the second factor isn't fatal: backup codes, recovery options, or spare keys get you back in. 2FA blocks almost all hacks. I encourage you to enable it everywhere.

What is two-factor?

First, we have to define what we mean by two-factor authentication (2FA), which is sometimes referred to as multi-factor authentication (MFA).

Traditionally, you sign into an online account with a username and password. These are things you know. By keeping the password secret, your ability to provide it theoretically proves that you are you and should be allowed into the account.

A second factor is typically something you have.132 For example, after 2FA is set up, after entering your username and password, you might be asked to prove you have access to your mobile device by entering a code that was sent to it. (I'll discuss other forms of 2FA below. Not all require a mobile device.) Your ability to provide the code that was sent to your device proves you possess the physical device, your second factor.

Two factors got you into your account: something you know (your password) and something you have (your device).

Requiring that second factor adds security because even if a hacker somehow learns your password, they still can't get into your account because they don't have your second factor.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

It's NOT every time

Two-factor authentication is used only once133: the first time you sign in to an account on your computer. After that, your device becomes "trusted", and signing in later requires only your password, as before.

Of course, it's not quite that simple. Two-factor may kick in:

Those are rare, though, so in practice, you need to use two-factor only occasionally; certainly not every time you sign in.

Every sign-in from a hacker meets the "first time you sign in on a different browser/machine" criteria. Thus, they'll always be asked to provide your second factor, which they don't have.

A second factor alone is not enough

Remember, it's two-factor authentication. You need both your password and your second factor to sign in that first time.

That means having your second factor fall into the hands of a hacker is an issue only if they also know your password.

The people who might find (or steal) your second factor are rarely the same people who might gain access to your password. The former, of course, need to be close enough to get their hands on the factor, and the latter are typically overseas working their scams.

If you lose your second factor, you can quickly disconnect it from your account by signing into the account and turning off or changing the existing two-factor configuration.

Losing your second factor is an inconvenience, not a disaster

If you lose your second factor, you will not be locked out of your account.

There are two safety nets in place, plus a third if you take additional steps.

Backup codes. First, when you set up two-factor authorization for an account, you'll be prompted to create and/or save a set of backup codes. Each of these codes can be used once in place of your second factor. Once you sign in, you can temporarily turn off 2FA or change it to a replacement device. The backup codes need to be stored securely, but as long as they're accessible to you, you can always get back into your account.

Account recovery. Second, services offer many account recovery techniques (AKA "I forgot my password") to confirm you are who you say you are without your second factor. They may send an email message to an associated recovery account, a text message to a different recovery phone number, or any of several pre-configured recovery options. After you jump through these additional hoops, the service may accept your sign-in without the second factor. This doesn't invalidate 2FA as a security measure, because a hacker would have had to jump through all those hoops as well, which is extremely unlikely. Your ability to do so proves you are you.

A second second factor. There's a third safety net you can set up yourself ahead of time: an additional second factor. When using hardware keys as 2FA (see below), it's common to set up two keys, keeping one in a safe place as a backup. In that same vein, you could set up both SMS and app-based 2FA such that either could be used in the event the other is lost.

In all cases, and as long as you prepare (which most services require), losing your second factor is an inconvenience at worst.

Two-factor spoofing

There is no such thing as perfect security. Period.

That means that it is possible for hackers to spoof or bypass two-factor authentication in some situations. The two most common:

  1. Mobile numbers can be stolen (AKA "sim swapping"), redirecting all SMS messages to the hacker.
  2. Successful phishing attacks can intercept two-factor codes in real time.

#1 requires you to be individually targeted, and you can set up a PIN with your mobile provider to prevent unauthorized reassignment. For #2, you can pay close attention to signs of phishing to avoid being lured down this path.

Both of these spoofing techniques are rare and preventable. Any two-factor authentication is better than no two-factor authentication.

By using 2FA, you are stacking the odds in your favor, making it significantly less likely your account will be compromised.

Second factors

You don't always need a mobile phone or a smart device.

This varies based on the online provider with which you're setting up two-factor authentication, but often services allow a variety of devices to be used. These may include:

I've seen each of these act as a second factor on various services. Which ones are offered is up to each service.

Why bother with all this?

To be clear, 2FA is very little bother. The only thing that really changes after you set it up is that the first time you sign in to a new device or browser, you need to use your second factor. After that, it's the same sign-in process as before.

Password-based compromise happens daily. Due to bad passwords (which of course you don't use — right?), malware, brute-force attacks, breaches, or other forms of compromise, accounts are hacked often. Two-factor stops 99%134 of these attempts dead in their tracks.

2FA provides peace of mind.

Podcast audio

Footnotes & References

137: A different type of second (or third) factor can be something you are, meaning some physical characteristic about you, such as your face, fingerprint, iris, or something else.

138: As always, there are exceptions. "Never say never" and all that. But in general, and especially for consumer accounts, 2FA is required only the first time.

139: OK, I made that up, but honestly, I expect the real number to be more like 99.99%.

Tip of the Day: To Sleep or Not to Sleep

2025-07-02 08:00:28

To sleep or not to sleep: that is the question. Truly shutting down is the only way for some machines to remain stable over time.

Someone once told me I should let everyone know about the sleep mode in Windows and how it makes starting your computer quicker as compared to completely shutting it down.

I wish it were that simple.

The first problem is that sleep mode does not work reliably on all machines. While it's certainly gotten better over the years, there are still some computers that simply don't handle sleep (or its cousin, hibernate) well at all. It's been such a problem over the years that I avoid both.

The second problem is that you do want to reboot Windows every so often. Windows is a lot better than it once was, but when you sleep a computer rather than shutting it down, you're leaving all the programs, including Windows itself, in a running state. Any flaws (like memory leaks or other behaviors) that would be cleaned up by a reboot aren't. The longer you avoid a reboot, the slower and less stable your system may become.

Aye, there's the rub: I have to say "may become" because on some systems and with some software, sleep is perfectly fine. You can go for weeks without rebooting, and all will be well.

On other systems, you may find that in a day or two — or even immediately after attempting to wake up the machine — something won't be quite right.

All I can suggest is to try it and also be skeptical. When a system misbehaves, sleep mode is one of the first things I look to eliminate in the search for stability.

Tip of the Day: Recent Files

2025-07-02 08:00:21

Windows' "Recent Files" folder can help you remember where files and other recently-accessed objects are.

Ever forget where you put something? Maybe you've downloaded or scanned something and can't recall which folder it was placed in.

Even if it's not displayed directly in Windows File Explorer, Windows' "Recent Files" folder of shortcuts might help.

You can navigate there by going to:

C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Recent

In my case, that happens to be a folder full of shortcuts to files I've recently accessed.

Recent items
The "Recent items" folder in Windows File Explorer. Click for larger image. (Screenshot: askleo.com)

It's convenient to sort the list by time (just click on the "Date modified" column header once or twice) to put the most recent at the top.

If this is something you do often, you might consider creating a desktop shortcut to the folder.

Note: If you have the "Show recently used files" option turned off for privacy, this folder will likely be empty.

Tip of the Day: Emergency Restart

2025-07-01 08:00:12

There's a deeply hidden last resort if your machine refuses to shut down or restart properly.

Applies to Windows: 11, 10

(Animation: askleo.com)

We've all been there: your machine won't shut down no matter what you do. Something is preventing shutdown somehow.

If

Then try this:

That initiates emergency restart.

If that doesn't work? Then it's time to reach for that power button.

How to Get Data Off a Hard Drive in a Dead Computer

2025-06-30 08:00:32

Extracting data from a hard drive in a dead computer shouldn't be too difficult (unless it's the drive itself that caused the problem). I'll walk you through some of the options and steps you can take.

There are several techniques.

by

Extracting data from a hard drive in a dead computer shouldn't be too difficult (unless it's the drive itself that caused the problem). I'll walk you through some of the options and steps you can take.
Dead Computer
(Image: canva.com)
Question: My computer died on me. I can't get it to boot up. I need to take the hard drive out and pull my files off it. How do I retrieve the files from the hard drive in my dead computer? Thanks for any help you can give me.

This is a pretty common scenario. Depending on what caused the computer's demise, there's a relatively good chance you can retrieve the information off that hard drive.

Of course, if it's the drive itself that caused the failure, things get a little more challenging.

There are several approaches to this problem. I'll start with my favorite: not needing to do it at all.

TL;DR:

Dead computer data recovery

If your computer dies, you can often get your files by removing the hard drive and placing it in a USB enclosure to connect to another computer. If that fails, you might try repair tools or data recovery services. Backups are the best way to avoid this mess in the first place.

Use a recent backup

By far the simplest solution to this problem is not needing to solve it at all.

A good backup strategy can almost eliminate the need to recover anything from a hard drive in a dead computer.

Using another computer, or after the dead computer has been repaired:

Unfortunately, most people don't have a comprehensive backup plan in place. There are also other reasons — like a last-minute change that was important but not yet saved online — that might still require retrieving data off the dead drive.

So we'll give that a try.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Attempt repair

If you can boot the machine into safe mode, then the place to start is to run CHKDSK /R on the drive. That will scan the disk for surface errors that can cause the disk to become inaccessible.

If you can't boot at all or if CHKDSK doesn't help, and this is a traditional magnetic hard drive (i.e., not a solid-state drive), it might be worth buying SpinRite to see if it can repair the drive. (If not, you can get your money back.) SpinRite boots from its own media and can attempt to both diagnose and possibly repair errors on the disk surface.

If those options don't work or don't help, it's time to try something else.

Get an external drive enclosure

Perhaps the most flexible way of dealing with a hard drive in a dead computer is to purchase a USB drive enclosure. These are almost identical to any external USB drive, except there's no drive inside.

You need to get the correct size of enclosure for the physical size of your drive.

Different HD Drive Sizes
Two common hard-disk drive sizes.

Current traditional magnetic hard drives are either 3.5 inches or 2.5 inches wide, and the enclosure must match.

SSDs come in two form factors as well: one that is physically the same as a 2.5-inch traditional hard drive, and the newer m.2 format.

m.2 SSD
m.2 Solid State Drive. Click for larger image. (Credit: David290 via wikimedia commons.)

Once you have the right size, it's relatively simple to install the drive into the new drive enclosure. Not only do you have a way to access the drive, but it's portable: you can access your data on whatever computer you have available.

After you've recovered the data you care about, that drive can have a useful second life as an external drive. Perhaps you can use it to create the backup strategy that might have saved you from this pickle to begin with. đŸ'‚

If the drive fails to work in the external enclosure — perhaps it shows up as unformatted when you connect it to another computer or doesn't show up at all — then it's probably time to consult a technician or data recovery service.

Permission denied!

When moving a drive from system A (which had a problem) to system B (where you're trying to recover the data), you may connect it to system B only to find that, although you can see that the drive is there and has files, you're not allowed to see any of them.

Not to worry.

As long as you can log in to system B with an account that has administrative privileges, you'll be able to take ownership and/or change the permissions associated with the files so you can read, copy, back up, or do whatever you like with them.

This applies to any drive moved from one system to another, whether it's installed internally or externally, regardless of the reasons you've moved it. The permissions on the drive are relative to its original system and must be adjusted for the new system.

How Do I Gain Access to Files that Windows Says I Don't Have Permission to Access? shows you how.

Podcast audio

Tip of the Day: Know Where Your Files Are

2025-06-30 08:00:12

Knowing where your files are stored can make the difference between being able to access them or not.

With internet connectivity so widespread, particularly with mobile devices, it's often unnecessary to know or care whether a file you're looking at is on your device or somewhere in the cloud.

Until it matters.

If connectivity suddenly disappears — after a natural disaster of some sort135, or if you travel to an area where there is no internet136 — you may find that files you expect to find on your device are inaccessible because they were never on your device.

For example, your email is probably not on your mobile device. Certainly, not all your email is there; instead, it is downloaded from the online mail server as needed. Perhaps more urgently, if you keep, say, a medication list in a note-taking application that you need in an emergency, you may find it's not stored on your phone but fetched from the cloud as needed.

As long as the cloud is there, of course.

Depending on what applications you use and what information you're concerned about, there are often options or alternatives that store your information on your device rather than relying on the cloud. That way, should your internet disappear for any reason, that information remains accessible as long as your device has power.

How do you set that up? I can't give you a general "do this" set of instructions because it varies based on your devices, apps, and files. What I suggest is that you put your device into airplane mode or otherwise disconnect the internet, and then see if you can access the files you think you can.

It's great to have important documents available on your mobile device, but you need to make sure that those files are actually on your device.

Footnotes & References

140: Here in the Pacific Northwest, the major disaster scenario we plan for is the big earthquake. Regardless of what your risk might be, plan for the scenario when your landline phone, mobile phone, mobile data, and home or business internet will all fail, and you will have no internet connectivity.

141: Or just really, really bad internet, as I experienced when trying to update this tip.

Core vs. Logical Processors: What Really Powers Your CPU?

2025-06-28 08:00:52

Your computer's CPU is a complex piece of circuitry trying to maximize how much it can do and how quickly it can do it. I'll outline one of the techniques that makes a single CPU core look like two.

What goes on inside.

by

Your computer's CPU is a complex piece of circuitry trying to maximize how much it can do and how quickly it can do it. I'll outline one of the techniques that makes a single CPU core look like two.
Stylized computer CPU chip.
(Image: depositphotos.com)
Question: Hi Leo, what's the difference between a core and a logical processor? For instance, I have two laptops, one with an I7 12th-generation, 32 gigs of RAM with 10 cores and 12 logical processors; and one with an i7 11 gen, 32 gigs of RAM with four cores and eight logical processors. What's the difference between a core and a logical processor? Thanks.

The CPU, or Central Processing Unit, in your computer is amazingly complex. That 11th-generation i7 CPU has over 19 billion transistors. I realize that's mostly meaningless unless you know what a transistor is or does, but it's kinda like having 19 billion tiny on/off switches in a space less than half of a square inch (276 mmČ).

Some of those switches set up a feature that defines the difference between a core processor and a logical processor.

TL;DR:

Cores vs. logical processors

A core processor is a real hardware engine that runs a set of steps in sequence. Hyper-threading lets a core juggle two tasks at once, fooling Windows into seeing two "logical" processors. CPUs often have more than one core, and many (though not all) cores are hyper-threading capable, making it look like your computer has more logical processors than it has cores.

This is not a primer on CPU architecture. As with so many of my explanations, this is a high-level overview meant to describe some of the common underlying concepts in terms more people can understand. By definition, it'll be wrong around the edges and in the picky details.

CPU Ambiguity

Before I dive in, we need to talk about a little ambiguity in terms: specifically what "CPU" means.

CPU, or "Central Processing Unit", can refer to:

One thing it is not is the computer as a whole. Regardless of the ambiguity above, "CPU" never refers to a box. It's always a chip, or a part of a chip, on the motherboard of your computer.

I'll try to stick to "CPU chip" when I mean the physical chip, and "CPU" when the distinction is less important.

A core

A core is (normally) a single processing engine that takes a sequence of instructions and executes them one step at a time. A core might be given instructions such as:

  1. Take the number 23.
  2. Fetch the number in RAM location 1,033,000.
  3. Add these two numbers.
  4. Store the result in RAM location 4,442,223.
  5. Add 23 to the result.
  6. Store the result in RAM location 5,444,234.

And so on. Boring, but this level of granularity — simple math, logical operations, RAM access, and so on — is what makes your computer do all the fantastic things it does, even though it's just doing one thing at a time. Doing one thing at a time is referred to as being single-threaded.

Needless to say, it does these tasks very, very quickly. While CPU clock speed isn't one-for-one (some steps take longer to carry out than others), a reasonable visualization is that a 3Ghz processor is capable of performing three billion simple operations (like addition) every second.

Of course, that's not fast enough.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Hyper-threading

Also known as "simultaneous multi-threading"137, hyper-threading is a technique where a single core can sometimes do two things at once. A metaphor might be a single person with two hands. Often, you need both hands to do one thing, but sometimes you can do two different things with each hand.

For example, here are two sequences of operations, or threads, running at the same time on a single processor.

Step Thread 1 Thread 2
1. Take the number 23. Fetch the number in RAM location 45,000,001
2. Fetch the number in RAM location 1,033,000. Increment it by 1
3. Add these two numbers. Store the number in RAM location 45,000,002
4. Store the result in RAM location 4,442,223. *idle*
5. Add 23 to the result. Fetch the number in RAM location 45,000,003
6. Store the result in RAM location 5,444,234. *idle*
7. Subtract 14 from the result. Store the number in RAM location 45,000,001

In this example, the "store and fetch things from RAM" part of the CPU and the "perform simple arithmetic" part of the CPU are two separate things.

In single-threading, we can use only one at a time. In hyper-threading, we can use both at the same time, simulating two completely separate things at the same time. The two threads of execution above, for example, do two completely separate things at the same time by coordinating how the CPU's resources are used.

It's not perfect. Note that Thread 2 had to stop at step 4, and again in step 6, and wait; it wanted to fetch or store something in RAM, but Thread 1 was using the "store and fetch things from RAM" part of the CPU at that same time. Once Thread 1 moved on to an arithmetic operation, Thread 2 could move on to the RAM fetch.

It's a single CPU, but it's doing two things at once. Sort of.

The operating system views this as two separate logical processors, even though there's really only one, allowing it to use them for true multi-tasking.

Multi-core

Your computer can have multiple cores. In fact, these days it almost certainly does. The desktop computer I'm using right now has 16 cores. Using the original definition of a simple, single-threaded core, it can do 16 things at once.

These cores are also hyper-thread capable. Thus, while my desktop has 16 cores, it "looks like" it has 32 logical processors.

CPU Usage Graph from Process Explorer.
CPU usage graph from Process Explorer. Click for larger image. (Screenshot: askleo.com)

Here's an interesting "catch", though. You pointed out that your 12th-generation I7 processor has 10 cores and 12 logical processors. Not all cores are hyper-threading capable. It looks like only two of the 10 cores on your processor are, and thus you end up with 12 logical processors.

Multi-CPU

So far, I've referred to cores and logical processors that all live on a single chip in your computer.

A single CPU chip.
A single CPU chip. Click for larger image. (Image: canva.com)

A single physical chip can contain multiple cores. If hyper-threading is involved, it can contain more logical processors than there are cores. For example, my 16-core, 32-logical processor machine contains a single CPU chip.

A computer can also contain multiple physical CPU chips. This is uncommon for home and small businesses, but not that uncommon at an industrial data-center scale. While the operating system sees all chips and cores, it primarily operates on what it sees as a large collection of available logical processors.

Podcast audio

Footnotes & References

142: Hyper-threading is technically an Intel term. I'll use it throughout, though, to refer to the concept generically, regardless of CPU manufacturer.

What Happens If You Click a Bad Link?

2025-06-27 08:00:11

Accidentally clicking a malicious link might be benign if you catch it soon enough. I'll review what makes the difference, and what steps you need to take next.

What to do in that moment of regret.

by

Accidentally clicking a malicious link might be benign if you catch it soon enough. I'll review what makes the difference, and what steps you need to take next.
Regret
(Image: canva.com)
Question: What do you do if you click on a phishing link? Am I screwed?

It depends on exactly what happened, and, more importantly, what you did next.

TL;DR:

Clicking on a bad link

The most common result of clicking on a malicious link is that you'll be taken to a fake site asking you to sign into one of your online accounts. As long as you don't, chances are you'll be fine. If you do mistakenly provide your credentials, your account could be hacked in moments. Complex phishing attempts may attempt to download and install malware. In all cases, take steps to recover and secure your accounts and your device.

A click is just a click, usually

Most of the time, clicking a link just brings up a webpage.

In a phishing attempt, the webpage may look like a site you recognize, but it won't be that site at all. For example, the link may claim to be PayPal, and the page you land on may look like PayPal, even though it's not PayPal at all.

Nine times out of ten, it'll look like a sign-in page, and you'll be asked to sign in to the account the page is trying to look like. With our PayPal example, that means you'll see what looks like a PayPal sign-in page, and you'll be asked to enter your PayPal credentials.

DON'T.

As long as you don't try to sign in, not much has happened. Your browser's displayed a webpage, and that's all.

Immediately close the tab containing the fake page. Most phishing attempts merely ask for your credentials. As long as you don't enter them, all is usually fine.

Ask Leo! is Ad-Free!
Help keep it going by becoming a Patron.

Sign-in failed

If, on the other hand, you did attempt to sign in to the fake site using your credentials for the site it was attempting to impersonate, things are much worse.

As soon as you attempted to sign in to the fake page, you essentially handed over your login credentials to the hacker.

The moment you realize what happened:

If you can't sign in, the hacker behind the (now successful) phishing scheme may have already changed your password. If so, your account has been hacked.

You'll need to follow the account recovery instructions provided by the service and attempt to get your account back. If you do, change your password and review your account recovery information in case the hacker changed it.

Malicious activity

Once you're in the account, you also need to review several critical things.

Downloaded information

If the hacker downloaded copies of whatever is in your account, you need to consider how much of a problem that might be. There's no way to know if they actually did this, but you should be prepared. It could be as simple and as common as downloading your contacts. However, if your account has access to private data, consider the possibility that this data is now in the hacker's hands. What you do next will depend on your situation.

Unauthorized transactions

Check your account for emails you didn't send, transactions you didn't make, or other activities you did not initiate. Particularly with financial accounts, like our PayPal example, all the hacker needs to do is transfer money out of your account before you notice. The sooner you do notice, the greater the chance you can recover.

The chain of account access

Review whether having access to the contents of your account would alert the hacker to other accounts you have, and what might be valuable in those other accounts. Your email account can be a gateway to many other accounts, including financial ones. For example, they might perform account recovery ("I forgot my password") on other accounts you have, hacking into them because they have access to the account recovery email.

Malware delivery

It's rare these days, but accidentally clicking on a phishing link can cause malware to be downloaded and run on your computer.

While it's serious, it's not something I worry about a lot. Normally, you'll get plenty of notices from your browser or security software.

However, if you suspect this might be the case, run a complete anti-malware scan to see if there's anything out of place on your machine.

Hopefully, nothing will turn up.