Articles in Category: Security

"The app you’re trying to install isn’t a Microsoft-verified app"

How Do I Fix “The App You’re Trying to Install Isn’t a Microsoft-Verified App”?

“The app you’re trying to install isn’t a Microsoft-verified app” message is the result of a simple setting you can change.

Password

How to Use Just a Single Password for Everything

It’s very tempting to use only a single password everywhere. That’s dangerous, and there are better alternatives.

A photorealistic thumbnail image representing document security. The scene shows a computer screen with a Microsoft Word document open, indicating the process of password protecting the document. Beside it, a zip file icon represents password-protected archives. In the background, a virtual safe or vault symbolizes advanced encryption methods like VeraCrypt or Cryptomator. The image conveys the importance of strong encryption and backup for document security, suitable for a 16:9 aspect ratio.

How Can I Password Protect My Documents?

There are several options to keeping information private on your computer.

A photorealistic image in a 16:9 format, showcasing a close-up view of a computer screen. The screen prominently displays a large, modern-style "Sign Out" button. This button is designed to stand out with a vibrant color, possibly red or blue, against a soft, blurred background of a typical desktop interface. The background may include faint outlines of icons, folders, and other typical desktop elements, but the focus is clearly on the "Sign Out" button, symbolizing the action of logging off or exiting a digital space.

How Do I Prevent a Service From Logging Me in Automatically?

Preventing someone else from accessing your account is as easy as signing out before you leave.

A photorealistic 16:9 image illustrating a scenario where a person of Caucasian descent is handing over a digital key to a family member of African descent. The scene is set against a background filled with subtle symbols and icons representing recovery options like emails and phone numbers, emphasizing the emergency access options for passkeys. This image conveys the idea of digital legacy and the importance of ensuring trusted individuals have access to digital assets in emergency situations, highlighting the role of passkeys in modern digital security.

Passkeys and Disaster Planning

Passkeys are new, convenient, and secure. I’ll review how they affect your disaster planning. (Not very much.)

Virus, yes or no?

How Do I Tell If an Attachment Is a Virus?

You can’t prove a file isn’t malicious, but you can certainly stack the deck in your favor.

About VeraCrypt

Why Won’t My VeraCrypt Volume Back Up?

When using VeraCrypt containers, the default setting may interfere with backing up your container. Here’s how to fix that.

Photorealistic image showing a close-up of a computer monitor. On the screen, there's a detailed icon of a folder with the label 'Personal' written below it. A large, bold red question mark overlays the folder, creating an aura of uncertainty or concern. The background of the screen is a soft gradient of gray, giving emphasis to the folder and the question mark.

Can I Password Protect a Folder?

Keeping data secure is important. Being able to password-protect a folder seems an obvious approach. Unfortunately, it’s not that simple.

Frustration at a laptop.

My Computer Is Infected With Malware. Should I Just Throw It Out?

Malware is just software. It doesn’t destroy your computer’s hardware in any way. Some work will get you back up and running without needing to destroy anything.

Safety Net

How Should I Keep Recovery Codes Secure?

Recovery codes protect you against account loss. The issue? Where to store them safely.

A padlocked folder.

Password Update Without Re-encrypting: How?

If your password is used to encrypt your hard disk, how can you change your password and still be able to decrypt your disk?

Open view...

Preparing for the Ultimate Disaster

If you’re not around to unlock all the digital data you take such care to secure, who will be able to access it, and how?

There's more to ransomware than just encryption.

Should I Disconnect My Backup Drive When I’m Not Backing Up?

Some people disconnect their backup drive when not backing up because they fear ransomware. I explain why that’s a Really Bad Idea.

Peeking at your keystrokes

Can Everything I Do Online Be Monitored at the Router?

While it’s not easy, your internet traffic can be monitored at or near your router. I’ll look at how this might be done.

Padlocked Google

Google Account Hacked? What You Need to Do NOW!

Google/Gmail account hacks happen. Take these steps to recover your account and prevent it from being hacked again.

Bitwarden Sign-In Error

What Should I Do If I Lose Access to My Password Vault?

Losing access to your password vault is something you can recover from.

Moleskin notebook with notes.

No, Don’t Write Down Passwords

The world’s largest magazine dispensed some bad tech advice. Here’s why I so strongly disagree.

Malware

Do I Need More Than One Anti-malware Tool?

It’s tempting to think more is better when it comes to security software. In reality, too many can cause trouble.

Extracting a Password

Is It Really That Easy to Get Someone’s Password?

We’ll look at some ways that someone else could access your account — or at least look like they have.

Windows Remote Desktop setting

Does Turning Off Remote Access Keep Me Safer?

Turning off remote desktop is incrementally safer, but it is a very small piece of a much larger puzzle.

Download Button

Is It Safe to Download from Download Sites?

Download sites are just too risky these days. Don’t use them unless there is no way to avoid them, and even then, be very careful in your selections.

PuTTYgen

How Do I Create and Use Public Keys with SSH?

SSH and SFTP Public Key Authentication requires you to create a public/private key pair. We’ll look at how to create and then use those keys.

One kind of dictionary.

What’s a Dictionary Attack?

A dictionary attack is a common brute-force way of achieving a hacker’s goal. The goal of a dictionary attack could range from compromising your system to sending spam.

a passphrase as good as a password?

How Can Four Random Words Possibly Be More Secure Than 16 Random Characters?

Passphrases are just as secure as passwords — perhaps even more so — and are easier to remember if needed.

Privacy?

Every Application Adds Risk

Everything you download adds risk. Be safer using my three guidelines.

Asymmetric Encryption concept

What Is Public Key Cryptography?

Public key encryption is the workhorse of security online. I’ll review just what it is and how it’s used at a high level.

YubiKey

How Does a Hardware Security Key Like YubiKey Work?

Hardware security keys like YubiKey provide an extra-secure level of two-factor authentication.

Delete Button

Can’t I Just Delete My Hacked Account?

Deleting an account you don’t have access to is kind of the same as deleting an account you don’t own.

Privacy Settings

Privacy Begins with the Operating System

Your operating system sees everything you do—and that means it holds the keys to your privacy. I’ll look at how much trust you place in Windows, Mac, Linux, or mobile systems, why that matters, and what steps you can take to protect yourself wisely.

Two Factor Authentication

Why ANY Two-Factor Is Better than No Two-Factor

Headlines are proclaiming that two-factor authentication has been hacked. That in no way means you shouldn’t use it. Your account is still much safer with two-factor enabled.

LastPass?

Can I Still Use LastPass Safely?

Selecting another password manager is now the common recommendation. I’ll review what you can do if you elect to keep using LastPass.

Is “Juice Jacking” Real?

The FBI released a warning against “juice jacking”, but is it really something you need to worry about?

Hacked!

My Computer’s Been Compromised. What Should I Do?

The news is grim if someone’s broken into your computer, but there are steps to take to prevent it from happening again.

AI generated robot at a keyboard.

Will AI Crack Your Passwords?

We’re seeing AI associated with many things. Cracking your passwords is now on the list.

Password Management

What’s the Best Password Manager in 2025?

Overwhelmed by too many password manager choices? I’ll walk you through the best current options, what makes them different, and how to pick the one that fits you best. The most important step? Start using one today for safer, easier, and more-secure logins.

Credit Cards

How Do I Prevent Credit Card Theft?

There are some practices to help you avoid having your credit card compromised, but most card theft is out of your control.

Malware

Can I Check for Malware before Downloading Something?

Files cannot be checked for viruses before being downloaded, but there are precautions you can and should take.

Dominos

If Someone Gets Into My Gmail Account, Can They Get Into Others?

Like a row of dominos, gaining access to one account can lead to others being compromised.

You're a target.

Why You — Yes, You — Are a Target of Hackers

Even if your bank account is zero or you’re just not that interesting, hackers are still after your accounts. Here’s why, and what you can do.

Facial recognition, conceptual.

Are Facial Recognition and Fingerprint ID Safe?

Facial recognition and fingerprint ID are quick, convenient approaches to signing into or unlocking your devices. But are they safe enough?

Encryption, conceptual

What Encryption Software Do You Recommend?

There are many different tools for encryption. The right one depends on what you’re attempting to accomplish.

Extracting a Password

Why Is It Important to Have Different Passwords on Different Accounts?

Using a different password for every login is crucial — and it doesn’t have to be difficult.

Virus Detected!

Where Do Viruses Come From?

Email viruses come from many sources, and it’s not easy to trace them.

Brute Force

How Can a Hacker Try All Possible Passwords If Systems Block Failed Login Attempts?

Some hackers go for the low-hanging fruit and try the most common passwords, but there is one scenario where brute force works very well.

1password.com homepage.

Setting Up 1Password

How to get started with 1Password and the most important action to take.

Password list

Your 6 Strongest Practical Password Techniques, Ranked

Six practical approaches to generating passwords, ranked from best to worst.

A Long Password

How Long Should a Password Be?

For years, the standard practice has been to assume that eight-character passwords made up of sufficiently random characters was enough. Not any more. Not even close.

Malare Found!

How Do I Remove Malware from Windows 10 or 11?

Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.

Malware Detected

It Pays to Be Skeptical

If we would all be a little more skeptical, we’d be safer and the internet would be a more trustworthy place.

Hacked!

12 Steps to Keep from Getting Your Account Hacked

Here are the steps you need to take to prevent losing your account forever to a hacker.