Articles tagged: answercast 106
There are several approaches to password-protecting a flash drive, one of which might be designed for exactly the task at hand.
Transferring information from an old computer to a new one is a problem we all face every so often. I’ll touch on a couple of approaches, and then describe what I do, and recommend.
Common wisdom is that you should change passwords periodically; so should you change user names too? My take: common wisdom is wrong from the start.
Once an email is sent it, and the attachments it might include, are copied to a sequence of servers until they reach the destination inbox. Most importantly, once it leaves your machine, it leaves your control.
Outlook and Outlook.com are two different and unrelated programs. But once we get past a possible typo, they can both handle ics, not isc, files.
Windows 7 often comes with several pre-installed components that were part of the Windows Live Essentials package. They’re not required to run Windows, and can be uninstalled or replaced with more recent components.
Many online services request that you provide additional information such as your phone number. I’ll look at how that’s typically used and why it’s a good thing.
Cancelling a suspicious download in progress typically prevents any part of the download from impacting your machine. Unfortunately there are still a few problems we should look out for.
Gmail occasionally includes preview images of attachments that are included with an email. Rather than being an additional risk, when present, these preview images can help keep you safer.