Articles tagged: answercast 106
Do You Recommend a Transfer Cable for Transferring Files from My Old Computer to My New One?
Transferring information from an old computer to a new one is a problem we all face every so often. I’ll touch on a couple of approaches, and then describe what I do, and recommend.
Would changing user names result in additional security?
Common wisdom is that you should change passwords periodically; so should you change user names too? My take: common wisdom is wrong from the start.
Where do attachments live once they’re sent?
Once an email is sent it, and the attachments it might include, are copied to a sequence of servers until they reach the destination inbox. Most importantly, once it leaves your machine, it leaves your control.
How do I open an .isc file in Outlook.com?
Outlook and Outlook.com are two different and unrelated programs. But once we get past a possible typo, they can both handle ics, not isc, files.
Do I need Windows Live Essentials?
Windows 7 often comes with several pre-installed components that were part of the Windows Live Essentials package. They’re not required to run Windows, and can be uninstalled or replaced with more recent components.
Why Do Services like Google and Microsoft Ask for a Phone Number?
Many online services request that you provide additional information such as your phone number. I’ll look at how that’s typically used and why it’s a good thing.
I Canceled a Suspicious Download. Am I Safe?
Cancelling a suspicious download in progress typically prevents any part of the download from impacting your machine. Unfortunately there are still a few problems we should look out for.
Do Gmail Preview Images Pose a Security Risk?
Gmail occasionally includes preview images of attachments that are included with an email. Rather than being an additional risk, when present, these preview images can help keep you safer.