Articles tagged: answercast 107
The “potentially unprotected” warning seems fairly common in situations where you really are still protected. I’ll cover several theories as to why it might appear.
Fragmentation is about how a file is stored on a disk and is not preserved across a copy. In fact, in some cases you can defragment a hard drive using copy.
It’s natural to want to find who hacked your email and why. Begin by recovering and securing your account. But then, just let it go. There’s almost nothing you or I can do to find out who hacked you.
If you don’t have installation or recovery media then you’ll need to take additional steps to prepare for the day you might need to reset to factory settings. Additional steps using software that I hope you already have.
You plug a new monitor into a laptop with a broken screen and still can’t see anything! You may need to tap a few magic keystrokes to turn it on.
Compacting should be completely transparent. It makes files smaller and potentially makes access of email a little faster. There is one dramatic exception.
There are in fact utilities that can do an actual clone of your computer, but I would prefer you move to a more traditional image backup system.
Image backups are excellent protection against almost all forms of data loss. They’re not really intended to make transferring to a new computer easier, though in rare circumstances they can come in handy for that too.
Whenever we use an online service, such as an online backup, we’re trusting that they’re doing what they say they do: keeping our information secure.
Outlook doesn’t keep its own time. Outlook uses the system time. The real issue here is understanding where the “time” comes from when you receive an email.