A picture is worth a thousand words, and a screenshot – an image of your computer screen, saved as a picture – can eliminate a lot of frustration when trying to describe to someone what you’re seeing on your computer.
The Best of Ask Leo!
Free email services and accounts are convenient and ubiquitous, and can be used safely, if and only if you take responsibility for that safety.
An “Internal Server Error” happens within the web server attempting to show you an HTML page. It’s typically a server-side problem out of your control.
Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.
Chargers and power supplies come in a wide variety of configurations. Choosing the right one is important. I’ll look at a few of the parameters.
Email account theft is rampant. If it happens to you, there are several steps you need to take — not only to recover your account, but to prevent it from being easily hacked again.
Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.
If you’re not getting spam now, you will soon — and probably lots of it. What can you do? There’s no magic answer, but there are various things you can do to help.
Taking a few steps immediately after you unbox your new computer can save you a lot of time, effort, and data loss later.
It’s not uncommon to run out of disk space. A free utility can show where your disk space is going so you can determine what steps to take.
Most email programs can block email from a specific address. Unfortunately, blocking email from a sender is ineffective when it comes to spam.
Password security has never been more important. With occasional security breaches at service providers and rampant email account theft, make sure you’re choosing and using secure passwords.
Occasionally, one program uses up all of your computer’s processing resources. Using Task Manager, it’s easy to figure out which program that is.
It is sometimes possible to recover a file deleted by accident. Stop using the disk, check your Recycle Bin, and perhaps pull out an undelete utility.
Every so often, the Windows Print Queue gets “stuck”. Everything looks like it should print, but it won’t. We’ll clear that up.
POP, POP3, and SMTP are all acronyms used in configuring email. We’ll look at what they mean and how they relate.
Booting your machine can take time, but sometimes so does shutting it down. Various issues contribute to a slow shutdown.
A home network allows you to share a single internet connection, as well as data and devices, between multiple devices. I’ll review the basics components of a home network and some steps to take as your network grows.
Reporting spam in your email program with the spam button is critical. Reporting it by forwarding it somewhere isn’t going to do any good.
Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.
If you connect without a password to an open Wi-Fi hotspot and can see anything at all, it’s not a secure connection.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
Hacking into someone’s account is often seen as an answer to some problem. In reality, all it does is open a can of worms and put you at risk.
It used to be that simply viewing a malformed email could allow a virus to spread. Thankfully, that’s no longer the case with modern mail programs.
So-called “supercookies” and “evercookies” track the websites you visit, even if you regularly disable or flush normal cookies.
Here are the steps you need to take to prevent losing your account – forever – to a hacker.
Unless you’re willing to pay a lot of attention on a very regular basis, automatic updates are an important part of keeping your machine safe.
Manhole covers? Really? Interviewing for technical positions can be tricky, but it can also be fun, if you know what interviewers are looking for.
Even though they share similar names and do similar things, Outlook and Outlook.com are actually not related at all.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
While there are settings and services that claim to be able to determine if an email has been opened, they are notoriously unreliable and pointless.
Link-shortening services make it hard to tell a link’s final destination. When you receive one in an email, you may want to do some detective work to see where it’s going – before you click.
The internet has a very long memory. Removal from search engines is practically – perhaps even literally – impossible.
A lack of sound can happen for a variety of reasons. I’ll review the common things to look for if your computer isn’t making sound.
HTTPS provides validation and encryption, two important pieces of security. Using it for everything is possible but costly, and issues would remain.
You avoid ransomware the same way you avoid any malware. On top of that, a full backup can save you not only from ransomware, but from a host of other problems as well.
Internet safety is difficult, yet critical. Here are seven key steps to keep your computer safe on the internet.
Password management utilities are great tools to not only manage your passwords, but be more secure about how you use them.
Many hotels offer both wired and wireless internet, but along with those hotel internet connections comes a security risk most folks don’t consider.
Being a computer programmer can be a fun and rewarding profession. Here’s my take on what it takes to get there; some aspects are obvious, and others are not.
Some malware goes to great lengths to prevent you from downloading, running, or applying a fix. I’ll tell you what steps to take.
Even with up-to-date anti-malware tools, you can still fall victim to malware. I’ll explain why by comparing your computer to your … bathroom.
Your router is your first line of defense against malicious attacks from the internet. But do you have a secure router? I’ll review the important settings.
It’s tempting to just use file-copy tools to back up what you think you need. But if you’re not careful, you could easily miss something very important.
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
Perhaps most importantly, stop believing it.
Using different passwords on different sites is not only good practice – it’s actually necessary to keep your accounts safe. I’ll review why, and how best to handle a plethora of passwords.
As security compromises happen regularly, many are asking, “Is the cloud too dangerous?” It’s as safe as you make it.
Open Wi-Fi hotspots at coffee shops, airports, and other public places are opportunities for hackers to steal information and more. I’ll review how to stay safe.
Backing up your computer is critical to avoiding data loss. I’ll look at what it means and give a suggestion for average users.