Articles tagged: bestof

USB Thumb Drive

How Do I Password-protect a Flash Drive?

There are several approaches to password-protecting a flash drive, one of which might be designed for exactly the task at hand.

Moving the Windows Taskbar Back to the Bottom

How Do I Move the Taskbar Back to the Bottom?

Occasionally, the Windows taskbar can end up on either side (or even the top of) your screen. I’ll show you how to move the taskbar bar back to the bottom.

A Drive with All My Data is Showing as Unformatted — What Do I Do?

Occasionally, when moving a drive to another machine, it’ll show up as unformatted. I’ll look at some possible causes and actions to take.

The Snipping Tool

What’s a Screen Shot and How Do I Make One?

A picture is worth a thousand words, and a screenshot – an image of your computer screen, saved as a picture – can eliminate a lot of frustration when trying to describe to someone what you’re seeing on your computer.

Are free email services worth it?

Are Free Email Services Worth It?

Free email services and accounts are convenient and ubiquitous, and can be used safely, if and only if you take responsibility for that safety.

Internal Server Error

What’s an “Internal Server Error” and How Do I Fix It?

An “Internal Server Error” happens within the web server attempting to show you an HTML page. It’s typically a server-side problem out of your control.

BoxCryptor Storage Model

BoxCryptor: Secure Your Data in the Cloud

Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.

USB Charger

Can I Use a Charger that Provides the Same Voltage but a Different Amperage?

Chargers and power supplies come in a wide variety of configurations. Choosing the right one is important. I’ll look at a few of the parameters.

No Spam

Why Is There so Much Spam?

Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.

How Do I Get Rid of All this Spam?!?!

How Do I Get Rid of All this Spam?!?!

If you’re not getting spam now, you will soon — and probably lots of it. What can you do? There’s no magic answer, but there are various things you can do to help.

Your New Computer

The First Eight Things to Do with Your New Computer

Taking a few steps immediately after you unbox your new computer can save you a lot of time, effort, and data loss later.

Why Doesn’t Blocking Email Senders Work?

Most email programs can block email from a specific address. Unfortunately, blocking email from a sender is ineffective when it comes to spam.

Password

How Do I Choose a Good Password?

Password security has never been more important. With occasional security breaches at service providers and rampant email account theft, make sure you’re choosing and using secure passwords.

Recycle Bin & Restore

I Deleted a File by Mistake, Can I Get It Back?

It is sometimes possible to recover a file deleted by accident. Stop using the disk, check your Recycle Bin, and perhaps pull out an undelete utility.

Print Spooler Properties

How Do I Remove a Document Stuck in My Printer’s Queue?

Every so often, the Windows Print Queue gets “stuck”. Everything looks like it should print, but it won’t. We’ll clear that up.

Mailbox

What is POP? Or POP3? And what about IMAP and SMTP?

POP, POP3, and SMTP are all acronyms used in configuring email. We’ll look at what they mean and how they relate.

Waiting

Why Does My Machine Take Forever to Shut Down?

Booting your machine can take time, but sometimes so does shutting it down. Various issues contribute to a slow shutdown.

Spam word cloud

Am I Wasting My Time Reporting Scam and Spam Emails?

Reporting spam in your email program with the spam button is critical. Reporting it by forwarding it somewhere isn’t going to do any good.

Stop Cyber-Bullying

What Do I Do if I’m Being Harassed, Bullied, or Stalked Online?

Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.

Wireless Connection

Does a Login Page on an Open Wi-Fi Hotspot Mean it’s a Secure Connection?

If you connect without a password to an open Wi-Fi hotspot and can see anything at all, it’s not a secure connection.

Virus Detected!

Why Don’t Anti-malware Tools Work Better?

It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?

Extracting a Password

How Do I Hack Someone’s Account?

Hacking into someone’s account is often seen as an answer to some problem. In reality, all it does is open a can of worms and put you at risk.

Virus

Can I Really Get Malware by Just Looking at Email?

It used to be that simply viewing a malformed email could allow a virus to spread. Thankfully, that’s no longer the case with modern mail programs.

Healthy Computer

Are Automatic Updates a Good Thing?

Unless you’re willing to pay a lot of attention on a very regular basis, automatic updates are an important part of keeping your machine safe.

Why Are Manhole Covers Round?

So Just Why Are Manhole Covers Round?

Manhole covers? Really? Interviewing for technical positions can be tricky, but it can also be fun, if you know what interviewers are looking for.

Outlook.com Logo

How Do Outlook and Outlook.com Relate?

Even though they share similar names and do similar things, Outlook and Outlook.com are actually not related at all.

Using a Credit Card Online

Online Shopping – Just How Safe Is It?

Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?

Investigate

Is There a Way to Know Where a URL-shortened URL Is Going to Take Me?

Link-shortening services make it hard to tell a link’s final destination. When you receive one in an email, you may want to do some detective work to see where it’s going – before you click.

https

Why Can’t We Use https for Everything?

HTTPS provides validation and encryption, two important pieces of security. Using it for everything is possible but costly, and issues would remain.

Internet Safety: 7 Steps to Keeping Your Computer Safe on the Internet

Internet Safety: 7 Steps to Keeping Your Computer Safe on the Internet

Internet safety is difficult, yet critical. Here are seven key steps to keep your computer safe on the internet.

Vault

Are Password Managers Safe?

Password management utilities are great tools to not only manage your passwords, but be more secure about how you use them.

Hotel Internet spying?

Can Hotel Internet Traffic Be Sniffed?

Many hotels offer both wired and wireless internet, but along with those hotel internet connections comes a security risk most folks don’t consider.

Programming video games is very different...

How Do I Become a Computer Programmer?

Being a computer programmer can be a fun and rewarding profession. Here’s my take on what it takes to get there; some aspects are obvious, and others are not.

Virus Detected!

How Do I Remove a Virus If It Prevents Me from Downloading or Installing Anything?

Some malware goes to great lengths to prevent you from downloading, running, or applying a fix. I’ll tell you what steps to take.

Peek

Why Wouldn’t an Exploit be Caught by My Anti-malware Tools?

Even with up-to-date anti-malware tools, you can still fall victim to malware. I’ll explain why by comparing your computer to your … bathroom.

Backup Flash Drive

Can’t I Just Copy Everything Instead of Using a Backup Program?

It’s tempting to just use file-copy tools to back up what you think you need. But if you’re not careful, you could easily miss something very important.

Cryptex

Why Is It So Important to Use a Different Password on Every Site?

Using different passwords on different sites is not only good practice – it’s actually necessary to keep your accounts safe. I’ll review why, and how best to handle a plethora of passwords.

Too Much Email!

What Is An Email Quota and What Does “Over Quota” Mean?

Being over quota means you’ve received or kept too much email. Dealing with an email quota requires understanding just where that email is being kept.

Email Delayed

Why Am I Getting a “Delivery Status Notification (Delay)” on an Email I Sent?

Delays happen for many reasons; it’s the nature of the email infrastructure. If you get a “Delivery Status Notification (Delay)”, your options are limited.

The travels of a MAC address

What’s the Difference Between a MAC Address and an IP Address?

A MAC address and your IP address are both key components to networking, but they serve different purposes, and are visible in very different ways.

You Shall Not Pass!

Is MAC Address Filtering a Viable Wireless Security Option?

MAC address filtering is a technique that theoretically prevents unauthorized computers from accessing your network. I’ll explain why the theory fails.

Bluescreen error on a Laptop

I Got a Blue Screen Error, What Should I Do?

Blue screen errors are less common than they used to be, but they can still happen for a variety of reasons. I’ll review what to do, and when.

Error!

Why testing your backups is critical

Testing your backups is an easy step to overlook, but an important step to take. Make sure your backups will be there when you need them.

Peer-to-peer file sharing

What Is Peer-to-Peer File Sharing, and Is It Legit?

Peer-to-peer file-sharing programs have a bad reputation because of the content they’re often used to download. But the technology is quite legal and useful for legitimate purposes.

Quad-core CPU

Should I Get a Dual-Core or a Quad-core Processor?

Processors are generally available with what are called “multiple cores”. We’ll look at what that means, and how you might select which is right for you.

CPU

What’s the difference between i3, i5, and i7 processors?

Intel’s Core i3, i5, and i7 processors present a headache-inducing combination of characteristics. I’ll look at what matters and then dig a little deeper.

The travels of a MAC address

Can a MAC address be traced?

A MAC address can easily be traced for as far as it travels. The problem is, a MAC address doesn’t travel far enough to be useful.

Linux Mint Cinnamon

Should I Convert to Linux?

Linux is often a viable alternative to extend the life of older machines. We’ll look at some of the issues involved if you convert to Linux.

Files in the cloud

Is an Online Backup Service a Good Idea?

Backing up data using an online backup service can seem to be an effective solution, and it can be an important part of an overall strategy, but there are important limits and considerations.

Why does email bounce?

Why Does Email Bounce?

Email can bounce for many reasons. I’ll look at several of the most common mail bounce messages, and try to interpret what they really mean.