Hacking into someone’s account is often seen as an answer to some problem. In reality, all it does is open a can of worms and put you at risk.
The Best of Ask Leo!
It used to be that simply viewing a malformed email could allow a virus to spread. Thankfully, that’s no longer the case with modern mail programs.
Email spoofing is rampant. Spammers often send email that looks like it came from you, and there’s little that you can do about it.
So-called “supercookies” and “evercookies” track the websites you visit, even if you regularly disable or flush normal cookies.
A picture is worth a thousand words, and a screenshot – an image of your computer screen, saved as a picture – can eliminate a lot of frustration when trying to describe to someone what you’re seeing on your computer.
Here are the steps you need to take to prevent losing your account – forever – to a hacker.
Free email services and accounts are convenient and ubiquitous, and can be used safely if – and only if – you take responsibility for that safety.
Spam prevention measures have made getting email delivered more difficult. We’ll look at ways to maximize the chances your email will make it through.
Unless you’re willing to pay a lot of attention on a very regular basis, automatic updates are an important part of keeping your machine safe.
Manhole covers? Really? Interviewing for technical positions can be tricky, but it can also be fun, if you know what interviewers are looking for.
Even though they share similar names and do similar things, Outlook and Outlook.com are actually not related at all.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
While there are settings and services that claim to be able to determine if an email has been opened, they are notoriously unreliable and pointless.
Link-shortening services make it hard to tell a link’s final destination. When you receive one in an email, you may want to do some detective work to see where it’s going – before you click.
The internet has a very long memory. Removal from search engines is practically – perhaps even literally – impossible.
A lack of sound can happen for a variety of reasons. I’ll review the common things to look for if your computer isn’t making sound.
HTTPS provides validation and encryption, two important pieces of security. Using it for everything is possible but costly, and issues would remain.
You avoid ransomware the same way you avoid any malware. On top of that, a full backup can save you not only from ransomware, but from a host of other problems as well.
Internet Safety is difficult, yet critical. Here are seven key steps to keep your computer safe on the internet.
Password management utilities are great tools to not only manage your passwords, but be more secure about how you use them.
Many hotels offer both wired and wireless internet, but along with those hotel internet connections comes a security risk most folks don’t consider.
Being a computer programmer can be a fun and rewarding profession. Here’s my take on what it takes to get there; some aspects are obvious, and others are not.
Some malware goes to great lengths to prevent you from downloading, running, or applying a fix. I’ll tell you what steps to take.
Even with up-to-date anti-malware tools, you can still fall victim to malware. I’ll explain why by comparing your computer to your … bathroom.
Backing up your computer’s data is critical. What backup program should you use? There are many, but pragmatically, the best is whatever you’ll actually use.
Your router is your first line of defense against malicious attacks from the internet. But do you have a secure router? I’ll review the important settings.
It’s tempting to just use file-copy tools to back up what you think you need. But if you’re not careful, you could easily miss something very important.
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
Email account theft is rampant. If it happens to you, there are several steps you need to take, not only to recover your account, but to prevent it from being easily hacked again.
Perhaps most importantly, stop believing it.
Using different passwords on different sites is not only good practice – it’s actually necessary to keep your accounts safe. I’ll review why, and how best to handle a plethora of passwords.
As security compromises happen at a regular pace, many are asking, “Is the cloud too dangerous?” It’s as safe as you make it.
Open Wi-Fi hotspots at coffee shops, airports, and other public places are opportunities for hackers to steal information and more. I’ll review how to stay safe.
Backing up your computer is critical to avoiding data loss. I’ll look at what it means and give a suggestion for average users.
Being over quota means you’ve received or kept too much email. Dealing with an email quota requires understanding just where that email is being kept.
Delays happen for many reasons; it’s the nature of the email infrastructure. If you get a “Delivery Status Notification (Delay)”, your options are limited.
A MAC address and your IP address are both key components to networking, but they serve different purposes, and are visible in very different ways.
MAC address filtering is a technique that theoretically prevents unauthorized computers from accessing your network. I’ll explain why the theory fails.
Blue screen errors are less common than they used to be, but they can still happen for a variety of reasons. I’ll review what to do, and when.
The concept seems simple: take a system image of one machine, restore it to another, and avoid lengthy setup time. Unfortunately, it’s not that simple.
Testing your backups is an easy step to overlook, but an important step to take. Make sure your backups will be there when you need them.
Peer-to-peer file-sharing programs have a bad reputation because of the content they’re often used to download. But the technology is quite legal and useful for legitimate purposes.
Processors are generally available with what are called “multiple cores”. We’ll look at what that means, and how you might select which is right for you.
Intel’s Core i3, i5, and i7 processors present a headache-inducing combination of characteristics. I’ll look at what matters and then dig a little deeper.
A MAC address can easily be traced for as far as it travels. The problem is, a MAC address doesn’t travel far enough to be useful.
Browser problems can be caused by any number of things that may or may not actually include the browser itself. I’ll review common troubleshooting techniques.
Linux is often a viable alternative to extend the life of older machines. We’ll look at some of the issues involved if you convert to Linux.
Backing up data using an online backup service can seem to be an effective solution, and it can be an important part of an overall strategy, but there are important limits and considerations.
Email can bounce for many reasons. I’ll look at several of the most common mail bounce messages, and try to interpret what they really mean.
For years, the standard practice has been to assume that eight-character passwords made up of sufficiently random characters was enough. Not any more.