Articles tagged: bestof

How Can I Send Anonymous Email?

Anonymous email is both very easy do to, and yet also extremely difficult. The level of difficulty involved depends on the likelihood that someone would go the extra mile to identify you.

How Can I Find a Good Web Host?

Where to host your website depends on what kind of a website it is. Options range from free to expensive based on your needs.

I Can’t See the Top of a Window, so I Can’t Minimize, Maximize, or Close. What Can I Do?

Sometimes windows can inadvertently be positioned off screen where your mouse can’t reach. The keyboard interface, on the other hand, most certainly can.

What’s a .DAT File?

DAT files are used by many different applications. To know what to do with a DAT file, you need to know which application created it.

Can I ZIP My Pictures or MP3 Files to Save Space?

Most music, picture, and movie files are already compressed. The result is that compressing them again won’t make much difference and could even make them larger.

Just How Secure Is Email, Anyway?

Email is ubiquitous and convenient, yet surprisingly not very secure. I’ll look at why that is and when you should worry.

Just What Are Windows 7’s “Libraries” and How Do They Work?

Libraries are a feature added to Windows 7 that allow multiple folders to viewed as if they are one. It’s not new, but it can be very confusing.

Why You Should Never Blindly Trust an Online Recommendation (Even Mine)

A reader left a snide remark about one of my recommendations, but it actually raised an important point about recommendations you might find online – there are many opportunities for abuse.

Do Desktop or Laptop Platforms Really Matter any More?

As platforms like Windows, Mac, and Linux have all matured, the differences in fundamental capabilities are getting smaller – in many cases, small enough that which one you choose can often boil down to simple personal preference.

How Does NAT Work?

NAT is a fundamental technology used by routers allowing you to share internet connections and stay safe. I’ll give a conceptual overview.

One Change You Should Make to Windows File Explorer Right Now to Stay Safer

Windows Explorer tries to help by hiding some information. Unfortunately, that opens a hole that hackers can use to fool you.

Why is my email being immediately deleted?

Every so often, anti-malware software can go a little nuts, thinking that every email that you get is spam or a virus. Turn that scanning feature off.

How Should I Erase My Hard Drive Before I Give It Away?

Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.

How Do I Get a Notification When Anyone I Send an Email to Forwards that Email?

Several urban legends would have you believe that when you forward an email, it can somehow be tracked. It cannot. Period. I’ll explain why that is.

Why, when I’m doing nothing at all, will my hard disk suddenly start thrashing?

Unexpected hard disk activity isn’t unusual. I’ll show you how to use a free monitoring tool to determine what program is causing it.

How Do I Protect My Email Address Book?

With email account hacking on the rise, it’s important to understand what it takes to keep your account (and its address book) safe from compromise.

Is My Information Safe in the Cloud?

‘The Cloud’ is the latest buzzword for internet-based services. Before diving in, it’s important to understand a few things about cloud security.

Why Am I Being Labeled a Spammer?

Possibly being labeled a spammer is another reason not to forward jokes and urban legends. Do it enough and your normal email may not get delivered.

Why Are Electronic Greeting Cards a Bad Idea?

Electronic greeting cards, or ecards, seem like a nice idea, but often end up giving the recipient more than you intended, in the form of spam or worse.

Is Using RAID a Good Backup Alternative, and if so, which RAID Should I Use?

RAID is a valuable technology for improving apparent disk speed and fault tolerance, but it is in no way a replacement for backing up.

How Does Screen Resolution Work?

Screen resolution is a simple concept, but when combined with the myriad ways that Windows can be configured, it can quickly become confusing.

Someone’s Sending Email that Looks Like it’s from Me to My Contacts, What Can I Do?

If your contacts are getting email from you that you didn’t send, then it’s very likely that your email account has been compromised.

How Does Using BCC Help Reduce Spam?

Using BCC on forwarded email is one way to reduce the amount of spam your recipients might get as the email is forwarded further.

How Do I Get Wireless Internet?

You hear a lot about the wireless internet, but it’s not something you can just connect to anywhere. It’s more often something you purchase and set up.

Thunderbird – A Free, Open Source, and Powerful Email Client

Thunderbird is a robust and powerful email program that can meet the needs of both light and power users. I use it all day every day.

How Do I Connect My Desktop to the Nearby Wireless Internet WiFi Hotspot?

Wireless internet in WiFi hotspots makes for a convenient connection. To connect to the wireless internet, you need proximity, a little hardware, and permission.

What’s the Difference Between “Plain Text” and “HTML” Email?

Email can be sent in several formats, the most common being plain text and HTML. We’ll look at the difference, and which might be preferable.

If I Had to Do It All Over Again…

It may not be fair, it may not be politically correct, but the practical reality of the internet is that speaking and writing English well, matters.

Could the Microsoft Servers be Infected?

It’s tempting to blame the mail service for account hacks and vulnerabilities, but in fact that’s rarely the case. Much more likely is that hackers gained access to individual accounts through more traditional means.

Why Shouldn’t I Use the “Report Spam” or “Junk” Button?

The “Report Spam” and “Junk” link serve an important function in the war against spam. However, used improperly, they can do much more harm than good.

Can I Check a Download for Viruses before I Download It?

Files cannot be checked for viruses before being downloaded, but there are precautions you can and should take.

Why are internet petitions a bad idea?

Internet and on-line petitions seem like a quick and easy way to make a statement. Unfortunately at best they’re ineffectual, and at worst they do real harm.

Why shouldn’t I post my email address in a public forum?

Spammers and internet trolls harvest email addresses via a variety of means. One of the most common is to simply surf the web and look for anything that might look like one.

What Is Javascript and Why Do I Need It?

Javascript is a programming language that operates important features on many websites.

The best anti-spyware, anti-virus … and dancing bunnies?

The best operating system in the world can’t save you from dancing bunnies.

How do I resolve my problem with appcompat.txt?

Here’s what to do when you see appcompat.txt.

Can my boss see my mail and instant messages?

If using your company’s machine, it’s safe to assume that your boss or IT department could see your emails and instant messages.

Why does Word tell me a document has changed when it hasn’t?

It’s sometimes hard to tell why Word thinks a document has changed even though you haven’t done anything. We’ll provide a few clues.

Why do the changes I’ve made to a document that was emailed to me disappear?

Due to complexity of attachments in emails, changes you’ve made to a document that was emailed to you can disappear.

Why Does My Home Network Only Work with One Computer at a Time?

If there is a conflict with your IP address, it could result in only one of the machines on your network working at a time.

Why Do some Website Addresses have “www” and some Don’t? And Why Do some Work with or without the “www”?

The “www” in website addresses is now typically optional, but there was once a reason as to why they were required in URLs.

What is Virtual Memory?

Virtual memory is conceptually somewhere between RAM and hard disk space; it’s disk space used to maximize the amount of RAM available to programs.

How Can I Find Out Who Is Using a “File in Use”?

Windows often reports that a file is in use without telling you what program is using it. Process Explorer can tell you.

So just what is a “Server” anyway?

The term “server” is used a lot in many contexts, but it’s really just a computer; quite often, it’s one that isn’t all that special.

How Do I Hide the Email Addresses I’m Sending to In a Message?

It’s possible to send email to someone without having their email address show up on the To: or Cc: lines by using Blind Carbon Copy, or Bcc.

Can I Avoid Retyping Error Messages When I Need to Report Them?

Many Windows error messages can often be quickly and easily copied to the clipboard with a single keystroke.