Articles tagged: The Best of Ask Leo!
There are common causes, and sometimes simple solutions, for a video that starts and stops as you watch it.
Two-factor authentication is a great way to keep your accounts secure from hackers — even those who manage to get your password.
How Do I Change the Browser Home Page in Windows 10? Take Control with Quick Instructions for Edge, Firefox, and Chrome
Sometimes installers change your browser home page “for you”. Other times, homepage content changes. I’ll show you how to be more productive and set your homepage to what you want.
It’s not only impossible to prevent email from being forwarded; you can’t even prevent that forward from being altered, forged or defaced.
The internet, and social media specifically, seems like a breeding ground for jerks. Did it actually create them, or just expose those already among us?
Email and texting usually works, but when it doesn’t, there’s just no way to tell if someone has blocked you.
Backing up your computer’s data is critical. What backup program should you use? There are many, but pragmatically, the best is whatever you’ll actually use.
Image backups are excellent protection against data loss, but restoring an old backup to new computer isn’t why you do them.
Assuming your intent is legal or at least moral, it’s not hard to copy content from a webpage that attempts to prevent it.
These are oversimplifications of many variations on the same basic question. People want to hack into other people’s accounts, or even their own, for a variety of reasons. Some sound perfectly legitimate. Others, not so much. And others are just blatant attempts at theft, harassment, or revenge. What’s really scary is that I get these requests … Read more
Changing passwords periodically is conventional wisdom. I disagree, and then discuss whether periodic password change can even happen reliably.
Open Wi-Fi hotspots at coffee shops and other public places are opportunities for hackers. I’ll review how to stay safe.
The first thing a diagnostic technician may ask you to do is reboot your computer. Why?
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
Casually installing one download may result in several other things being installed. I’ll review the steps to remove these pesky, problematic, painful, Potentially Unwanted Programs, or PUPs.
Task Manager shows many of the items that run automatically when you start your machine. What you need and what you don’t depends on many factors.
My recommendations for specific security software and techniques to keep your computer, and yourself, safe.
Malware authors often make fantastic promises to get people to bypass their security software. It’s important to remain skeptical, vigilant, and attentive.
For years, the standard practice has been to assume that eight-character passwords made up of sufficiently random characters was enough. Not any more. Not even close.
It can be extremely difficult to find the email address of someone you want to contact. To begin with, they must want to be found.
Assorted redistributables and shared libraries are installed on your PC by programs that need them. Removing them, while tempting, is fairly risky.
Avoid ransomware the same way you avoid any malware. A full backup will save you not only from ransomware, but from a host of other problems as well.
Microsoft continues to confuse us with product names. I’ll clarify the difference between Outlook and Outlook.com, and help you understand which you want.
Spammers use many techniques to slide their garbage into your inbox. BCCing you on messages is a common way.
People can tell very little from your IP address. For example, they cannot tell who or where you are. How much they can tell varies a great deal.
Over-aggressive spam filtering can cause email newsletters and other messages to fail to appear in your inbox. I’ll look at why that is, and three steps you can take to improve the situation.
It’s a good idea to test backups before disaster strikes. Unfortunately, a complete test can be risky. I’ll look at some alternatives.
Realistically, it’s impossible to delete things from the internet. Yet in an apparent contradiction in terms, if you happen to delete something in your control, you also can’t get it back.
After an online account is deleted, the ID or email address is eventually made available for re-use. It’s the same name but a different owner, and that can confuse people.
You might lose your hardware and any un-backed-up data on it, and possibly give a thief access to it all! I’ll cover a few of the basics. A stolen computer or lost computer can open the doors to all sorts of havoc if you’re not prepared.
Disk Cleanup in Windows 10 is a handy tool for freeing up space on your hard drive. I’ll show you how it’s done, and what to clean up. It’s one of the first places I recommend people turn to when they’re running low on disk space.
Device-driver updates can come from several places. I’ll review the best sources for driver updates and where else you might need to look.
The best registry cleaner is none at all. There may be cases where you want to use one, though, and I’ll review which I’d use and how to use them safely.
How Can I Securely Delete Everything Except the Operating System? Five Steps to Get as Close as You Can
Before giving away a machine or returning a loaner, it’s important to remove personal information from it. That may be both harder and easier than you think.
There are many reasons you’re more likely to be directed to online and self-help resources than talk to a real person.
It’s important to understand the risk of buying a used computer.
Often, when people find their posts or comments removed or altered from websites they visit, they’re quick to claim their right to free speech has been violated. That’s rarely the case.
System Restore doesn’t restore your system and has proven itself too unreliable to count on.
The most important life skill, for everything from getting your computer fixed to becoming a highly-paid professional, may not be what you think it is.
Https is an important part of keeping your data safe, but it’s only a part. It’s important to understand what it does and doesn’t mean.
A VPN, or Virtual Private Network, is a fully encrypted, private internet connection via a VPN provider. I’ll look at what protection it offers.
Sometimes, it is possible to recover a file deleted by accident. Stop using the disk, check your Recycle Bin, and perhaps pull out an undelete utility.
“From” spoofing is how spammers send email that looks like it comes from you that you had nothing at all to do with. I’ll look at how it’s done.
With occasional security breaches at service providers and rampant email account theft, password security has never been more important. Make sure you choose and use secure passwords.
Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.
A Windows 10 Recovery Drive can be used to restore Windows backups to your machine and more. I’ll show you how to create one.
If we would all be a little more skeptical, we’d be safer and the internet would be a more trustworthy place.
I don’t think much of the Windows backup utility–but any backup is better than no backup. Let’s take a look at how to use it.
Windows Update can get confused or stuck. I’ll review ways to fix Windows Update, including what I refer to as the “nuclear option”.