Articles tagged: The Best of Ask Leo!
“Your connection is not private” errors are often benign, but are worth paying attention to.
Registry scanners often report hundreds, if not thousands, of issues. Should you fix them, and if so, which? Here’s my approach.
Your school can see email being sent and received across its systems, and there’s no way to know whether or not they’re actually looking.
Most music, picture, and movie files are already compressed. Compressing them again won’t make much difference, and could even make them larger.
Sharing Wi-Fi with your neighbor might seem like a friendly thing to do, but be aware you are potentially putting your own computers at risk.
Emailing large attachments is typically a bad idea, as your mail may not be delivered. I’ll look at alternatives.
If you’re not getting spam now, you will soon — and probably lots of it. What can you do? There’s no magic answer, but there are various things you can do to help.
The “www” in website addresses is now typically optional and even redundant, but there was once a reason as to why it was required in URLs.
Mobile numbers are an important component of Hotmail and Outlook.com security. I’ll review how to change the mobile number and keep it up to date.
If it’s certain a neighbor is using your IP address without permission, you need to take steps. But first you need to make sure.
Wi-Fi hotspots make for a convenient connection. To connect, you need proximity, a little hardware, and most important, permission.
Chkdsk checks your disk for errors at a low level, requiring exclusive access to the disk to do so. “Chkdsk cannot run…” means it doesn’t have the exclusive access it needs.
RAID is a valuable technology for improving disk speed and fault tolerance, but it is in no way a replacement for backing up.
The concept seems simple: take a system image of one machine, restore it to another, and avoid lengthy setup time. Unfortunately, it’s not that simple.
The “Report Spam” and “Junk” buttons serve an important function in the war against spam. However, used improperly they can do more harm than good.
Phishing is a way scammers trick you into providing personal and financial details. Phishing opens the door to identity theft and more.
I often hear from people wanting to close an email account for one reason or another. The problem is that closing an email account is often the wrong solution to their real problem.
Many households have computers used for sensitive things sharing a network with less trustworthy users. Here’s how to increase your security.
Malicious intent is commonly understood to be the cause of technological trials and tribulations. It’s usually the wrong assumption to make.
What’s the Difference Between an Email Account, an Email Address, an Email Program, and an Email Service?
Terminology around email can be confusing. I’ll review some common and important terms.
Backing up an encrypted hard drive shouldn’t be difficult, but it’s important to understand what you’ll get.
Drivers are critically important components of your computer, but knowing how and when to update drivers isn’t as easy or as obvious as we might like.
Closing an email account is many people’s first reaction to seeing spam sent from their account. It rarely helps, if it’s even possible. I’ll explain.
Occasionally, when moving a drive to another machine it’ll show up as unformatted. I’ll look at some possible causes and actions to take.
Photographic images have a number of characteristics that we often don’t consider or understand. I’ll review how digital pictures are constructed and stored, and what you need to keep in mind when sharing or publishing.
When running out of disk space, considering what you can delete makes sense. I’ll look at the steps to determine whether a file, such as a .dat file, may be important.
Strong passwords are important, but they don’t protect you from everything. I’ll look at other ways your account can be compromised.
It’s sometimes hard to tell why Word thinks a document changed even though you haven’t done anything to it. I’ll look at a few clues.
Testing your backups is an easy step to overlook, but an important one to take. Make sure your backups will be there when you need them.
A single original of anything is not backed up, and backing up is significantly easier, and of higher quality, in digital media.
Letting your browser remember passwords is a convenient feature. With that convenience comes risk — often significant risk. Most folks are much better served by using a password vault. I’ll explain why.
Many external drives include free backup software that I never use. I’ll explain why, and what I do instead.
Windows File Explorer defaults to a simple view of files on your machine that isn’t secure. Changes these settings as soon as you can.
We worry a lot about privacy, but our concerns are often misplaced. Fortunately, the biggest risk to our personal privacy is right under our nose.
There are common causes, and sometimes simple solutions, for a video that starts and stops as you watch it.
Two-factor authentication is a great way to keep your accounts secure from hackers — even those who manage to get your password.
How Do I Change the Browser Home Page in Windows 10? Take Control with Quick Instructions for Edge, Firefox, and Chrome
Sometimes installers change your browser home page “for you”. Other times, homepage content changes. I’ll show you how to be more productive and set your homepage to what you want.
It’s not only impossible to prevent email from being forwarded; you can’t even prevent that forward from being altered, forged or defaced.
The internet, and social media specifically, seems like a breeding ground for jerks. Did it actually create them, or just expose those already among us?
Email and texting usually works, but when it doesn’t, there’s just no way to tell if someone has blocked you.
Backing up your computer’s data is critical. What backup program should you use? There are many, but pragmatically, the best is whatever you’ll actually use.
Image backups are excellent protection against data loss, but restoring an old backup to new computer isn’t why you do them.
Assuming your intent is legal or at least moral, it’s not hard to copy content from a webpage that attempts to prevent it.
These are oversimplifications of many variations on the same basic question. People want to hack into other people’s accounts, or even their own, for a variety of reasons. Some sound perfectly legitimate. Others, not so much. And others are just blatant attempts at theft, harassment, or revenge. What’s really scary is that I get these requests … Read more
Changing passwords periodically is conventional wisdom. I disagree, and then discuss whether periodic password change can even happen reliably.
Open Wi-Fi hotspots at coffee shops and other public places are opportunities for hackers. I’ll review how to stay safe.
The first thing a diagnostic technician may ask you to do is reboot your computer. Why?
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
Casually installing one download may result in several other things being installed. I’ll review the steps to remove these pesky, problematic, painful, Potentially Unwanted Programs, or PUPs.