Once you hit that Send button, assume there is no way to stop your email from being sent … even if it’s to the wrong person.
The Best of Ask Leo!
Changing your password is a common response to account hacks. Unfortunately, it isn’t enough.
I have recommendations for specific security software and techniques in various places on the site. Here’s a short summary.
While there are settings and services that claim to know if an email has been opened, they are notoriously unreliable and pointless.
The internet has a very long memory. Removal from search engines is practically and perhaps literally impossible.
Incognito mode, or Private or InPrivate browsing, protects your privacy to a point. It’s critical to know where that point is.
Eight steps to a backup strategy using Windows own built-in tools, plus four more to handle Microsoft’s plans to retire one of those tools.
Email account theft is rampant. If it happens to you, there are several steps you need to take — not only to recover your account, but to prevent it from being easily hacked again.
Not long ago, I finally came up with the words to describe part of what I do. It was kind of a secret … until now.
Here are the steps you need to take to prevent losing your account — forever — to a hacker.
I see people lose access to their important accounts all the time. Most frustrating is that it’s often their own fault that they can’t regain access.
As security compromises happen regularly, many are asking, “Is the cloud too dangerous?” It’s as safe as you make it.
If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anywhere from easy to impossible.
While getting someone’s name and address from their IP address is technically possible, it’s also typically difficult and requires law enforcement.
Here’s another example of why going digital enables a level of backup safety that single originals simply can’t achieve.
I never planned to be a writer. And yet here I am. I kinda wish I’d approached a few things differently along the way.
There are emails from which you should certainly unsubscribe when you no longer want them. However, there are emails that you absolutely should never unsubscribe from. I’ll review the differences.
Using all upper-case characters is the internet form of shouting, and is considered quite rude. Don’t be surprised if you get a grumpy response.
Email spoofing is rampant. Spammers often send email that looks like it came from you, and there’s little that you can do about it.
If you’re not around to unlock all the digital data you take such care to secure, who will be able to access it, and how?
Backing up your computer’s data is critical. What backup program should you use? There are many, but pragmatically, the best is whatever you’ll actually use.
Another day, another story of data loss. The frustrating thing is that it doesn’t have to happen.
The list of BCC’ed recipients is not included with emails, so there is no way of determining if or who else the email was sent to.
Spam prevention measures have made getting email delivered more difficult. We’ll look at ways to maximize the chances your email will make it through.
A picture is worth a thousand words, and a screenshot – an image of your computer screen, saved as a picture – can eliminate a lot of frustration when trying to describe to someone what you’re seeing on your computer.
Free email services and accounts are convenient and ubiquitous, and can be used safely, if and only if you take responsibility for that safety.