Articles tagged: The Best of Ask Leo!
Only Windows is Windows. There are alternatives, but whether they’re right for you depends on you.
While the ratio of PCs to mobile devices may change over time, I believe PCs will not be going away any time soon. They’re just too darned useful.
The results are in for last year’s most common passwords. The implications are depressing, but important.
Facebook account hacks happen. There are steps you need to take, not only to recover your account but to prevent it from being hacked again.
You can download Windows versions 7, 8.1, and 10 from legitimate sources. If you have a legal retail product key, this could be your replacement media.
Occasionally, one program uses all of your computer’s processing resources. Using Task Manager, it’s easy to figure out which program that is.
A PC running Windows can slow down for many reasons. Viruses, spyware, updated software, disk fragmentation, and more can lead to performance drops.
It can be difficult to get wireless network coverage throughout your home. I’ll look at a couple of ways to extend your wireless network.
Backing up your computer is critical to avoiding data loss. I’ll look at what it means and give a suggestion for typical users.
It’s not uncommon to run out of disk space. A free utility can show where your disk space is going so you can determine what steps to take.
Perhaps most importantly, stop believing it.
Casually installing one download may result in several other things being installed as well. I’ll review the steps to remove these pesky, problematic, painful, Potentially Unwanted Programs, or PUPs.
Malware is just software. It doesn’t destroy your computer’s hardware in any way. Some work — albeit significant work — will get you back up and running without needing to destroy anything.
It seems like even the most up-to-date anti-malware package isn’t always enough. It’s frustrating, because you’d think it would be.
A home network allows you to share a single internet connection, as well as data and devices, between multiple devices. I’ll review the basics components of a home network and some steps to take as your network grows.
Open Wi-Fi hotspots at coffee shops, airports, and other public places are opportunities for hackers to steal information and more. I’ll review how to stay safe.
OneDrive is a surprisingly powerful service that many people overlook or don’t understand. I’ll review six ways you can leverage OneDrive.
Browser problems can be caused by any number of things that may or may not include the browser itself. I’ll review common troubleshooting techniques.
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
CHKDSK, short for Check Disk, is a utility that checks the integrity of the files and file structure of your hard disk. I’ll walk you through it.
Your router is your first line of defense against malicious attacks from the internet. But do you have a secure router? I’ll review the important settings.
Copyright is a complex topic, but the practical implications are simple. I’ll look at availability, copyright, and more.
Extracting data from a hard drive in a dead computer isn’t typically difficult, unless it’s the drive itself that caused the problem.
Once you hit that Send button, assume there is no way to stop your email from being sent … even if it’s to the wrong person.
Changing your password is a common response to account hacks. Unfortunately, it isn’t enough.
I have recommendations for specific security software and techniques in various places on the site. Here’s a short summary.
While there are settings and services that claim to know if an email has been opened, they are notoriously unreliable and pointless.
The internet has a very long memory. Removal from search engines is practically and perhaps literally impossible.
Incognito mode, or Private or InPrivate browsing, protects your privacy to a point. It’s critical to know where that point is.
Email account theft is rampant. If it happens to you, there are several steps you need to take — not only to recover your account, but to prevent it from being easily hacked again.
Not long ago, I finally came up with the words to describe part of what I do. It was kind of a secret … until now.
Here are the steps you need to take to prevent losing your account — forever — to a hacker.
I see people lose access to their important accounts all the time. Most frustrating is that it’s often their own fault that they can’t regain access.
As security compromises happen regularly, many are asking, “Is the cloud too dangerous?” It’s as safe as you make it.
If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anywhere from easy to impossible.
While getting someone’s name and address from their IP address is technically possible, it’s also typically difficult and requires law enforcement.
Here’s another example of why going digital enables a level of backup safety that single originals simply can’t achieve.
I never planned to be a writer. And yet here I am. I kinda wish I’d approached a few things differently along the way.
There are emails from which you should certainly unsubscribe when you no longer want them. However, there are emails that you absolutely should never unsubscribe from. I’ll review the differences.
Using all upper-case characters is the internet form of shouting, and is considered quite rude. Don’t be surprised if you get a grumpy response.
Email spoofing is rampant. Spammers often send email that looks like it came from you, and there’s little that you can do about it.
If you’re not around to unlock all the digital data you take such care to secure, who will be able to access it, and how?
Backing up your computer’s data is critical. What backup program should you use? There are many, but pragmatically, the best is whatever you’ll actually use.
Another day, another story of data loss. The frustrating thing is that it doesn’t have to happen.
The list of BCC’ed recipients is not included with emails, so there is no way of determining if or who else the email was sent to.
Spam prevention measures have made getting email delivered more difficult. We’ll look at ways to maximize the chances your email will make it through.
A picture is worth a thousand words, and a screenshot – an image of your computer screen, saved as a picture – can eliminate a lot of frustration when trying to describe to someone what you’re seeing on your computer.
Free email services and accounts are convenient and ubiquitous, and can be used safely, if and only if you take responsibility for that safety.
The rescue or emergency disk provided by many backup programs is more useful than most people realize.