Articles tagged: The Best of Ask Leo!
You might lose your hardware and any un-backed-up data on it, and possibly give a thief access to it all! I’ll cover a few of the basics. A stolen computer or lost computer can open the doors to all sorts of havoc if you’re not prepared.
Disk Cleanup in Windows 10 is a handy tool for freeing up space on your hard drive. I’ll show you how it’s done, and what to clean up. It’s one of the first places I recommend people turn to when they’re running low on disk space.
Device-driver updates can come from several places. I’ll review the best sources for driver updates and where else you might need to look.
The best registry cleaner is none at all. There may be cases where you want to use one, though, and I’ll review which I’d use and how to use them safely.
How Can I Securely Delete Everything Except the Operating System? Five Steps to Get as Close as You Can
Before giving away a machine or returning a loaner, it’s important to remove personal information from it. That may be both harder and easier than you think.
There are many reasons you’re more likely to be directed to online and self-help resources than talk to a real person.
It’s important to understand the risk of buying a used computer.
Often, when people find their posts or comments removed or altered from websites they visit, they’re quick to claim their right to free speech has been violated. That’s rarely the case.
System Restore doesn’t restore your system and has proven itself too unreliable to count on.
The most important life skill, for everything from getting your computer fixed to becoming a highly-paid professional, may not be what you think it is.
Https is an important part of keeping your data safe, but it’s only a part. It’s important to understand what it does and doesn’t mean.
A VPN, or Virtual Private Network, is a fully encrypted, private internet connection via a VPN provider. I’ll look at what protection it offers.
Sometimes, it is possible to recover a file deleted by accident. Stop using the disk, check your Recycle Bin, and perhaps pull out an undelete utility.
“From” spoofing is how spammers send email that looks like it comes from you that you had nothing at all to do with. I’ll look at how it’s done.
With occasional security breaches at service providers and rampant email account theft, password security has never been more important. Make sure you choose and use secure passwords.
Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.
A Windows 10 Recovery Drive can be used to restore Windows backups to your machine and more. I’ll show you how to create one.
If we would all be a little more skeptical, we’d be safer and the internet would be a more trustworthy place.
I don’t think much of the Windows backup utility–but any backup is better than no backup. Let’s take a look at how to use it.
Windows Update can get confused or stuck. I’ll review ways to fix Windows Update, including what I refer to as the “nuclear option”.
Domain names are simple in concept, yet can be constructed in ways that might fool you. I’ll look at some examples, and discuss what’s important.
Folks often ask what might be broken if their computer does nothing, but provide few clues. It’s a long list, and I’ll look at some possibilities.
Being over quota means you’ve received or kept too much email. To deal with it, you need to understand where that email is being kept.
I have recommendations for specific security software and techniques in various places on the site. Here’s a short summary.
Using an on-screen keyboard instead of a real keyboard might stop some keyloggers, but there’s no guarantee that other techniques aren’t also being used.
Outlook.com, Hotmail, and Microsoft account compromise and loss happens. How to get your account back varies based on just what was stolen. I’ll review different scenarios.
Although there’s no way to remove all traces of yourself from a machine, there certainly are ways to remove as much as you can.
If you send email to an invalid address or a closed account, usually you’ll get a bounce back. Usually. But you cannot count on bounces.
Google’s search tools can help you find websites that have been tagged with particular dates. But be cautious; dates may not mean what you think.
Linux is a viable alternative to extend the life of older machines. We’ll look at some of the issues involved if you switch to Linux.
Buying a new machine is a common knee-jerk reaction to a bad malware infestation. And it’s wrong. Not just a little wrong — it’s very wrong and completely unnecessary.
There is one approach to life — one setting in your psyche — that affects your experience with technology much more than any lack of skill or knowledge.
Terms used to measure disk space can be ambiguous. As a result, a megabyte to you might not be the same as a megabyte to your computer.
When it comes to journalism and other information you read online, there’s a very strong argument that things are seriously broken. We all need to be more vigilant than ever to separate truth from falsehood and recognize what’s important over what’s popular.
Another day, another story of data loss. The frustrating thing is that it doesn’t have to happen.
It’s natural to want to find out who hacked your email and why. Begin by recovering and securing your account. I’ll review what steps you can take after that, and their chances of success.
Reporting spam in your email program with the spam button is critical. Reporting it by forwarding it somewhere isn’t going to do any good.
Partitioning, or splitting a single physical hard drive into multiple drives, has pros and cons. I’ll look at those and make a recommendation.
Using a different password for every login is an important part of overall security — and it doesn’t have to be difficult.
It can be a challenge to delete multiple emails. I’ll look at some of the concepts and techniques used by various email programs to make it easier.
Commercial software can be expensive. Can you just pirate software if you can’t afford it? You can guess my answer, but even better: theft isn’t necessary.
Hubs, switches, and routers are all computer networking devices with varying capabilities. Unfortunately, the terms are often misused.
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
When you ask someone for help, stack the deck in your favor by painting a clear picture of the problem you’re experiencing.
Are you afraid of your computer? It could be getting in your way. I’ll look at some ways to become less fearful and more adventuresome.
Only Windows is Windows. There are alternatives, but whether they’re right for you depends on you.
While the ratio of PCs to mobile devices may change over time, I believe PCs will not be going away any time soon. They’re just too darned useful.
The results are in for last year’s most common passwords. The implications are depressing, but important.
Facebook account hacks happen. There are steps you need to take, not only to recover your account but to prevent it from being hacked again.
You can download Windows versions 7, 8.1, and 10 from legitimate sources. If you have a legal retail product key, this could be your replacement media.