Articles tagged: The Best of Ask Leo!
Thunderbird is a robust and powerful email program that can meet the needs of both light and power users. I use it all day every day.
Changing your email name is usually easy, but changing your email address involves setting up a new account.
Malware is just software. It doesn’t destroy your computer’s hardware in any way. Some work will get you back up and running without needing to destroy anything.
We often get forwarded email warning us about everything from lost children to free money to crooked politicians. They’re mostly bogus, and they’re known as urban legends. Here’s how to tell.
Clearing your browser cache is the first thing to try when you encounter webpage problems. I’ll look at why and how to clear your cache.
Unexplained disk activity is easy to identify with the right tools. We’ll use Process Monitor.
If you send email to an invalid address or a closed account, you may get a bounce back. You just can’t count on it.
Microsoft continues to confuse us with product names. I’ll clarify the difference between Outlook, Outlook, and Outlook.com, and help you decide which you want.
Hiberfil.sys, pagefile.sys, and swapfile.sys are Windows system files that support two very important features: hibernation and virtual memory.
While getting someone’s name and address from their IP address is technically possible, it’s also difficult and requires law enforcement’s help.
Smartphones are a popular way to take snapshots and videos. Tools like Dropbox are great for making sure those are backed up automatically.
When you ask someone for help, stack the deck in your favor by painting a clear picture of the problem you’re experiencing.
Windows 11 is out to much fanfare, hype, and confusion. Unless you have specific reasons, you don’t need to upgrade yet, but there’s also no reason to avoid it.
When transferring NTFS-formatted disks from one machine to another, permissions can restrict access. I’ll cover both Widows GUI and command line solutions.
Using someone else’s credit card online illegally is identity theft. There’s not a lot you can do except report it.
Download sites are just too risky these days. Don’t use them unless there is no way to avoid them, and even then, be very careful in your selections.
Everything you download adds risk. Be safer using my three guidelines.
Privacy is a complex and far-reaching topic. One of the most basic and often overlooked players is the operating system on your device.
POP, POP3, IMAP, and SMTP are all acronyms used in configuring email. We’ll look at what they mean and how they relate.
It’s not only impossible to prevent email from being forwarded; you can’t even prevent that forward from being altered, forged or defaced.
Buying a new machine is a common knee-jerk reaction to a bad malware infestation. And it’s wrong. Not just a little wrong — it’s completely unnecessary.
Edit a reply before sending it. Clean up your message, remove email addresses, and more.
Chargers and power supplies come in a wide variety of configurations. Choosing the right one is important. I’ll look at a few of the parameters.
“Not Responding” is Windows’ way of telling you that a program might have a problem. Sometimes it’s benign and sometimes it’s a sign of a deeper issue.
It can be a challenge to delete multiple emails. I’ll look at some of the concepts and techniques used by various email programs to make it easier.
Occasionally, the back button won’t work and simply lands you back where you were. There are reasons, and there are workarounds.
It’s generally not possible to recover an older version of a webpage, but we’ll look at a couple of straws to grasp at.
Before you dismiss it because it’s a subscription, take a look and do the math. Microsoft 365 might be surprisingly affordable for you.
System Restore doesn’t restore your system and has proven itself too unreliable to count on.
There are some practices to help you avoid having your credit card compromised, but most card theft is out of your control.
Files cannot be checked for viruses before being downloaded, but there are precautions you can and should take.
Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.
Changes you’ve made to a document that was emailed to you can easily disappear. Let’s avoid that.
Virtual memory is conceptually somewhere between RAM and hard disk space. It’s disk space used to maximize the amount of RAM available to programs.
Using all uppercase characters is the internet form of shouting, and is considered rude.
When you start Windows, many programs start automatically as well. Some of them don’t need to.
Free software exists for reasons ranging from pure altruism to pure deceit.
Don’t send anonymous email from work or home. It takes extra steps to keep from being traced.
It’s a good idea to test backups before disaster strikes. Unfortunately, a complete test can be risky. I’ll look at some alternatives.
Six practical approaches to generating passwords, ranked from best to worst.
For years, the standard practice has been to assume that eight-character passwords made up of sufficiently random characters was enough. Not any more. Not even close.
If we would all be a little more skeptical, we’d be safer and the internet would be a more trustworthy place.
Believing and spreading manure — lies, falsehoods, and misleading implications — makes you look bad and makes the internet a dumber place.
The most effective way to speed up a system is to clean it up, have it run fewer programs, and give it more resources.
If your email is hacked, there are several steps you need to take to get it back and prevent it from being hacked again.
Here are the steps you need to take to prevent losing your account forever to a hacker.
Some Windows messages indicate that something was set by your network administrator. That’s probably you, even if you didn’t do it.
‘The cloud’ is the latest buzzword for internet-based services. It’s important to understand a few things about cloud security.
Using an on-screen keyboard instead of a real keyboard might stop some keyloggers, but there’s no guarantee that other techniques aren’t also being used.
Sometimes you want to keep someone from contacting you. Ignoring them is often simplest, but there are tools to help as well.