Articles tagged: Featured

Recall

Should I Be Concerned About Microsoft’s Recall Feature?

Initial panic about the Microsoft Recall feature is overblown. If you’re worried about that, you’re worried about the wrong thing.

No passwords!

Going Passwordless Without Going Passwordless

Passwords are dying. On some services, you can start playing with the process by creating a secure password… and then forgetting it.

A large sports stadium filled with thousands of people, with a focus on the crowd, illustrating the idea of being one in a large group. In the foreground, a person stands alone in the crowd, but the attention is clearly on the mass of people, not the individual. In the background, subtle hints of digital elements, such as faint ads or security icons, blend into the scene, symbolizing the concepts of online privacy, security, and targeted advertising.

Why I Keep Saying You’re Just Not That Interesting

Many people are concerned that they are specifically targeted by hackers, advertisers, and others. Nope.

Windows Backup

Why Windows Backup Isn’t What You Think It Is

For one thing, it doesn’t back up Windows. For another it can make a mess of your folders.

A modern living room with a smartphone on a coffee table and a smart speaker like an Amazon Echo nearby. The smartphone displays coffee maker ads, hinting at targeted advertising. In the background, two people are having a casual conversation, creating a subtle connection to the idea of being 'listened to' by smart devices.

Is My Smartphone or Smart Device Listening In on Me?

It’s not uncommon to think our smart devices are listening in when advertisements seem to follow our discussions.

The image shows a smartphone with a biometric fingerprint scanner in the center, representing device unlocking. In the background, there are abstract digital locks, key symbols, and security shields surrounding the phone to symbolize online security and protection.

Is a Passkey Two-Factor Authentication?

Passkeys are secure, but they’re not two-factor authentication in and of themselves. I’ll run the scenarios that explain why that is and when 2FA might be involved as well.

A desktop with multiple computers on it each displaying the OneDrive logo on the screen.

Why Is My Desktop in OneDrive?

OneDrive’s backup feature can cause confusion and even chaos. I’ll review its impact on your computer’s desktop and what to do about it.

Cloud storage service icons, in a cloud.

What’s the Difference Between OneDrive and Google Drive and Similar Services?

I’ll review the most popular cloud storage offerings, how they differ, and which I use (and why).

Balance scale with Local and Microsoft at opposite ends.

Local Accounts Vs. Microsoft Accounts: Which Is Better?

Local and Microsoft accounts both have pros and cons. I’ll explain so you can decide which is right for you.

An individual sitting in front of a PC computer screen displaying the message 'Recovery Failed.' In the background, a hacker is peeking around a door, creating a sense of tension and vulnerability.

How to Avoid an Account Recovery Scam

Don’t let your panic open the door to scammers.

OneDrive is not a backup. OneDrive is file synchronization.

OneDrive Is Not Backup

OneDrive is not a backup solution. OneDrive is for file synchronization. It’s critical you understand the difference.

An elderly man, looking concerned and focused, sitting at a computer. The screen shows a warning message or a phishing attempt. The setting is a home office, with the elderly man staring intently at the computer screen.

Protect Yourself From Online Scams

We’re all vulnerable to scammers. Learn the warning signs.

A photorealistic image of a person sitting at a desk, looking thoughtfully at a computer screen displaying the Facebook homepage. The person has a cup of coffee nearby. The setting is a cozy home office with warm lighting, a few books and stationery on the desk, and a window with daylight coming through. The person appears to be in deep thought, suggesting careful consideration.

How Do I Close a Facebook Account?

Closing a Facebook account is not a complicated process, but think twice before doing so.

A bright and photorealistic thumbnail showing a desktop computer screen. The desktop computer is modern and sleek, prominently positioned in the center of the image. The screen of the computer vividly displays Welcome to Windows with clear, legible textThe environment around the computer is minimal and professional, focusing the viewer's attention on the screen. The lighting is well-balanced, highlighting the details of Windows, and the overall image composition is designed to be eye-catching and engaging for viewers interested in learning about installing or setting up Windows.

Set Up Windows 11 With Only a Local Account

Setting up a Windows 11 machine without a Microsoft account is still possible, though it’s not obvious.

Zorin OS

Downloading and Installing Zorin Linux

I often hear calls to switch from Windows to Linux. I’ll show you how to try Zorin Linux and install it if you decide it’s for you.

A frustrated person looking at a computer screen showing a 'disk full' warning. In the background, there are icons of a Recycle Bin, cloud storage, and an email app, each with a small red warning symbol indicating full storage. The environment is a typical home office with a desk, computer, and related items.

Delete Not Freeing Up Space? Take Out the Trash!

It can be frustrating to delete something to seemingly no effect. I’ll explain why that might be and what to do.

Windows 11 Media Creation Tool

Is There a Windows 11 Installation Media Download?

It’s rare to get installation media with your machine any more. Fortunately, Windows 11 installation media can be download online.

Deleted Files Are Removed Everywhere

“Deleted Files Are Removed Everywhere” — What Does It Mean?

It’s a scary warning that doesn’t quite mean what it says but is important to understand. I’ll explain.

Made In Russia

What to Do About Kaspersky Antivirus

Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?

A Windows laptop screen with the 'S-mode'. The background shows a person looking frustrated, surrounded by various app icons that are grayed out or have 'restricted' signs.

What is S-Mode and How Do I Get Rid of It?

S-mode is an additional set of restrictions in Windows that is intended to protect you. Most people want it off.

A photorealistic image of a person sitting at a desktop computer, writing an email. The computer screen displays the email message, clearly starting with 'Dear Mom,'. The setting is a cozy home office with personal items like family photos, books, and a coffee mug.

Does Technology Isolate or Connect?

There are those who feel that technology isolates us from the world. I maintain that, while it’s certainly a tool that can be misused, it can still be a tool for connection.

Backup Software

What Backup Software Should I Use?

Deciding what backup software to use relies on understanding what kind of backup you want to create. I’ll review the options.

A computer screen. On the screen, there are synchronization arrows connecting to a cloud icon, illustrating the cloud sync process. The background features a modern office setup with a keyboard and mouse on the desk, and a tidy workspace.

Managing Files on Your PC and in the Cloud

Document management can be complex and confusing, particularly when cloud storage is involved. I’ll review why that is and suggest how to manage it.

A person receiving a scam call. The person looks confused while holding a phone. A large speech bubble from the phone says 'Give me the code!' Contrasting this, another speech bubble from a nearby computer screen says 'Never share this code.'

One-Time Code Contradiction: When to Share and When to Beware

You’re told not to share your two-factor or other authentication code. And then you’re asked for it.

A computer screen displaying a super-hero with the words 'Super Admin' across their chest. The superhero is wearing a modern, sleek superhero suit in a vibrant color, with a cape flowing behind. The superhero is depicted in a dynamic, heroic pose, symbolizing power and control.

How To Enable the Administrator Account in Windows

There’s a hidden account with complete administrative access. I’ll show you how to enable it and discuss why you shouldn’t use it very often, if at all.

A computer monitor displaying a vibrant Windows 11 wallpaper. In the center of the screen, there's a large, translucent mushroom cloud symbolizing a major system reset or 'nuclear option'.

It Was My Time to Reformat and Reinstall

The steps I took, the software I installed, and a few things I discovered as I reinstalled Windows 11 on my main machine.

Windows 11 with a large "UNDO" key over it.

How Do I Go Back to Windows 10 From Windows 11?

Yes, you can still go back to Windows 10 from Windows 11. It just may not be easy.

A Google logo in a partially submerged sinking rowboat on the ocean. The scene shows a clear blue sky and calm sea. The rowboat is old and wooden, tilted to one side, taking in water, emphasizing the sense of sinking. The Google logo is prominently displayed on the side of the boat, colorful and contrasting with the natural oceanic background.

Why I’ve Stopped Using Google Search

Google search used to be the winner by far, but recent decreases in its trustworthiness and the improved offerings of other search engines make switching a pragmatic choice.

A scene showing a concerned individual at their computer, receiving a scam phone call from someone claiming to be from Microsoft, aiming to assist with non-existent computer errors.

I Got a Call from Microsoft and Allowed Them Access to My Computer. What Do I Do Now?

A very common scam has people supposedly from Microsoft, your ISP, or other authorities calling to help you with computer problems. Don’t fall for it.

Puzzle pieces of various digital file icons (documents, photos, videos) coming together to form a large cloud symbol, which represents the OneDrive cloud.

How Do I Download All OneDrive Files to My PC?

Downloading all your OneDrive files isn’t particularly difficult; it’s just not particularly obvious. I’ll show you two ways to do it.

A user in a modern, well-lit office environment. The user is viewing their computer screen, which displays an email with a phishing attempt; a large, transparent fish hook symbol overlays the email content, indicating danger. Beside the computer, on the desk, is a smartphone showing a notification for a two-factor authentication (2FA) request.

Beware the Middleman: How Your 2FA Could Be Compromised

Some forms of two factor authentication have vulnerabilities. Here’s how to avoid it.

Email around Microsoft.

How Do I Change the Email Address of My Microsoft Account?

You can associate multiple email addresses with your Microsoft account. Who knew?

The scene includes a computer screen displaying an email inbox with several spam email subjects visible, such as "Account Hacked!" and "Urgent: Security Alert." A large, bold, red 'X' is superimposed over these scam emails, symbolizing rejection or marking them as spam. In the foreground, a figure symbolizing a user (not specific in appearance) confidently presses the 'delete' or 'spam' button on the email client, ignoring the scam attempts.

Has a Hacker Really Hacked My Email Account?

An email claims your email account has been hacked, possibly even including a password you’ve used. Don’t be fooled; it’s a scam.

An investigator, characterized by a friendly and approachable design, using a magnifying glass to look closely at an email message on a computer screen. The scene is set in a dimly lit room, highlighting the focus on the screen, suggesting the importance of paying attention to detail. The investigator's expression is one of curiosity and determination, emphasizing the significance of scrutinizing every piece of information to uncover the truth behind the email message. This image should inspire viewers to be more diligent and thoughtful when examining their own emails.

Behind the Scam: Decoding the Secrets of Fraudulent Emails

Scam emails often have clues ranging from obvious to obscure. I’ll take a scam email and show you what I see.

Scam Alert message

Don’t Be Ashamed or Smug

If you’re embarrassed at having fallen for a scam, it’s tempting to want hide and not tell anyone. But it’s important to learn from the experience and share it. There’s no need to feel shame.

A close-up of hands using a smartphone or tablet, with the device's screen displaying a clear and bright passkey icon.

How Can Passkeys Possibly Be Safe?

Passkeys may feel confusing now, but they’re a doorway to a more secure, less frustrating, passwordless future.

A Roman warrior in full armor, holding a large shield in a defensive stance, is standing protectively over a USB security key placed on the ground. The sky is darkened by a dense flurry of incoming arrows, emphasizing the warrior's role as the protector of this modern digital key.

How to Protect Yourself From a Two-Factor Hack

Two-factor authentication isn’t perfect, but it’s much better than not using it at all. Here are the various risks and what you can do to protect yourself.

A cartoon duck stands in the middle of a vibrant, digitally illustrated scene, holding a USB cable. The left end of the USB cable is plugged into a fluffy, cartoonish cloud.

Is There a Way to Use OneDrive as a Dumb Hard Drive?

Yes, you can use OneDrive online without using OneDrive on your PC or going to OneDrive.com. I’ll show you how.

The scene includes a metaphorical depiction of the scam process, showing a digital landscape with a piggy bank standing on one side, looking full and healthy, connected by a series of digital pathways and strings to a shadowy figure on the other side, who holds a butcher knife made of binary code, symbolizing the scammer preparing to 'butcher' the victim's savings. The background is a mix of digital and real elements, such as a cityscape blending into a circuit board, representing the intersection of technology and everyday life where these scams take place. Include symbols like chat bubbles, hearts, and dollar signs floating between the piggy bank and the shadowy figure to represent the building of trust, emotional manipulation, and financial transactions involved in the scam. The overall atmosphere should be ominous yet subtle, highlighting the deceptive and hidden dangers of online scams.

What Is a Pig-Butchering Scam?

Pig-butchering is a nasty term for a particularly painful type of scam. Here’s how to protect yourself.

Whither Authy?

Dealing With the Demise of Authy Desktop

Authy’s desktop version is going away (darn it!). Here’s how I will replace it.

A cartoon-style image representing email transfer between two email providers. Between them, a smooth flow of cartoonish email envelopes, creating a visual path from one to the other. The envelopes should appear as if they are moving seamlessly, symbolizing an easy transfer process. The background is a digital, abstract representation of data transfer, with subtle lines and nodes connecting the two logos, further emphasizing the idea of seamless integration and transition of emails.

How Do I Move Emails From One Account to Another?

Moving email from one account to another just takes some configurating and drag-and-dropping.

Image in the style of a Renaissance painting, depicting a scene where a scholar from the Renaissance era is holding a magnifying glass, examining a collection of objects that symbolize modern technology - like a computer, cloud symbol, smart home device, and network cables. The objects should be creatively integrated to appear as if they belong in the Renaissance period, with a prominent question mark woven into the scene. The painting should have the rich color palette, detailed textures, and depth characteristic of Renaissance art

Why I Don’t Believe in Conspiracies

There are many conspiracy theories in the tech industry. I’m a hard one to convince, and you should be, too.

A realistic hand holding a smartphone displaying a map, with recognizable landmarks in the background..

The Surprising Ways Your Videos Can Expose Your Location

Something many people do every day may expose their location in ways they don’t know.

An animated style image showcasing a humorous and exaggerated scene: a desktop computer is securely placed on a more prominent and detailed automotive hoist, which is well-defined and realistic within the animated context. Below the hoist, a cartoonish technician, dressed in colorful mechanic's attire, is comically inspecting the computer from underneath. The garage setting is vibrant and lively, filled with oversized, cartoon-like tools and car parts. The technician, displaying a humorous expression, uses an oversized wrench or tool to interact with the computer, emphasizing the playful nature of the scene. The background includes other whimsical elements typical of an animated mechanic's workshop.

How to Keep Windows Running Smoothly With Routine Maintenance

Much like an automobile, it can be useful to periodically look under the hood, clean things up, and make sure that all is as it should be.

Working on updates

How Do I Fix Windows Update?

Windows Update can get confused or stuck. I’ll review ways to fix Windows Update, including what I refer to as the nuclear option.

A 16:9 photorealistic collage featuring various search bar queries in different styles and fonts, scattered across the image. In the center, there is a large, bold question mark that stands out against the background of search queries. The overall composition is dynamic and visually appealing, with a focus on the central question mark symbolizing curiosity and the quest for knowledge through internet searches.

I Gave AI My Search History and Here’s What It Told Me

I was listening to a podcast recently in which one of the hosts described giving ChatGPT the history of the questions he had asked it and then asking it to build a profile on him based on that. It was interesting, of course, but it got me to thinking… why not use internet searches as … Read more

Wiping Data

How to Securely Wipe the Windows System Drive

Reformatting the system drive takes a little more effort than other drives. Here are three ways to get it done.

The main feature is a large, central OneDrive icon with a striking red 'X' across it, symbolizing the goal of removal. Surrounding this icon are smaller images of frustrated users at their computers, overwhelmed by OneDrive notifications and pop-ups. Each user's face shows clear annoyance and confusion, representing the intrusiveness of OneDrive. The background includes a concise list of steps for uninstalling OneDrive, like 'Unlink account', 'Uninstall OneDrive app', and 'Organize files'. The design should be bold and straightforward, making it very clear that the tutorial is about removing OneDrive from a Windows computer, appealing to viewers who are looking for a solution to this specific issue.

How Do I Get Rid of OneDrive?

Some people just want it GONE. I’ll show you how to get rid of OneDrive.

"The app you’re trying to install isn’t a Microsoft-verified app"

How Do I Fix “The App You’re Trying to Install Isn’t a Microsoft-Verified App”?

“The app you’re trying to install isn’t a Microsoft-verified app” message is the result of a simple setting you can change.

Feature a whimsical, animated-style computer or laptop with a vibrant, exaggerated screen displaying fast internet symbols like a speedometer or lightning bolt. Include animated icons such as a Wi-Fi signal, Ethernet cable, a globe for DNS, and a creative version of the Windows 11 logo. The background should be lively and colorful, complementing the animated theme, making the image engaging and visually appealing.

8 Ways You Can Increase Internet Speed in Windows

Internet speed: we all want it. Here’s how to improve yours.