Articles tagged: Featured
A friend received a fairly convincing phishing attempt. I’ll cover the signs that showed it was bogus.
It’s not uncommon to get unexpected email sent to an email address similar to your own. I’ll review why that is and what to do about it.
A high-level overview of how websites and services should store passwords security, so next time there’s a breach you’ll know what to look for.
If your keyboard won’t work after a Windows Update, there’s a lengthy list of things to try to get it back.
Windows Update can update more than just the Windows operating system. So keeping it up to date is still a good idea.
Exactly how long Windows 10 will be supported has changed since its original release. The original expectations were unrealistic at best.
While travelling, I signed in to my LastPass account only to be told I needed to confirm an email message that never arrived — or so I thought.
Windows 11 has been announced to much fanfare, hype, and confusion. Windows 11 certainly isn’t ready for prime time, and likely not ready for you.
Microsoft Word online has the option to create transcriptions of audio recordings for Microsoft Office subscribers.
The release of Windows 11 proved the statement that Windows 10 would be the last version of Windows to be wrong. But was it a lie?
Windows Update generally works. Here’s the successful approach I took when it didn’t.
Ransomware is known for encrypting your data and holding it hostage. It turns out that it can do more that backups won’t protect against.
If someone threatens you because they know your IP address, it’s an empty threat.
Desperation can lead you to consider hiring so-called “legit”, “ethical”, or “white-hat” hackers to regain control of a your account. Don’t do it.
Hack or hacking can mean several different things — both good and bad — depending on the context. I’ll review the most common definitions.
Configuring a PC-based email program to use IMAP and have it constantly download email as a backup is a reasonable way to go.
We keep hearing that SSDs and other flash-based drives wear out. Particularly when it comes to SSDs, there are ways you can see how close to wearing out your drive might be.
Six practical approaches to generating passwords, ranked from best to worst.
People ask every day how they can reach someone at Microsoft to help with Hotmail and Outlook.com problems. There is help.
Responding to notification permissions is annoying. In some browsers, we can turn that off completely.
It’s impossible to know your machine has no malware. What does that mean for your safety?
Browser extensions are often installed with little thought to the immense security risk they present.
It’s tempting to just use file-copy tools to back up what you think you need. But you can easily miss something very important.
Two-factor authentication is an important tool to keep accounts secure, but prepare for losing the second factor so you don’t lose your account.
You can and should be aware of and control your Facebook privacy settings.
SMS messaging has some serious security vulnerabilities, but does that mean you should always avoid it? No.
That old account you lost probably won’t come back to haunt you, but it’s wise to take some action and keep your guard up.
Cloud storage is ubiquitous, convenient, and BIG. There are options if OneDrive is too big for your hard drive.
LastPass is changing the terms of their free service. Find out if you’re affected, and what to do if you are.
Many hotels offer both wired and wireless internet, but with those hotel internet connections comes a security risk most folks don’t consider.
Random crashes are annoying and difficult to diagnose. I’ll review common causes and steps you can take to determine what’s happening on your computer.
After a bad experience with Windows Update, it’s tempting to bail on the idea completely. Unfortunately, that can leave your machine vulnerable to malware.
If you’re not using a password manager, you’re likely compromising your security more than necessary. Here’s why using one is safer.
Worried about privacy? I believe we over-imagine the risks and at the same time are our own worst enemies.
A full-image backup is still the best defense against ransomware. But what if your backup gets encrypted? I’ll look at the likelihood of that happening and make some recommendations.
Once your files are encrypted by ransomware, your options are few. If you’re not prepared, there are a few straws to grasp at.
Windows 10 warns when it’s coming to “end of service”, but what does that mean if Windows 10 is always being updated?
Support for Adobe Flash will end at the end of 2020. The good news is that most sites have stopped needing it. For those that do, there’s really no alternative.
Facebook account hacks happen. There are steps to take not only to recover your account, but to prevent it from being hacked again.
Always back up before a Windows 10 upgrade, update, or reinstall. Create a full system image backup of up your entire machine.
It’s easy to report a bug in Windows 10. The question is, is it worth your time?
If your email is hacked, there are several steps you need to take to fix it and prevent it from being hacked again.
Some people call themselves “dumb” or “stupid” when it comes to computers. There’s little that frustrates me more.
As security compromises seem to happen regularly, many ask, “Is using the cloud safe?” It’s as safe as you make it.
We can’t change the search engine used by Windows Search when searching the web, but we can avoid Bing by not having Windows Search search the web at all.
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
Casually installing one download may result in several other things being installed. I’ll review the steps to remove these pesky, problematic, painful, Potentially Unwanted Programs, or PUPs.
My recommendations for specific security software and techniques to keep your computer, and yourself, safe.
It’s very common for our usage and expectations of our computers to grow over time. Unfortunately, that means we’ll eventually run into its limitations.