Articles tagged: Featured
Smishing is simply text-messaging spam. Learn to recognize and respond appropriately to it.
CPU speed doesn’t matter quite as much as it once did. I’ll discuss why, and what you should also be looking at.
The best password manager is the password manager you’ll use (within reason, of course).
A portion of LastPass was breached. Here’s why it’s not a disaster, and why I’m not leaving LastPass.
It’s difficult to go wrong when selecting a browser these days.
Don’t overlook backing up as part of your security. When the worst happens, it’s your backup that will save you.
Msinfo32 is a tool to display and save an extensive report of your computer’s configuration and state. It can be very helpful for others helping you diagnose issues.
Data breaches rarely expose multiple accounts. There are rare scenarios where multiple accounts might still be at risk, though.
When you think about the complexity of today’s systems, it’s kind of amazing that we don’t have more breaches.
Rescue, recovery, repair, and emergency discs can all mean different things.
I tried to get locked out of my Microsoft account while traveling. I couldn’t. Why? I’d prepared. You can too.
If you’re not getting email messages sent by one particular person, there’s a list of things to check.
Google’s Chrome Remote Desktop is a free and convenient remote-access tool allowing you to get help from people you trust or be the person giving help.
If you’ve lost your Facebook password, there are a couple of ways to recover: use the Facebook process for account recovery, or check your browser’s remembered passwords.
Facebook is removing an account recovery feature, making this an important time to take stock of your own account security.
The end of support for Windows 10 means Microsoft will no longer issue security updates. Here’s how to continue using it safely.
Wi-Fi speed can be slow for many different reasons. Slow Wi-Fi can also be a symptom of speed constraints elsewhere.
Google is increasing the security requirements for accessing your Gmail accounts. I’ll review what the change means and the options you have.
People often send email to the wrong address by mistake. But what happens if the email address is invalid?
My phoned died, and with it, all the two-factor authentication methods I’d used it for. Here’s how I recovered.
Microsoft will show you how much space your Hotmail/Outlook.com/Microsoft account is using, if you know where to look.
If you’ve been told to change your password, do so, but do so in the right way. I’ll explain what that means and why it’s important.
I keep hearing from people who consider themselves too old. They’re not. Don’t be like them.
My laptop died. Here’s the process I went through to resurrect it.
Windows feature updates are supposed to be delivered in a somewhat timely fashion. If not, or if you’re just impatient, you can force the issue.
Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?
Give Windows 11 a shot, but know that you can go back to Windows 10 if you need to.
QR codes are a nifty way to encode web addresses and other text in a way that’s easy for your smartphone to decode, but they are not without risk.
Image backups are great ways to back up absolutely everything on a hard disk. They’re also good for retrieving most anything, including individual files.
Factory reset is a great option to have, but it doesn’t cover all the scenarios a full image backup does.
The ability to create a local user account on Windows hasn’t been removed; it’s just not obvious where to find it.
All malware is scary, especially ransomware due to the damage it can inflict. Here’s how to avoid a repeat performance.
There is no such thing as absolute safety. But there are definitely steps you can take to be as safe as possible.
When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Many of those people are wrong.
BitLocker is a fine approach to encrypting hard drives, especially the system drive. It’s easy to turn off BitLocker if you decide you no longer need it.
Regardless of your initial thoughts, every account is important, and we are all targets.
Email is ubiquitous and convenient, yet surprisingly, not particularly secure. I’ll look at why that is and when you should worry.
Windows configures itself to the hardware it finds — but changing everything at once by moving the system disk to a different machine might be too much.
There are several ways to deal with an overflowing Google Drive.
The “Always keep on this device” feature has misled people into deleting and losing important files. Here’s why, and what to do instead.
Another day, another report of hackers exploiting vulnerabilities. Here’s how you stay safe.
OneDrive tries to make it easy to back up important folders, but at the cost of making some things very confusing.
Good help is hard to find. That’s just as true when it comes to finding good local computer service and support as it is anywhere else.
Repair or replace can be a difficult decision. I’ll review a few factors to consider when deciding.
The goal of many social media companies is to keep you engaged as long as possible. You can avoid social media algorithms and take back (some) control.
Facebook can use standard web protocols to get an idea of what you’re doing online, even if you don’t have an account.
Having a regular backup system in place is critical. But then what? I’ll look at how long you might want to keep those backups, why, and how long I keep mine.
Passwordless authentication removes the need for a password and replaces it with something else. But can that be secure?
My favorite question? You’ll never guess. Hint: it makes my job super easy, and you don’t want that.
A sudden flood of additional spam is not unusual. I’ll look at why I think it happens, and when I start to worry.