Articles tagged: Featured

Why Password Managers are Safer than the Alternatives

If you’re not using a password manager, you’re likely compromising your security more than necessary. Here’s why using one is safer.

You’re Just Not That Interesting (Except When You Are)

Worried about privacy? I believe we over-imagine the risks and at the same time are our own worst enemies.

Will Ransomware Encrypt Backups?

A full-image backup is still the best defense against ransomware. But what if your backup gets encrypted? I’ll look at the likelihood of that happening and make some recommendations.

How Do I Decrypt Files Encrypted by Ransomware?

Once your files are encrypted by ransomware, your options are few. If you’re not prepared, there are a few straws to grasp at.

Why You’re Being Warned About Windows 10 End of Service and What to Do About It

Windows 10 warns when it’s coming to “end of service”, but what does that mean if Windows 10 is always being updated?

What Do I Do About Adobe Flash End of Life in 2020?

Support for Adobe Flash will end at the end of 2020. The good news is that most sites have stopped needing it. For those that do, there’s really no alternative.

Facebook Hacked? What You Need to Do NOW!

Facebook account hacks happen. There are steps to take not only to recover your account, but to prevent it from being hacked again.

How to Back Up Before a Windows 10 Upgrade

Always back up before a Windows 10 upgrade, update, or reinstall. Create a full system image backup of up your entire machine.

How Do I Report a Bug in Windows 10?

It’s easy to report a bug in Windows 10. The question is, is it worth your time?

My Email Is Hacked, How Do I Fix It? – 7 Things You Need to Do NOW!

If your email is hacked, there are several steps you need to take to fix it and prevent it from being hacked again.

Don’t Call Yourself Stupid

Some people call themselves “dumb” or “stupid” when it comes to computers. There’s little that frustrates me more.

Is Using the Cloud Safe?

As security compromises seem to happen regularly, many ask, “Is using the cloud safe?” It’s as safe as you make it.

Getting Rid of Bing in Windows Search

We can’t change the search engine used by Windows Search when searching the web, but we can avoid Bing by not having Windows Search search the web at all.

How Do I Remove Malware from Windows 10 in 2020?

Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.

How to Remove PUPs and Other Unexpected Things From Your Computer

Casually installing one download may result in several other things being installed. I’ll review the steps to remove these pesky, problematic, painful, Potentially Unwanted Programs, or PUPs.

What Security Software Do You Recommend? Basic Protection in Four Steps

My recommendations for specific security software and techniques to keep your computer, and yourself, safe.

Are You Asking Too Much of Your Computer?

It’s very common for our usage and expectations of our computers to grow over time. Unfortunately, that means we’ll eventually run into its limitations.

Should I Disconnect My Backup Drive When I’m Not Backing Up?

Some people disconnect their backup drive when not backing up because they fear ransomware. I explain why that’s a Really Bad Idea.

Stop Spreading Manure

Believing and spreading manure — lies, falsehoods, and misleading implications — makes you look bad, and makes the internet a dumber place.

Just What Is Common Sense?

‘Common sense’ is frequently suggested, often missing, and rarely defined. I’ll take a look at some of what I feel are the characteristics of common sense.

What’s the Difference Between CHKDSK /F and CHKDSK /R?

CHKDSK is a powerful Windows utility used to diagnose and repair disks. /F and /R represent two types of repairs.

How Do I Get Rid of Gmail Tabs? How to Regain Control and Find the Email Gmail Might Be Hiding From You

Gmail introduced a tabbed interface to automatically categorized email messages. Since their categorization often misses the mark, let’s turn it off.

Should I Use FAT32 or NTFS on a Flash Drive? The Differences, and a Third Alternative

File systems are commonly formatted as FAT32, NFTS, or exFAT. Which is best for your thumb drive?

Is There an Email Service that Doesn’t Require a Phone Number? My Recommended Approach, and Alternatives

There are legitimate reasons for not wanting to give your phone number to an email service. Let’s look at alternatives.

How Long Should I Keep My Backups?

Having a regular backup system in place is critical — but then what? I’ll look at how long you might want to keep those backups, why, and how long I keep mine.

What If I Lose My Second Factor?

When you lose your second factor, there are two things to be concerned about: getting into your own account — for which you should be prepared — and someone else having access to your second factor — which isn’t as scary as it sounds.

What’s the Difference Between an Email Account, an Email Address, an Email Program, and an Email Service?

Terminology around email can be confusing, and lead to incorrect answers to misstated questions. I’ll review some common and important terms.

Why Can’t Online Services Tell Me My Password? (If They Can, There’s Something Wrong)

It’s for your own protection, and the result of fascinating mathematical wizardry. And if they can tell you your password? They’re doing security wrong.

What Laptop Would You Buy for $1500? My Choice, and My Recommendation for You

This is a question I generally avoid answering, but I will anyway. The problem is I can’t really tell you what to purchase, since your needs are undoubtedly different than mine.

Is It Safe to Let Your Browser Remember Passwords?

Letting your browser remember passwords is a convenient feature. However, with that convenience comes risk — often significant risk. Most folks are much better served by using a password vault like LastPass. I’ll explain why.

Can My Work Spy on My Home Computer? Three Ways You Might Be Letting Them In, and What To Do

Using a computer at work puts you at their mercy. It’s technically possible your workplace could spy on all your activities.

What to Do With an Old Computer You’ve Been Given – What I Did With Mine

When I’m given an old computer, there are a few things I do for the safety of the original owners, myself, and the planet.

Who’s Trying to Change My Password? Why It Happens and What to Do

If your account has not actually been hacked, there’s little anyone can do to find out who’s trying to log in as you. But there are steps you can take to protect yourself from would-be hackers and phishing scams.

What’s the Best Registry Cleaner? What to Use, and Not

The best registry cleaner is none at all. There may be cases where you want to use one, though, and I’ll review which I’d use and how to use them safely.

Why a Chromebook? (And Why I Purchased Two for the Important People in My Life)

Chromebooks can be a viable alternative for those who do most of their computing online and are looking for a simpler, perhaps more stable, yet powerful device.

Why Can’t I Talk To a Real Person? What You Need To Consider When Using Free Services

There are many reasons you’re more likely to be directed to online and self-help resources than talk to a real person.

What Should I Do When My Information Is Involved in a Breach?

If your account is ever part of a breach, secure your account to avoid further risk.

System File Checker having been run

Five Steps to Repair Windows 10 Without Losing Programs

Before you give up and reinstall Windows, try to repair Windows 10 without losing programs.

What are the Internet’s Rules about Free Speech?

Often, when people find their posts or comments removed or altered from websites they visit, they’re quick to claim their right to free speech has been violated. That’s rarely the case.

Can My Workplace See What Else I Do When I Work from Home?

Working from home can be convenient, or even a necessity. Does it open up your other online activity to scrutiny by your company?

Five Steps to Better Security Working from Home

Security threats for people working from home are increasing. I’ll review steps you need to take to keep yourself, your company, and your job safe.

Can Video Chat Be Intercepted and Recorded?

Video chat is probably not monitored, but there’s no way to prove that. If that’s too vague for you, then be careful what you do on your computer.

"Just" remove your files

Can Malware Survive If I Reset My PC?

It’s possible for malware to be difficult or nearly impossible to remove. It’s also extremely rare.

Why Don’t I Get Sound from My Computer? (A Checklist)

“No sound” can happen for a variety of reasons. Here’s how to troubleshoot if your computer is inexplicably silent.

How Do I Choose a Good Password?

With occasional security breaches at service providers and rampant email account theft, password security has never been more important. Make sure you choose and use secure passwords.

Preparing For The Ultimate Disaster

If you’re not around to unlock all the digital data you take such care to secure, who will be able to access it, and how?

How Much Can I Trust Information on the Internet?

Information on the internet ranges from truth to fiction to intentional misinformation. It’s important to develop a critical eye towards everything you read.

How to Create a Windows 10 Recovery Drive

A Windows 10 Recovery Drive can be used to restore Windows backups to your machine and more. I’ll show you how to create one.

It Pays to Be Skeptical

If we would all be a little more skeptical, we’d be safer and the internet would be a more trustworthy place.

Picking Up and Setting Up My New Desktop

My new machine was ready! I’ll show you where it came from, and the laundry list of things I did first.