Articles tagged: Featured
People often send email to the wrong address by mistake. But what happens if the email address is invalid?
My phoned died, and with it, all the two-factor authentication methods I’d used it for. Here’s how I recovered.
Microsoft will show you how much space your Hotmail/Outlook.com/Microsoft account is using, if you know where to look.
If you’ve been told to change your password, do so, but do so in the right way. I’ll explain what that means and why it’s important.
I keep hearing from people who consider themselves too old. They’re not. Don’t be like them.
My laptop died. Here’s the process I went through to resurrect it.
Windows feature updates are supposed to be delivered in a somewhat timely fashion. If not, or if you’re just impatient, you can force the issue.
Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?
Give Windows 11 a shot, but know that you can go back to Windows 10 if you need to.
QR codes are a nifty way to encode web addresses and other text in a way that’s easy for your smartphone to decode, but they are not without risk.
Image backups are great ways to back up absolutely everything on a hard disk. They’re also good for retrieving most anything, including individual files.
Factory reset is a great option to have, but it doesn’t cover all the scenarios a full image backup does.
The ability to create a local user account on Windows hasn’t been removed; it’s just not obvious where to find it.
All malware is scary, especially ransomware due to the damage it can inflict. Here’s how to avoid a repeat performance.
There is no such thing as absolute safety. But there are definitely steps you can take to be as safe as possible.
When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Many of those people are wrong.
BitLocker is a fine approach to encrypting hard drives, especially the system drive. It’s easy to turn off BitLocker if you decide you no longer need it.
Regardless of your initial thoughts, every account is important, and we are all targets.
Email is ubiquitous and convenient, yet surprisingly, not particularly secure. I’ll look at why that is and when you should worry.
Windows configures itself to the hardware it finds — but changing everything at once by moving the system disk to a different machine might be too much.
There are several ways to deal with an overflowing Google Drive.
The “Always keep on this device” feature has misled people into deleting and losing important files. Here’s why, and what to do instead.
Another day, another report of hackers exploiting vulnerabilities. Here’s how you stay safe.
OneDrive tries to make it easy to back up important folders, but at the cost of making some things very confusing.
Good help is hard to find. That’s just as true when it comes to finding good local computer service and support as it is anywhere else.
Repair or replace can be a difficult decision. I’ll review a few factors to consider when deciding.
The goal of many social media companies is to keep you engaged as long as possible. You can avoid social media algorithms and take back (some) control.
Facebook can use standard web protocols to get an idea of what you’re doing online, even if you don’t have an account.
Having a regular backup system in place is critical. But then what? I’ll look at how long you might want to keep those backups, why, and how long I keep mine.
Passwordless authentication removes the need for a password and replaces it with something else. But can that be secure?
My favorite question? You’ll never guess. Hint: it makes my job super easy, and you don’t want that.
A sudden flood of additional spam is not unusual. I’ll look at why I think it happens, and when I start to worry.
Windows 11 hardware requirements brought the TPM, or Trusted Platform Module, into the spotlight. I’ll touch on what it is, why your machine might not appear to have one, and what to do if it doesn’t.
As few as three random words make better passwords than strings of random characters — but not, perhaps, for the reasons you think.
Password vaults are a common recommendation by security professionals to improve your online security. Why do so many resist?
Another day, another breach. What should you do if you’re involved?
A friend received a fairly convincing phishing attempt. I’ll cover the signs that showed it was bogus.
It’s not uncommon to get unexpected email sent to an email address similar to your own. I’ll review why that is and what to do about it.
If your keyboard won’t work after a Windows Update, there’s a lengthy list of things to try to get it back.
Windows Update can update more than just the Windows operating system. So keeping it up to date is still a good idea.
Exactly how long Windows 10 will be supported has changed since its original release. The original expectations were unrealistic at best.
While travelling, I signed in to my LastPass account only to be told I needed to confirm an email message that never arrived — or so I thought.
Microsoft Word online has the option to create transcriptions of audio recordings for Microsoft Office subscribers.
The release of Windows 11 proved the statement that Windows 10 would be the last version of Windows to be wrong. But was it a lie?
Windows Update generally works. Here’s the successful approach I took when it didn’t.
Ransomware is known for encrypting your data and holding it hostage. It turns out that it can do more that backups won’t protect against.
If someone threatens you because they know your IP address, it’s an empty threat.
Desperation can lead you to consider hiring so-called “legit”, “ethical”, or “white-hat” hackers to regain control of a your account. Don’t do it.
Hack or hacking can mean several different things — both good and bad — depending on the context. I’ll review the most common definitions.
Configuring a PC-based email program to use IMAP and have it constantly download email as a backup is a reasonable way to go.