Articles tagged: Featured
You can and should be aware of and control your Facebook privacy settings.
SMS messaging has some serious security vulnerabilities, but does that mean you should always avoid it? No.
That old account you lost probably won’t come back to haunt you, but it’s wise to take some action and keep your guard up.
When a legitimate email sender doesn’t respond to an “unsubscribe” request, they’re no longer legitimate. Here’s what to do.
Cloud storage is ubiquitous, convenient, and BIG. There are options if OneDrive is too big for your hard drive.
LastPass is changing the terms of their free service. Find out if you’re affected, and what to do if you are.
Many hotels offer both wired and wireless internet, but with those hotel internet connections comes a security risk most folks don’t consider.
Random crashes are annoying and difficult to diagnose. I’ll review common causes and steps you can take to determine what’s happening on your computer.
After a bad experience with Windows Update, it’s tempting to bail on the idea completely. Unfortunately, that can leave your machine vulnerable to malware.
If you’re not using a password manager, you’re likely compromising your security more than necessary. Here’s why using one is safer.
Worried about privacy? I believe we over-imagine the risks and at the same time are our own worst enemies.
A full-image backup is still the best defense against ransomware. But what if your backup gets encrypted? I’ll look at the likelihood of that happening and make some recommendations.
Once your files are encrypted by ransomware, your options are few. If you’re not prepared, there are a few straws to grasp at.
Windows 10 warns when it’s coming to “end of service”, but what does that mean if Windows 10 is always being updated?
Support for Adobe Flash will end at the end of 2020. The good news is that most sites have stopped needing it. For those that do, there’s really no alternative.
Facebook account hacks happen. There are steps to take not only to recover your account, but to prevent it from being hacked again.
Always back up before a Windows 10 upgrade, update, or reinstall. Create a full system image backup of up your entire machine.
It’s easy to report a bug in Windows 10. The question is, is it worth your time?
If your email is hacked, there are several steps you need to take to fix it and prevent it from being hacked again.
Some people call themselves “dumb” or “stupid” when it comes to computers. There’s little that frustrates me more.
As security compromises seem to happen regularly, many ask, “Is using the cloud safe?” It’s as safe as you make it.
We can’t change the search engine used by Windows Search when searching the web, but we can avoid Bing by not having Windows Search search the web at all.
Trying to remove malware? I’ll walk you through the steps and options, from simple to hard, including the only approach that’s guaranteed to work.
Casually installing one download may result in several other things being installed. I’ll review the steps to remove these pesky, problematic, painful, Potentially Unwanted Programs, or PUPs.
My recommendations for specific security software and techniques to keep your computer, and yourself, safe.
It’s very common for our usage and expectations of our computers to grow over time. Unfortunately, that means we’ll eventually run into its limitations.
Some people disconnect their backup drive when not backing up because they fear ransomware. I explain why that’s a Really Bad Idea.
Believing and spreading manure — lies, falsehoods, and misleading implications — makes you look bad, and makes the internet a dumber place.
‘Common sense’ is frequently suggested, often missing, and rarely defined. I’ll take a look at some of what I feel are the characteristics of common sense.
CHKDSK is a powerful Windows utility used to diagnose and repair disks. /F and /R represent two types of repairs.
How Do I Get Rid of Gmail Tabs? How to Regain Control and Find the Email Gmail Might Be Hiding From You
Gmail introduced a tabbed interface to automatically categorize email messages. Since their categorization often misses the mark, let’s turn it off.
File systems are commonly formatted as FAT32, NFTS, or exFAT. Which is best for your thumb drive?
Is There an Email Service that Doesn’t Require a Phone Number? My Recommended Approach, and Alternatives
There are legitimate reasons for not wanting to give your phone number to an email service. Let’s look at alternatives.
Having a regular backup system in place is critical — but then what? I’ll look at how long you might want to keep those backups, why, and how long I keep mine.
When you lose your second factor, there are two things to be concerned about: getting into your own account — for which you should be prepared — and someone else having access to your second factor — which isn’t as scary as it sounds.
What’s the Difference Between an Email Account, an Email Address, an Email Program, and an Email Service?
Terminology around email can be confusing, and lead to incorrect answers to misstated questions. I’ll review some common and important terms.
It’s for your own protection, and the result of fascinating mathematical wizardry. And if they can tell you your password? They’re doing security wrong.
This is a question I generally avoid answering, but I will anyway. The problem is I can’t really tell you what to purchase, since your needs are undoubtedly different than mine.
Using a computer at work puts you at their mercy. It’s technically possible your workplace could spy on all your activities.
When I’m given an old computer, there are a few things I do for the safety of the original owners, myself, and the planet.
If your account has not actually been hacked, there’s little anyone can do to find out who’s trying to log in as you. But there are steps you can take to protect yourself from would-be hackers and phishing scams.
The best registry cleaner is none at all. There may be cases where you want to use one, though, and I’ll review which I’d use and how to use them safely.
Chromebooks can be a viable alternative for those who do most of their computing online and are looking for a simpler, perhaps more stable, yet powerful device.
There are many reasons you’re more likely to be directed to online and self-help resources than talk to a real person.
If your account is ever part of a breach, secure your account to avoid further risk.
Before you give up and reinstall Windows, try to repair Windows 10 without losing programs.
Often, when people find their posts or comments removed or altered from websites they visit, they’re quick to claim their right to free speech has been violated. That’s rarely the case.
Working from home can be convenient, or even a necessity. Does it open up your other online activity to scrutiny by your company?
Security threats for people working from home are increasing. I’ll review steps you need to take to keep yourself, your company, and your job safe.