Articles tagged: Featured
When you lose your second factor, there are two things to be concerned about: getting into your own account — for which you should be prepared — and someone else having access to your second factor — which isn’t as scary as it sounds.
It’s for your own protection, and the result of fascinating mathematical wizardry. And if they can tell you your password? They’re doing security wrong.
This is a question I generally avoid answering, but I will anyway. The problem is I can’t really tell you what to purchase, since your needs are undoubtedly different than mine.
Using a computer at work puts you at their mercy. It’s technically possible your workplace could spy on all your activities.
When I’m given an old computer, there are a few things I do for the safety of the original owners, myself, and the planet.
If your account has not actually been hacked, there’s little anyone can do to find out who’s trying to log in as you. But there are steps you can take to protect yourself from would-be hackers and phishing scams.
The best registry cleaner is none at all. There may be cases where you want to use one, though, and I’ll review which I’d use and how to use them safely.
Chromebooks can be a viable alternative for those who do most of their computing online and are looking for a simpler, perhaps more stable, yet powerful device.
There are many reasons you’re more likely to be directed to online and self-help resources than talk to a real person.
If your account is ever part of a breach, secure it to avoid further risk.
Before you give up and reinstall Windows, try to repair Windows 10 without losing programs.
Often, when people find their posts or comments removed or altered from websites they visit, they’re quick to claim their right to free speech has been violated. That’s rarely the case.
Working from home can be convenient, or even a necessity. Does it open up your other online activity to scrutiny by your company?
Security threats for people working from home are increasing. I’ll review steps you need to take to keep yourself, your company, and your job safe.
Video chat is probably not monitored, but there’s no way to prove that. If that’s too vague for you, then be careful what you do on your computer.
It’s possible for malware to be difficult or nearly impossible to remove. It’s also extremely rare.
“No sound” can happen for a variety of reasons. Here’s how to troubleshoot if your computer is inexplicably silent.
With occasional security breaches at service providers and rampant email account theft, password security has never been more important. Make sure you choose and use secure passwords.
If you’re not around to unlock all the digital data you take such care to secure, who will be able to access it, and how?
Information on the internet ranges from truth to fiction to intentional misinformation. It’s important to develop a critical eye towards everything you read.
If we would all be a little more skeptical, we’d be safer and the internet would be a more trustworthy place.
My new machine was ready! I’ll show you where it came from, and the laundry list of things I did first.
Windows Update can get confused or stuck. I’ll review ways to fix Windows Update, including what I refer to as the “nuclear option”.
A year ago, I replaced two laptops and a desktop with a single laptop. It’s time to evaluate the results.
Turning off remote desktop is incrementally safer, but it is a very small piece of a much larger puzzle.
Before you dismiss it because it’s a subscription product, take a look and do the math. Microsoft Office 365 might be surprisingly affordable.
Yes, it’ll be possible to keep using Windows 7 after it’s no longer supported. However, doing so safely will depend on you.
There are several options to extend the life of an older machine, depending on its capabilities.
My annual review of which articles got the most attention and generated the most commentary in 2019.
Another day, another story of data loss. The frustrating thing is that it doesn’t have to happen.
A scam claims your email account has been hacked, possibly even including a password you’ve used. Don’t be fooled.
Partitioning, or splitting a single physical hard drive into multiple drives, has pros and cons. I’ll look at those and make a recommendation.
Headlines are proclaiming that two-factor authentication has been hacked. That in no way means you shouldn’t use it. Your account is still much safer with two-factor enabled.
If you’ve lost your Facebook password, there are a couple of ways to recover: use the Facebook process, or check your browser’s remembered passwords.
What do you do when you suddenly find yourself on the phone with a scammer? Step One: Be Skeptical!
Your ISP controls your internet connection, and it’s easy for them to monitor the data you send and receive. The question is, why would anyone monitor your internet?
You can bank online safely, as long as you know what to look for and what steps to take.
Believe it or not, there’s one change you can make that can dramatically impact how well your technology works for you.
How to back up Windows 10 using its own built-in tools in eight easy steps. Four bonus steps handle Microsoft’s plans to retire one of those tools.
Searching is an art of sorts. I’ll share two common mistakes searchers make, and my two-step approach to better search results.
Updates to Windows seemingly can’t be trusted, and yet they’re forced on us. Something must change.
Media hype makes it seem like the bad guys are winning. They’re always in the lead – but don’t believe the hype.
My take on the latest Windows update and your options therein.
There are those who feel that technology is isolating us from the world. I couldn’t disagree more.
Confident computing: it’s what you can expect, and a reminder to me of what I’m trying to deliver.
The latest major update to Windows 10 has an issue that’s preventing wider rollout. I’ll review what it is, and what to do.