Because Internet Explorer is really a component of Windows itself, uninstalling and reinstalling, while possible, is somewhat different than other applications and has different implications.
Entering your email address incorrectly might just be a typo, but it can have surprising ramifications.
We hear of Windows Update messing up computers. I’ll look through one scenario and offer some advice and a reminder: it’s not your fault.
Sometimes the clipboard behaves mysteriously. Let’s look at why.
There’s nothing wrong with covering your camera, but it’s probably not worth the effort.
Facebook identifies accounts with an email address, and tries to collect email addresses of friends. That can lead to fake accounts and unwanted invitations.
Email reputation for your home IP address probably doesn’t matter, and having it characterized as “poor” might even be a good thing.
Most email programs can block email from a specific address. Unfortunately, blocking email from a sender is ineffective when it comes to spam.
What Windows Update leaves behind isn’t trash at all, but rather files with a specific purpose.
It’s impossible to know your machine has no malware. What does that mean for your safety?
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
OneDrive is a surprisingly powerful service that many people overlook or don’t understand. I’ll review six ways you can leverage OneDrive.
Microsoft Word documents display differently on different systems because of differences between the systems. Getting Microsoft Word documents to display identically typically means processing them into something else.
Password security has never been more important. With occasional security breaches at service providers and rampant email account theft, make sure you’re choosing and using secure passwords.
I can’t always give a straight answer, mostly because every computer is unique. My most common answer? “It depends.”
Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus. Phishing is on the rise, and you need to be aware.
If no preparations have been made beforehand, accessing the machine of a deceased loved one can be anywhere from easy to impossible.
Hibernate and sleep are two optimizations to the boot/reboot process that can speed things up.
Deleting your Facebook account requires some preparation and a fairly well-hidden link. I’ll outline the preparation and point you to the link.
Newer machines often come with multiple partitions. While it’s tempting to remove them, there’s little to be gained.
After all this time, networking computers remains out of the reach of the average user, and that’s really frustrating.
Step one to an operating system upgrade? Create a full system image backup of up your entire machine! Step one to a reinstall? The same.
Losing access to your password vault can be a major inconvenience. Fortunately, that’s all it needs to be, and there are ways to prevent even that.
So-called “problems” with your Microsoft account may refer to Windows, or to other applications on your system.
Every Windows 10 update should just work. Unfortunately, for some, they just don’t.
“Hard Disk Failure Is Imminent” is a message you want to take very seriously — so seriously that hopefully, you’ll have planned for it beforehand.
Is it possible to bank online securely? Yes, if you’re careful.
Windows 10 Home edition gives you little control of Windows Update. I do have a fairly large hammer you can use.
Booting your machine can take time, but sometimes so does shutting it down. Various issues contribute to a slow shutdown.
Nothing protects you and your data like a complete, recent backup, even when it might not be obvious. That’s why I harp on it so much.
Using your computer’s Power button improperly, or pulling the plug, can lead to serious data loss. I’ll look at the right way to turn your computer off.
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.
If you meet a couple of criteria, you can still get Windows 10 for free, at least until the end of the year.
There are good reasons why you’re more likely to be directed to online and self help resources than actually talk to a real person.
A peek into my priorities as I install apps and make changes after a Windows 10 reset.
Cookies are a fact of life when browsing the web. But if you look at the cookies stored on your machine, you might be surprised how many there are.
Another day, another story of data loss. The frustrating thing is that it doesn’t have to happen.
Deciding how you want to open a file depends on knowing what the file contains and knowing what program will understand that.
When you ask someone for help, stack the deck in your favor by painting a clear picture of the problem you’re experiencing.
Interactions between software can cause unexpected side effects. If you’re experiencing a problem, it’s one more thing to look into.
A vulnerability has been discovered in a critical wireless security protocol. I’ll discuss whether you should worry and what steps you should take.
Yes, it’s possible. But you might want to ask a different question that will result in a more helpful answer.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
CCleaner, a popular Windows utility, accidentally included malware in its download for a time. Here’s my take on what to be concerned about and what to do.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
People often cite ransomware as a reason to avoid automated online backups, thinking that those backups will be impacted. OneDrive provides an answer.