Articles tagged: fullcontent
Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus. Phishing is on the rise, and you need to be aware.
A friend’s slow computer provided me an opportunity to review the four primary characteristics of computer slowdowns to help you diagnose issues in the future.
Online harassment is common problem, and prevalent among children. I’ll review some of the issues and steps to be taken.
Facebook is full of myths and misinformation. I’ll look at a few of the current offenders.
Gmail offers a “confidential mode”. It is and it isn’t; learn how it works before you use it.
It’s almost impossible to remove all personal information from a Windows installation, short of one extreme option.
Every router has at least two IP addresses. It’s a characteristic of how routers do their jobs.
Because Internet Explorer is really a component of Windows itself, uninstalling and reinstalling, while possible, is somewhat different than other applications and has different implications.
Entering your email address incorrectly might just be a typo, but it can have surprising ramifications.
We hear of Windows Update messing up computers. I’ll look through one scenario and offer some advice and a reminder: it’s not your fault.
Sometimes the clipboard behaves mysteriously. Let’s look at why.
There’s nothing wrong with covering your camera, but it’s probably not worth the effort.
Facebook identifies accounts with an email address, and tries to collect email addresses of friends. That can lead to fake accounts and unwanted invitations.
Email reputation for your home IP address probably doesn’t matter, and having it characterized as “poor” might even be a good thing.
What Windows Update leaves behind isn’t trash at all, but rather files with a specific purpose.
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
Microsoft Word documents display differently on different systems because of differences between the systems. Getting Microsoft Word documents to display identically typically means processing them into something else.
I can’t always give a straight answer, mostly because every computer is unique. My most common answer? “It depends.”
Hibernate and sleep are two optimizations to the boot/reboot process that can speed things up.
Newer machines often come with multiple partitions. While it’s tempting to remove them, there’s little to be gained.
Losing access to your password vault can be a major inconvenience. Fortunately, that’s all it needs to be, and there are ways to prevent even that.
So-called “problems” with your Microsoft account may refer to Windows, or to other applications on your system.
Every Windows 10 update should just work. Unfortunately, for some, they just don’t.
“Hard Disk Failure Is Imminent” is a message you want to take very seriously — so seriously that hopefully, you’ll have planned for it beforehand.
Windows 10 Home edition gives you little control of Windows Update. I do have a fairly large hammer you can use.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
A peek into my priorities as I install apps and make changes after a Windows 10 reset.
Cookies are a fact of life when browsing the web. But if you look at the cookies stored on your machine, you might be surprised how many there are.
Deciding how you want to open a file depends on knowing what the file contains and knowing what program will understand that.
Interactions between software can cause unexpected side effects. If you’re experiencing a problem, it’s one more thing to look into.
A vulnerability has been discovered in a critical wireless security protocol. I’ll discuss whether you should worry and what steps you should take.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
CCleaner, a popular Windows utility, accidentally included malware in its download for a time. Here’s my take on what to be concerned about and what to do.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
People often cite ransomware as a reason to avoid automated online backups, thinking that those backups will be impacted. OneDrive provides an answer.
We’re often enticed or directed to websites we’ve never been to before. We’ll look at a couple of tools to help identify safe websites.
File History, when properly enabled and configured, can restore deleted files or previous version of files that have changed.
Letting your anti-malware subscription lapse is never a good idea. I’ll look at why that is, and available alternatives.
You want more than a password, you want encryption. Encrypting an external drive can be done with the right software.
Advertising on the internet is broken. The result is that it might be time to think about adblockers, and supporting your favorite websites in other ways.