Articles tagged: fullcontent
If you’ve lost your Facebook login password, there are a couple of ways to recover access to your account.
Facebook is full of myths and misinformation. I’ll look at a few of the current offenders.
Gmail offers a “confidential mode”. It is and it isn’t; learn how it works before you use it.
It’s almost impossible to remove all personal information from a Windows installation, short of one extreme option.
Every router has at least two IP addresses. It’s a characteristic of how routers do their jobs.
Because Internet Explorer is really a component of Windows itself, uninstalling and reinstalling, while possible, is somewhat different than other applications and has different implications.
Entering your email address incorrectly might just be a typo, but it can have surprising ramifications.
We hear of Windows Update messing up computers. I’ll look through one scenario and offer some advice and a reminder: it’s not your fault.
Sometimes the clipboard behaves mysteriously. Let’s look at why.
There’s nothing wrong with covering your camera, but it’s probably not worth the effort.
Facebook identifies accounts with an email address, and tries to collect email addresses of friends. That can lead to fake accounts and unwanted invitations.
Email reputation for your home IP address probably doesn’t matter, and having it characterized as “poor” might even be a good thing.
Most email programs can block email from a specific address. Unfortunately, blocking email from a sender is ineffective when it comes to spam.
What Windows Update leaves behind isn’t trash at all, but rather files with a specific purpose.
It’s impossible to know your machine has no malware. What does that mean for your safety?
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
Microsoft Word documents display differently on different systems because of differences between the systems. Getting Microsoft Word documents to display identically typically means processing them into something else.
I can’t always give a straight answer, mostly because every computer is unique. My most common answer? “It depends.”
Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus. Phishing is on the rise, and you need to be aware.
Hibernate and sleep are two optimizations to the boot/reboot process that can speed things up.
Deleting your Facebook account requires some preparation and a fairly well-hidden link. I’ll outline the preparation and point you to the link.
Newer machines often come with multiple partitions. While it’s tempting to remove them, there’s little to be gained.
After all this time, networking computers remains out of the reach of the average user, and that’s really frustrating.
Step one to an operating system upgrade? Create a full system image backup of up your entire machine! Step one to a reinstall? The same.
Losing access to your password vault can be a major inconvenience. Fortunately, that’s all it needs to be, and there are ways to prevent even that.
So-called “problems” with your Microsoft account may refer to Windows, or to other applications on your system.
Every Windows 10 update should just work. Unfortunately, for some, they just don’t.
“Hard Disk Failure Is Imminent” is a message you want to take very seriously — so seriously that hopefully, you’ll have planned for it beforehand.
Windows 10 Home edition gives you little control of Windows Update. I do have a fairly large hammer you can use.
Booting your machine can take time, but sometimes so does shutting it down. Various issues contribute to a slow shutdown.
Nothing protects you and your data like a complete, recent backup, even when it might not be obvious. That’s why I harp on it so much.
Using your computer’s Power button improperly, or pulling the plug, can lead to serious data loss. I’ll look at the right way to turn your computer off.
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.
A peek into my priorities as I install apps and make changes after a Windows 10 reset.
Cookies are a fact of life when browsing the web. But if you look at the cookies stored on your machine, you might be surprised how many there are.
Deciding how you want to open a file depends on knowing what the file contains and knowing what program will understand that.
Interactions between software can cause unexpected side effects. If you’re experiencing a problem, it’s one more thing to look into.
A vulnerability has been discovered in a critical wireless security protocol. I’ll discuss whether you should worry and what steps you should take.
Yes, it’s possible. But you might want to ask a different question that will result in a more helpful answer.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
CCleaner, a popular Windows utility, accidentally included malware in its download for a time. Here’s my take on what to be concerned about and what to do.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
People often cite ransomware as a reason to avoid automated online backups, thinking that those backups will be impacted. OneDrive provides an answer.
A friend’s slow computer provided an opportunity to review the four primary characteristics of computer slowdowns.
We’re often enticed or directed to websites we’ve never been to before. We’ll look at a couple of tools to help identify safe websites.
File History, when properly enabled and configured, can restore deleted files or previous version of files that have changed.