Nothing protects you and your data like a complete, recent backup, even when it might not be obvious. That’s why I harp on it so much.
Using your computer’s Power button improperly, or pulling the plug, can lead to serious data loss. I’ll look at the right way to turn your computer off.
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Online harassment is common problem, and exceptionally prevalent among children. I’ll review some of the issues and steps to be taken.
If you meet a couple of criteria, you can still get Windows 10 for free, at least until the end of the year.
There are good reasons why you’re more likely to be directed to online and self help resources than actually talk to a real person.
A peek into my priorities as I install apps and make changes after a Windows 10 reset.
Cookies are a fact of life when browsing the web. But if you look at the cookies stored on your machine, you might be surprised how many there are.
Another day, another story of data loss. The frustrating thing is that it doesn’t have to happen.
Deciding how you want to open a file depends on knowing what the file contains and knowing what program will understand that.
When you ask someone for help, stack the deck in your favor by painting a clear picture of the problem you’re experiencing.
Interactions between software can cause unexpected side effects. If you’re experiencing a problem, it’s one more thing to look into.
A vulnerability has been discovered in a critical wireless security protocol. I’ll discuss whether you should worry and what steps you should take.
Yes, it’s possible. But you might want to ask a different question that will result in a more helpful answer.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
CCleaner, a popular Windows utility, accidentally included malware in its download for a time. Here’s my take on what to be concerned about and what to do.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
People often cite ransomware as a reason to avoid automated online backups, thinking that those backups will be impacted. OneDrive provides an answer.
Before you dismiss it because it’s a subscription product, take a look and do the math – Microsoft Office 365 might be surprisingly affordable.
A friend’s slow computer provided an opportunity to review the four primary characteristics of computer slowdowns.
We’re often enticed or directed to websites we’ve never been to before. We’ll look at a couple of tools to help identify safe websites.
OneDrive can be used for many things, but one of the most valuable is ongoing, online backup.
File History, when properly enabled and configured, can restore deleted files or previous version of files that have changed.
Copyright is a complex topic, but the practical implications are often simple. I’ll look at availability, copyright, and more.
Letting your anti-malware subscription lapse is never a good idea. I’ll look at why that is, and available alternatives.
You want more than a password, you want encryption. Encrypting an external drive can be done with the right software.
Hacking into someone’s account is often seen as an answer to some problem. In reality, all it does is open a can of worms and put you at risk.
Advertising on the internet is broken. The result is that it might be time to think about adblockers, and supporting your favorite websites in other ways.