Webinar #7 â Your Questions â was Sunday, December 11th, 2011
]]>
Agenda
This month we tried something different.
I spent the entire hour taking and answering questions in real time.
It is âAsk Leo!â after all.
Video
Transcript
Welcome to the December webinar! I hope everybody is having a good day! Todayâs agenda is âno agendaâ; Iâm just going to basically take questions and âwing itâ and hopefully answer them and hopefully this wonât turn into a game of âstump Leoâ.
I want to, Iâm going to start by reviewing one article that I posted last week because I got a little bit more information on it that looks kind of interesting. So if you have technical questions, I hope youâve brought some; go ahead and type them into the question box and I will take them, hopefully, in order, but hopefully in some kind of way that makes sense.
What I wanted to start with is a question that I answered about a week and a half ago where somebody was looking at Google and seeing this black bar across the top. They were calling it a toolbar. In a sense, it is a toolbar but itâs not a toolbar in the sense that itâs a browser add-on. Itâs actually just something thatâs on Googleâs websites. Itâs across most of their websites if Iâm not mistaken. What I came across -they were also actually asking about what didnât show up for me today was this blue advertisement for Google+. But basically this is what they were seeing and it was taking up real estate and they were concerned that ⊠they wanted to get rid of it, basically. They only way that I knew of to get rid of the blue bar was to go ahead and sign in but apparently Google has, perhaps, heard enough complaints on it that theyâve removed it on their own.
They are apparently also going to be changing this black bar. If you go out to the âofficialâ Google blog which is at googlgblog.blogspot.com, one of the items that they posted about, gosh, late last month before I even posted my article was talking about what they are calling introducing the new Google bar. Iâm not going to play the video for you but what it boils down to is they are taking away the black bar; many people are already seeing this, theyâre taking away the black bar and replacing it with a dropdown on the logo so you will maybe hover over or click on the Google logo and you will get the same items that are currently being displayed in the black toolbar. The problem as I see it if I understand the video properly, is that they are replacing the narrow black bar with perhaps something that is perhaps more visually appealing but is also permanent across all sites and slightly larger. So it will be interesting to see what peopleâs reactions to that are when it comes out. As I understand it, it is rolling out as we speak but obviously it hasnât rolled out to me yet.
So, with that as kind of a bit of a âkick-offâ letâs go ahead and if youâve got questions, please start typing them in and I will have a whack at them.
So, letâs see, âIf you make a Windows recovery CD after youâve used your computer for a year, what will be the result? Will you get a CD that will bring you back to your original setup, or a copy of your machine like it is now?â
My belief (as you know, Iâm not a big believer in Windows Recovery CDs; I much prefer true, system backups) my belief is itâs somewhere between the two extremes that you live. I believe the recovery CD will include system updates, patches and so forth that youâve taken since, over that year but it will not, for example, include all of your installed applications or anything like that. Thatâs not necessarily what a recovery CD is intended to be. A recovery CD, and again, this is one of those things that varies from manufacturer to manufacturer, a recovery CD will sometimes simply reinstall the operating system thatâs on a hidden partition on your disc; it installs a fresh image perhaps from the CD itself but I believe if you make a recovery CD from Windows specifically, it will actually include the latest versions of the various pieces of Windows itself but only those pieces of Windows itself.
âI have a difficult time using Ultrasurf; whenever itâs on I canât surf webpages. What should I do? Should I use another program?â Well ⊠to start with, Iâm going to find out what Ultrasurf is because in all honesty, I have no idea. UltrasurfâŠIâm assuming that this is the Ultrasurf that you are referring to. It appears to be an anonymizer of some sort. So you canât surf webpages? Well it seems like the intent of this is that you in fact can in surf webpages â thatâs the intent. Obviously itâs not working for you. What I would suggest you do is have a look at their support site. Make sure that you include the actual error messages that you are seeing. In other words, what happens when you try. Certainly I would double-check the configuration of the application to make sure that you set it up according to their instructions. Typically, anonymization tools like this, anonymous proxies, either require that you make some specific configuration options in your browser or they install an application that more or less does that for you.
Alternatives are Anonymizer; it is a relatively well-known one. I actually donât have another one off the top of my head; the ultimate in anonymization is called the Onion Router, the Tor Project, what that does is that uses a fair amount of encryption and routing to bounce your requests through some number of Tor routers. Each step along the way is individually and separately encrypted. Thatâs one of the reasons they call it an âonionâ because your packet of data is encrypted each step of the way so if you were running it through say, 4 Tor proxies, then it would have 4 layers of encryption on it and nobody in the middle could stand a chance of decrypting the data. The downside of Tor is that it does slow down your internet browsing experience but it is as far as I understand, itâs kind of like the gold standard if there is such a thing when it comes to trying to stay anonymous in your browsing and as you can see itâs open source and it runs on just about every platform you can think of. Question: âAny other options. I donât want my PC to slow down to a great degree.â Unfortunately, the very nature of most anonymization services almost requires that the PC slow down. And itâs not necessarily the PC itself that is slowing down, understand, itâs not your computer thatâs the bottleneck here. When you end up sending your data through a proxy, thatâs an extra step and then the quality of the proxy, the speed of the proxy itself, and in the case of Tor, the number of hops you elect to use because you can configure your Tor to use anywhere from 1 to any number of hops to route your data around around the planet before it actually gets to a destination. The more hops that you include, the slower itâs going to be. So with Tor, the minimum number of hops with the other services; I mean thereâs going to be some impact, there just is. Thatâs kind of the way things just work.
âThis question might not be your area of expertise but what would you recommend a small business use to provide FTP to clients? Each client should be able to have their own separate area that is protected from being viewed by other clients.â If I were to set something like that up, I would actually go to either a shared hosting site like bluehost or dreamhost or where I host AskLeo! is on stormondemand where you actually end up on a virtual dedicated server. The reason Iâm pointing those out is because the default installation you get of a website supports FTP and that FTP support can be configured on a per account basis. You would have to manage the individual accounts that would be given access to the FTP but thatâs the approach that I would take any rate. Typically, especially for businesses and certainly for homes, if you are trying to run an FTP site from your own home, or out of your home business is typically a lot more trouble than its worth and with hosting being relatively inexpensive these days, I mean you can get a dreamhost account for like 7 bucks a month or something like that. That would potentially be a fairly quick and easy way to set something up. Youâll have to become FTP literate and understand what it means to configure FTP accounts and just set up a minimal website but that would be the direction Iâd head off, for sure.
âUsing XP Professional Service Pack 3 I must have inadvertently changed something. My Del key now has a period after each delete and I canât find how to stop this. Can you help?â Probably not; not directly anyway. It actually surprises me the number of times questions like this comes up. My gut reaction, my very first reaction whenever you start getting two keystrokes per key, is to try a different keyboard. Chances are you have a hardware problem of some sort in the keyboard itself. Hopefully weâre not talking about a laptop here but even then you can still test it by getting an external USB keyboard and plugging it in and seeing if you end up with the same symptom. Iâm betting 90-95% chance that you wonât; the external keyboard will work just fine. If it does replicate the problem then you know that you have some sort of software problem at that point. Iâd probably start looking at installed applications that are trying to do things with the keyboard; maybe you have a keyboard macro software installed of some sort that you werenât aware of. Iâd start looking at what was there. Itâs worth, I suppose, playing with the drivers but keyboard drives these days are so very simple; itâs something to do but itâs not a very high probability that itâs going to solve the problem. The other option that I would recommend is that if this is a wireless keyboard then make sure that the transmitter, the keyboard itself is as close as possible to the receiver; that thereâs not a lot of electrical interference physically in the line of sight and finally that the battery in the keyboard itself is fully charged because sometimes that can cause spurious keystrokes although more often than not it ends up causing a complete lack of keystrokes.
Newsletter: âI love your newsletter (thank you) the one thing I find annoying is that my email program, Thunderbird, always adds a warning to your email saying this message may be a scam. When I click on âIgnore Warningâ then I can access all the links to the AskLeo! Website. If I donât click on the âIgnore Warningâ button it asks me to confirm my action every time I click on the link which is annoying. Is there any way you can configure your email so Thunderbird knows they are genuine, and not a scam? Or how I can configure Thunderbird to know your emails are legit? Ok. I run Thunderbird and I donât see this because Iâve configured it not to tell me. What Thunderbird is doing is (letâs see if I can come up with a good example of this because itâs actually an interesting one for us to talk about). Letâs go to the latest newsletter. So somewhere here I probably have ⊠hereâs a good example, this sponsor link. This is the web archive of the most recent newsletter. In the actual emailed version of the newsletter, what Iâm about to describe actually applies to every link in the newsletter but because this is a web archive, the same thing isnât happening. So if I hover over the Kindle Fire link here, you can see down in the lower left corner of the browser the actual link that it goes to is go. ask.leo.com/kindlefire; in other words it says Kindle Fire but itâs going to something that is labeled AskLeo!. If there are any links that actually look like http links (I donât see any here) the same problem can occur. What Thunderbird is doing is itâs taking a look at the links on that page and saying âDoes what this page is going to match what it says itâs going to?â And if itâs not, it calls that a scam. Itâs an interesting thing to look at in Thunderbird but the problem is that while scammers do in fact use this, they also, this technique is also very valuable for other reasons. Obviously, when you click on Kindle Fire, you are not expecting to land on an AskLeo! page and in fact, you donât. This happens to be a redirection that takes you to the Amazon page. This kind of redirection is very, very common in email newsletters, on websites and so forth because what it allows me to do is it allows me to figure out how many people bothered to click on that link. It tells me in the case of an advertisement how effective that ad is; in the case of all these other items it tells me which articles most people are interested in; if people are ignoring an article completely, I know that itâs not probably a topic I want to talk more about but if I get a lot of click-throughs on an article then I know thatâs something of interest.
So Thunderbird is doing its best to protect you but unfortunately the collateral damage is email newsletters. And yes, I do use my own âsearchâ a lot. Letâs see ⊠so ⊠âWhy does my email program think that this message might be a scam?â I actually wrote an article about this some time ago that describes exactly what is happening. This is the message that you are seeing; that the person who is asking the question is seeing and in this particular case here is a very firm example of where the link says itâs going to Microsoft.com but in fact if you take a look at the destination down in the lower left-hand corner youâll see that itâs not going to Microsoft.com at all; itâs like the classic definition of a scam link. In this particular case, itâs benign but the other case is the case where somebody says âHey, hereâs a link to Paypalâ but itâs not. So thatâs what Thunderbird is trying to protect you from.
When I use the newsletter, like I said, all of the links in the newsletter get changed to be these kind of âclick countingâ redirections so that I can see what parts of my newsletter are effective and understand what people are truly interested in. Now to go back to Thunderbird, unfortunately, I had hoped that Thunderbird would allow me to turn this off on a âper senderâ basis but they do not. Itâs an âall or nothingâ kind of a thing. So if you go into the Tools, Options, Privacy, the Email Scams tab, you can turn this option off completely so that Thunderbird doesnât check emails for this kind of scam. As I said itâs very common; youâve probably seen it in other legitimate emails as well. I will leave to you as to whether this is something you want to turn on or off. The risk of turning it off of course is that you inadvertently click on a scam link and didnât realize that it was one because nobody told you. The upside of turning it off of course is that you donât have to deal with it in legitimate emails; you donât have to worry about emails from me or from other senders who are using this technique that is obviously being confused with a scam. So, Iâll leave it up to you; itâs a matter of how confident you are in your own ability to identify potentially scam links in email. As you might imagine, I have mine turned off completely. Itâs just not, to me itâs not worth the annoyance of having that thing pop up all of the time.
âI know youâre not a fan of Outlook Expressâ. Well, I wouldnât say that; Outlook Express got a lot of people on to email. It has some serious problems and itâs not being supported anymore so Iâm certainly not a fan of continuing to use Outlook Express but Outlook Express is one of those programs that I think made a significant dent on the internet. âIs there a way of recovering a forgotten password. I am using Yahoo.com and Windows 7. It will not let me reload Outlook Express. The message I get is that the software is no longer supported.â That is correct; Outlook Express is not available in Windows 7. âWhere is Windows Mail or Outlook Express in Windows 7?â So this is the article that discusses the fundamental problem that you are seeing. Outlook Express has been removed from both Windows Vista and Windows 7. In Windows Vista, there was an email program called Windows Mail that was made available instead. In Windows 7 there is no email program made available. The assumption is that youâll either bring your own or youâll download the Windows Live Mail which is the ânowâ replacement for Outlook Express. Outlook Express itself will not run in Windows 7; the only approach close to getting it to even close to run in Windows 7 is to run a virtual machine to run Windows XP within Windows 7 or to get XP mode. If you have Windows 7 Pro or better, you can download something called âXP modeâ which is nothing more than a pre-configured virtual machine that allows you to run Windows XP inside of a window in Windows 7. Thereâs an article about that too if you actually wan to consider going down that route. Recovering your password â so recovering a forgotten password â I wouldnât relate that to Outlook Express. If you are using Yahoo.com for your email services, itâs Yahoo.com where you want to go to get your forgotten password. Typically if you try to go to login to your webmail and follow the âI forgot my passwordâ links and/or instructions that follow, thatâs the way to get the password back. The password â if youâve still got your Outlook Express machine running, your Windows XP machine that used to runâŠif youâve got your Windows XP machine around that used to run Outlook Express and itâs still available, it is possible (letâs see if I can remember the URL for this) nirsoft.net has some really interesting tools and it is possible toâŠright, they have something called MailPassView, this recovers the passwords of a bunch of different email programs including, it appear, Outlook Express. So what you would do on the machine that is currently running Outlook Express, you should be able to run MailPassView and it will probably display the password for you. So two things here: one, nirsoft is totally legit; Iâve used lots of tools from them before. Make sure you are getting them from nirsoft.net and not some other kind of shady download site. Let me make sure this actually goes to a legitimate page â thereâs the description, thereâs the system requirements, whereâs the download link? So there it is down at the bottom and those are both coming form nirsoft.net itself. Make sure youâre getting it from that location. As I said they are totally legitimate. They actually have lots of nifty tools for password recovery and such. Iâve got a couple of articles that talk about how you can recover passwords if youâve forgotten them but had Windows Internet Explorer remember them for you tools here can usually pick that up as well. So, lesson one, nirsoft is legit; these tools are legit and safe. Lesson two is, oh my gosh, anybody who can walk up to your computer and can grab a tool like this and see your password. And you saw on this list that it was a lot more than just Outlook Express; it was Outlook, and I didnât notice if Thunderbird was on the list but it wouldnât surprise me. This is a case where I want to reinforce to everybody who is not currently having a problem who understands and they remember their password and are not trying to recover it thatâs something Iâve said for a long time: if itâs not physically secure, itâs not secure. If somebody can walk up to your computer, they can have this utility on a thumb drive and stick it in, run it and find out your password. Itâs actually worse than that when it comes to physical security but Iâll leave that as a word of warning; call it frightening enough for the moment. A lot of people donât realize just how easy some of these kinds of recoveries are. So that is one way to potentially get your Outlook Express password back. Otherwise, Iâm sorry, your Yahoo password back from having Outlookâs remembered password to be recovered for you. The other approach is to go to Yahoo.com and use the âI forgot my passwordâ approach. Letâs see, Mark reminds me that the nirsoft utilities are great but you might get a warning from your anti-virus program. That happens from time-to-time but like I said, as long as youâre certain that youâre getting it from, directly from nirsoft.net. Then you can be assured that what youâre getting is not a virus; it is a tool that can be used legitimately to do some interesting things on your system. There are a lot of nifty tools here.
âHow can I use Facebook safely.â Boy, thereâs a great question. Thatâs something that Iâve actually considered spending a lot more time on in the form of articles. The problem that I have in doing that is that about the time I decide hereâs how to use Facebook safely, Facebook goes in and changes all of their privacy settings and everything that I would have recommended has gone by the wayside and no longer applies. So, Iâm not going to give a detailed response to this one because it is way more complex than just a simple answer can give you. I will say a couple of things: one, definitely spend some time looking at Facebookâs privacy options. Letâs see; letâs go have a look at my Facebook account. I donât think thereâs anything scary here. So hereâs Facebook. Where you want to be spending some time is over here at the Privacy Settings. You really want to be careful about how things get shared. It is very easy for things to be shared more publicly than you think. In other words, the biggest mistake that people make is thinking that sharing only with Friends keeps things private. It does not. Friends, in turn, can reshare what you have shared and they can then share it publicly. That is one of the ways that mistakes happen. So without getting into all of the specific settings because thereâs a bunch as you can see. How you connect and all of a sudden and youâve got a long list of what people can see and who can do what ; whether you can be tagged or your are blocked. Thereâs a bunch of stuff there; spend a few minutes with that and go through those things and make sure you understand them and that they are not more permissive than you would want them to be. I will say, and I have to quote, and Iâll actually have to mangle the quote because it wasnât âPGâ when he said it , my friend and tech pundit Chris Perillo posted some time ago, âIf thereâs stuff you donât want people to see, donât post it online.â Itâs actually very simple. It is simply much too easy for information posted online to be shared with or make it outside the circle you think youâve shared it with. The safest thing to do is of course â donât. The other piece of advice I will give you in respect to Facebook is to avoid apps â avoid them. Everytime an app comes up it asks me for permission to post on my wall or to see my friends or do any of those kinds of things I almost immediately turn them off because I just donât have the time to vet every single app thatâs out there. And each one is a potential place for leakage, data leakage or inadvertently having things happen that you donât want to have happen. I actually follow a couple of interesting folks. Malwarebytes has a page and I recommend them. Let me go over to the AskLeo! page because I would recommend also Hoax-Slayer and Sophos. Both of those as being pages you want to favorite or âLikeâ, excuse me, or visit from time-to-time. The reason I point those out specifically is because those two, among others Iâm sure, do a very good job of giving up-to-date information about the latest hoaxes and there are a ton of hoaxes on Facebook. If you donât choose to follow these, then by all means remember the old adage âIf itâs too good to be true, then itâs probably not true.â But there just a bunch of hoaxes running around all the time typically the hoax turns out to be fake they promise something they donât deliver but along the way they try to gather information about you; they try and get you to fill out some surveys they try to do all sorts of random stuff thatâs not worth it. If you want to, I would recommend going over to those two pages and liking them. âItâs not about being seen, itâs about being tracked.â It depends about your level of paranoia. Just using Facebook allows Facebook to see know what youâre doing; thereâs no way around that. The websites that you use, you are exposing to them your information, your posts, everything you do with them. If you donât want Facebook to track you; if you donât want Facebook to have access to that information, donât use Facebook. When it goes beyond Facebook, that basically, I reiterate my recommendation to avoid giving apps more permission than you are really comfortable giving to those apps. I donât want Farmville, or Mafia Wars, I donât want them to be able to paste on my wall â I just donât. I donât want to clutter people who are following me, I donât want them to have to see this stuff thatâs coming along because I happen to do something in an application. So thatâs the kind of stuff that I typically recommend that people avoid. âIs the same applied to Twitter?â Yes and no. With Twitter you donât have quite the same amount of app integration so youâre not like giving a bunch of information to third parties but on the other hand, everything you post on Twitter is public â period. You have, with the exception of direct messages, which are available only between people who have followed each other, I believe, with the exception of that, everything you post on Twitter is completely public and you will find that it shows up in Google search results from time-to-time which is also kind of scary. So that brings us back to the original adage I just quoted from Chris Perillo that basically said if you donât want people to see what you are doing, donât post it online.
âSomeone tried to get my IP address using file transfer via MSN Live Messenger, but blocked out by Norton 360. Did he establish direct connection successfully and manage to get my IP address in this way?â So, IP address tracing is one of those questions that I get over, over, over and over again. Let me answer those questions backwards. Did he manage to get your IP address? Probably. Since I donât know specifically how Yahoo in this particular case, MSN Messenger, since I donât know how they specifically architect their protocol to establish a direct connection I canât say for sure that he did or did not but I would assume that he did. Thatâs the safest assumption because itâs the one that has you the most concerned. Did he establish a direct connection successfully? Probably not. It sounds like Norton did the right thing and blocked that connection. So what that boils down to is that the individual at the other end of that connection doesnât have a direct connection to your machine but may very well have your IP address to which I say âso whatâ. I mean the IP address, whatever; it doesnât give people access to your machine or to your location or anything that people seem to get pretty worked up about. IP address, yes it identifies a specific machine connected to the internet. The location of the machine is actually only known to the ISP and itâs not something that the ISP will simply just tell you. You need to go to the ISP and tell them and ask them, âweâve got this IP address, and weâve been able to trace it so that we know you own this IP address; itâs one of your customers, please tell us where this customer is and the ISP is going to say âno, not without a warrantâ. Thatâs where things can happen. When you see things on the police drama shows, 9 times out of 10; a) they never happen as fast as they do on TV but they come in with a warrant. They actually have the legal authority to request that the ISP turn over that information. Now, granted, thatâs United States, U.S. centric answer there; the laws about how the information can or cannot be handed over will vary depending on what country you happen to be in but in the United States at least, it requires a court order. Now if they have your IP address can they get access to your machine? Well, no, at least not unless you are being very lax with your own security. As long as youâre behind a router, itâs the router they have the IP address of, not your computer and the router is going to protect you from unwarranted or unexpected connection or attempts to connect to your computer. So as long your behind a router, they can have your IP address; itâs just no big deal. It will let them identify what country youâre in; it will let them identify what ISP you use and in some cases it may get as close as your city. But my IP address depending on how you look it up will tell you either that it exists in Woodinville, which it does so youâve got many square miles of and thousands and thousands of square miles if youâre trying to find me. Or, some will tell you that itâs in Seattle which is 10 miles away. Some will tell you that itâs in Portland which is 200 miles away and Iâve had at least one that said I was in California which just blew me away. So IP tracing is just not that big a deal; itâs not the kind of thing I worry about and it sounds like your firewall and Norton 360 did the right thing by blocking the attempt to connect directly.
âI can connect to the internet through Win7 but not via Win XP machine. How can I get online using Win XP machine? I use 3G Surf, a kind of wireless connection.â Iâd have to understand more about 3G Surf. Itâs not something that sounds familiar. Letâs see if itâs quite literally is this. Youâll have to tell me if this is the correct service. It appears you are using a dongle of some sort that is the wireless receiver for that type of connection. I would actually, I will make some guesses but the right answer I believe is right up here, the support link for the service that you are using. My guess is that you need one of these dongles for each of your machines which means you probably need to sign up for both; sign up for two accounts. Or if youâre switching the dongle back and forth between machines, then itâs very possible that itâs simply a matter of drivers required for the Windows XP machine. This is one of those cases that Iâm also starting to wonder if Windows XP support is starting to fall off peopleâs radar, manufacturersâ radar. Windows XP, I mean itâs still like over 50% of the computers on the internet are in fact Windows XP. So itâs still out there but the problem is that manufacturers are moving forward and to the degree that itâs causing them a problem continuing to support XP it may be one of those choices that they decide to make not to do. In a case like that, youâre kinda sorta out of luck. Itâs kind of one of those things where they need to explicitly support Windows XP for that thing to work. So, like I said, I really do think that the right answer in a case like this is to go to their support. Hopefully, it looks like they have a community as well. My assumption is that is a technical support forum for peer-to-peer support where you will find other people using the product asking questions and presumably getting answers. In general, I really find those kind of community based solutions to be very, very helpful in many cases. It will actually let you do two things: as you may stumble into a community and notice that there are lots of questions, thereâs lots of problems, there are no answers and no support; nobody from the company is actually paying much attention to it. That tells you something about that particular product or company. On the flip side, if you go to a support forum like that, and see people asking questions but answering each otherâs questions and being successful about getting people the help that they are looking for, thatâs really good; thatâs a sign of a healthy user community. Itâs even better when you see representatives of the company participating in these kind of online forums because that tells you that youâve got a company that cares about its community and cares about giving quality support. As a complete side note, thatâs one of the reasons that I ended up deciding to use Macrium Reflect on the recent backup series because their community, their support forum was very well populated, very well answered, and the people from the company were doing a lot of the answering. So thatâs about all I can point you at right now.
Somebody asked me about hard drive prices and why theyâve gone up so dramatically in the last couple of months. He apparently went to Best Buy and found the $49 drive he bought a few years ago is now over 100 bucks. He guessed that it had something to do with the precious metals that are used on the inside, the gold and the platinum that are used as part of the circuitry and media. In fact, itâs not. While precious metal is definitely still precious, the reason youâre seeing a lot of hard drive prices go up and go up fairly dramatically is that a couple of months ago, Thailand had some fairly significant flooding in their industrial district. And many hard drive manufacturers were severely impacted by all of this water coming through their manufacturing facilities. So thereâs been a classic case of market supply and demand the supply has gone down although the demand continues to increase. When that happens the prices have gone up. Now my understanding is that the global manufacturers of hard drives are in the process of rebuilding, retooling and in one or two cases they might be in the process of relocating, Iâm not sure, but I believe for the most part they are in the process of rebuilding and getting their manufacturing facilities up and running again. So the expectation is that somethime within the next 6 to 18 months I guess? Just to pull a number out of the air. We should see hard drive prices start to come down but right now if youâre looking to buy a hard drive itâs very likely youâll end up paying significantly more than perhaps you did just a year ago.
âHow long do companies like Earthlink keep track of the websites youâve been on, or is there a certain amount of time before they get rid of that data to make way for new data or do they just keep it all?â You know, thereâs actually no way to answer this. There is, two things, one, there is certainly no standard; thereâs no accepted common practice that says, we, the random ISP, we all keep data for this long and then we do âxâ with it. In reality, the answer varies dramatically from ISP to ISP and from web service to web service. And by that I mean, sites like, letâs say AskLeo!. Thereâs a log that shows what pages were accessed and by what IP address. I keep that as long as itâs convenient which will vary depending on how much hard disk space I have on my server and potentially just how Iâm feeling that day. Itâs also changed when Iâve moved servers because the base software thatâs installed automatically cleans up the logs and purges things on a schedule that to be honest, I couldnât tell you what it is. Some websites keep them for years; some donât keep any at all others keep them for a day. There is legislation afoot at the national level in the United States to require ISPs and service providers to keep data for a specific amount of time; I believe that amount of time is two years. But, as you might imagine is fairly controversial legislation and it may not pass or it may not pass without some major modifications. So the short answer is âI donât know; nobody does.â Companies donât make that information public but if you are concerned about whatâs being kept then you might want toâŠthese are actually some the answers that started this webinar like talking about things like anonymization and the like.
Post-Webinar
If you missed the webinar, keep coming back to this very page. The agenda items that I covered above will eventually become links to articles that contain the recorded video segments from the webinar. More on that here: How do I view your past webinars?
If you have technical questions, please ask them here on the ask-a-question page.
If you have general comments about the webinar, ideas for future topics or thoughts about what would work better, please visit http://ask-leo.com/feedback and drop me you thoughts there. I canât promise to respond to them all, but I definitely read them all.
Future Webinars
Rather than hide them somewhere, here are some ideas that have been suggested for future webinars or things that might make the cut if we have enough time:
-
Google Reader and RSS RSS is not well understood, but itâs a powerful tool to manage information flow.
-
Social Media: Twitter, Facebook, Google+ â What are they, how do they work, and do you care?
-
Do you need a swap file? â It depends. Iâll review what it depends on.
-
Using search effectively â Many people donât. Itâs a skill that makes using the internet a heck of a lot more enjoyable.
-
Enlarging a photo received in email â How to do it when itâs possible and why it usually isnât.
-
Document organization â My Documents, but then what? Using folders, naming conventions, and other techniques to keep track of whatâs on your computer can be simple.
-
Setting a default mail program â How to change what happens when you click an email link or click âSend Toâ.
-
Master of your own domain â Domain purchase, website hosting, and setting up your own email address.
Feel free to suggest more!