Resetting your Windows password is easy – that’s good — if you need access, bad — if you want to protect your PC.
Leo discusses the reasons why anti-malware tools don’t always work.
Leo weighs in on the options for Windows XP users faced with the end of the life of their OS.
Learn how to Log Into Windows 8, Windows 7 and Windows Vista automatically.
Leo questions the conventional wisdom of changing passwords periodically.
Before you consider downgrading from Windows 8 to Windows 7, consider this alternative.
Note from PC Pitstop: We recently asked our TechTalk contributors to recommend a favorite FREE application or tool that they currently use. This post is Leo Notenboom’s response to our request.
Ready or not…video and audio files are automatically playing on sites all over the internet.
How and why technical support works but all too frequently – fails.
How to audit programs running on your Windows PC.
Leo outlines the best way to handle Cryptolocker and other forms of ransomware/malware.
Things you should consider when you hear about a large scale security breach.
What’s a browser cache? How do I clear it? Why would I want to?
Using a single password for all of your online accounts is leaving you vulnerable to hacking.
How to troubleshoot and fix a common problem that can lead to the loss of sound from your speakers.
Leo goes directly to Microsoft to clarify recent comments from a company spokesperson that some think implied “that Microsoft was giving up on Microsoft Security Essentials.
Firewalls are a critical line of defense against ‘internet-initiated connections’ – but other types of malware demand additional protection.
Leo clears up a surprisingly common misconception about wireless internet – it is not just ‘out there’.
Should everyone have access to the information and services available on the internet? Leo says Yes and this is a big problem that needs fixing.
Leo Notenboom offers his thoughts about the end of the Steve Ballmer (the person who brought Leo to MSFT) era.
Far too often agendas on the internet are confused with ‘gospel truth’. Arm yourself with healthy skepticism.
The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back.
Associating an IP address with an actual name and address – might be harder than TV and movies have lead you to believe.
Leo points out a handy free utility that can show you what programs, applications and files are consuming your disk space. PC Matic free diagnostic scan dashboard also reveals this same detail.
Yahoo recently announced they will be releasing email addresses. What does that mean? Could you lose your email address?
When trying to squeeze a few more years out of that old PC…start by combining these great tips with regular computer maintenance.
Stop! Before you take the plunge and install that new app or widget, follow these practical steps to keep your system fast and safe.
The desire to conserve hard drive space is understandable. However, the use of Windows File Compression may not be the right solution for everyone.
Leo’s expert recommendations for security software and techniques to stay safe.
It’s a common topic here on Ask Leo! and for a good reason. Not a day goes by that I don’t see somebody suffering for lack of a backup.
With Window Vista, Windows 7, and Windows 8, the operating system is available in two different “flavors:” 32-bit and 64-bit. I’ll look at why you’ll want one over the other and how to tell which one you already have.
I recently upgraded my primary desktop machine to Windows 8. I did so with some trepidation after hearing many complaints. My reaction: what’s all the fuss about?
So you gave your neighbors your network key – what can they see?
Traces of malware could be left in various places on a computer after a virus or spyware infection. First thing: don’t panic!
Stop forwarding those dumb emails,,,they’re mostly bogus and known as urban legends.
When I visit a web site, are they able to identify my IP address? If so, how can I block them from being able to identify me?
Leo looks at the possibility that ransomware can infect other drives connected to your computer and hold you at ransom.
You may still be getting viruses even though you run Norton because of your own computer habits. There are a few steps to take to increase security.
Since most encryption tools are designed to encrypt collections of files, it isn’t always obvious what the best approach might be to encrypt just one. I’ll look at a couple of alternatives.
Malware has come a long, long way since its origination as a benign joke or proof-of-concept.
Does an email really get deleted? Whether you pull an email off of a server or log on to a service provider, don’t they backup their servers daily or hourly and wouldn’t that email still exist on the backup servers forever?
A Windows login password can be a minor inconvenience that can be disabled. Unfortunately, not having a Windows password does increase risk, even if you think there’s nothing of importance on your machine.
Windows 8 has been released and I’m getting the question at a slowly increasing pace: should I get it? I’ll detail my current thinking on Windows 8 and whether or not its worth upgrading.
Online video is becoming more and more popular, but it often assumes you have a fast connection. If you don’t, video playback can be affected.
A PC running Windows can slow down for many reasons. Viruses, spyware, updated software, disk fragmentation, and more can lead to performance drops.
Most music, picture, and movie files are already compressed. The result is that compressing them again won’t make much difference and could even make them larger.
Many people are receiving spam that looks like it comes from someone they know, but with the wrong email address for that person. I’ll take a look at what’s going on, and what you need to pay attention to.
If I were in your shoes, I would open the box, take out the hard drive, and put it in an external USB enclosure.
Recent vulnerabilities and exploits relating to Java have people scrambling to turn it off. Unfortunately, because of another unfortunate choice of names, many are turning off the wrong thing.
With security compromises happening at what seems a regular pace, many people are wondering if they should be using ‘the Cloud’ at all.