Windows XP, at the time of this writing, has a large install base, but no one has stepped up to support this market as it is getting smaller. Should you keep using it?
171 total views, 1 views today
Windows XP, at the time of this writing, has a large install base, but no one has stepped up to support this market as it is getting smaller. Should you keep using it?
171 total views, 1 views today
A slash through the padlock, the https, or the https appearing in red all mean one thing: something’s wrong. Exactly what’s wrong can vary.
2,200 total views, 1 views today
Kindle is much more than a physical reader. Amazon has made Kindle reading applications available for FREE on most popular platforms.
251 total views, 1 views today
When a major malware infection was discovered last year, a temporary solution was created on the internet. On July 9th, 2012, it’s scheduled to go away.
129 total views, 1 views today
What looks like overwriting a file’s data often is not. I’ll look at how files are updated and what that implies for their recoverability.
151 total views, 1 views today
Google’s new privacy policy pulls together their existing policies into one place. There’s nothing really new; they already have a lot of data on you.
130 total views, no views today
When megaupload.com was taken offline, many users’ files were rendered inaccessible. If a service provider goes away, it’s clear that you can lose your data.
139 total views, no views today
Windows has what’s called a ‘lifecycle’ – a series of stages beginning with release. I’ll review what happens as a version of Windows nears end-of-life.
181 total views, 3 views today
If you run a website and have someone administering it for you, they may have much more power than you realize. With great power … comes great risk.
106 total views, no views today
The SSID identifies your wireless access point to any computers in range. Having a unique one is helpful, but hiding it is only marginally more secure.
554 total views, no views today
Everyone wants a faster internet connection. I’m frequently asked if it’s possible to combine two or more connections for speed. The answer is yes … but.
161 total views, 1 views today
If you have a 64-bit capable machine, you may want to upgrade from 32-bit Windows to 64. Unfortunately, the upgrade, while quite possible, isn’t easy.
230 total views, no views today
System Restore is a pretty nifty feature in concept. In practice, I see it have too many problems to feel comfortable relying on it.
189 total views, no views today
Windows Explorer is the workhorse behind the Windows user interface. In many ways it *is* Windows. I’ll cover what to look for when it crashes.
108 total views, 1 views today
The 10 most popular questions for 2011 as measured by visits to Ask Leo! This year’s top issue? Email account theft.
190 total views, 1 views today
If you’re finding unrecognized and adult entries in Hotmail’s auto-complete, there’s a good chance that you have Messenger invitations that you don’t know about.
89 total views, no views today
Internet Explorer add-ons are a common cause of problems that are incorrectly blamed on IE itself. I’ll show you how to disable IE add-ons.
123 total views, 1 views today
In a desperate move to resolve account access issues, people are frequently trusting people they shouldn’t and providing too much private information.
105 total views, no views today
It’s not uncommon to use a web browser other than Internet Explorer. What you may not realize is that you’re still using IE for other things.
227 total views, 1 views today
Once your machine is infected, system backups are likely to include the infection as well. I’ll look at what steps to take when that happens.
105 total views, no views today
Recovering from a bad virus infection isn’t always easy, but there are some things to try before drastic measures need to be taken.
108 total views, no views today
With email account hacking on the rise, it’s important to understand what it takes to keep your account and its address book safe from compromise.
158 total views, no views today
By forwarding email that includes previously-forwarded email addresses, you’re exposing all of those people to a couple of risks and annoyances.
130 total views, no views today
Using a different password for every login is an important part of overall security and doesn’t have to be difficult.
167 total views, no views today
Not all bugs will be fixed – or fixed quickly. Not all bugs are even actually bugs. I’ll look at why some bugs might never get fixed.
330 total views, no views today
It sounds counter-intuitive, but keeping an unencrypted copy of encrypted data not only makes sense, but it can protect it from certain types of loss.
89 total views, no views today
Deleted files might be easily recovered unless you take additional steps to ensure that they’re not. I’ll look at why and what to do.
219 total views, no views today
Many free software installs include offers of additional optional software packages. If done deceptively, you could end up with software that you don’t want.
178 total views, no views today
We often hear that we need to protect ourselves from data sniffing, particularly at open WiFi hotspots. I’ll look at what and how easy sniffing is.
86 total views, no views today
While you cannot find the specific owner of an IP address, I’ll look at a few tools to see what IP-related information you can get.
254 total views, no views today