👍 #836 - My Email Is Hacked, How Do I Fix It? - 7 Things You Need to Do NOW!
View Online: https://newsletter.askleo.com/current-newsletter/
Newsletter FAQ & administration
A (Slightly) New Look
You may notice a slightly new look to Confident Computing.
Besides looking (in my opinion) slightly more professional, it should also now look better on mobile devices, and a wide variety of screen sizes.
As always, I don't set a font size and I don't set color. The defaults in most email programs are a reasonable sized black on white. If you're seeing something else, look to the settings in whatever program you use to read email. (Sorry to have to say this, but I get complaints from time to time, and it's typically not something in my control.)
I may have a few more more minor tweaks coming in upcoming weeks.
This week's articles & videos
One day you wake up to find your email account has been hacked.
What do you do next?
This week's featured article walks through the steps you need to take ASAP to attempt to recover your account, minimize the damage, and prevent it from happening again. My Email Is Hacked, How Do I Fix It? - 7 Things You Need to Do NOW!
Also this week:
- Copy-protected website? Don't count on it. (Mostly a warning for webmasters: if it can be seen, it can be copied.)
- You should have a recovery email address for your online accounts, but where?
- CPU maxed out? How to find the culprit.
Gary's new Mac with the new M1 processor is fast. We acknowledge SpaceX (and baby Yoda)'s trip to the space station. Would you get your prescriptions from Amazon? Bill Gates' new podcast. Boy's State. MacOS Big Sur, the importance of different passwords, and more. TEH 118: Zippy new Mac, SpaceX launches with Baby Yoda, Pharmacy takeovers, after Covid and young politics.
Be the person who's kind first, this week, OK? Stay well...
This Week's Featured Article
If your email is hacked, there are several steps you need to take to fix it and prevent it from being hacked again.
Also This Week on Ask Leo!
How Do I Copy Text from a Copy Protected Website?Assuming your intent is legal or at least moral, it's not hard to copy content from a webpage that attempts to prevent it.
What Recovery Email Address Should I Use?Your recovery email address is easy to overlook and forget, but it can be critical to regaining access to a compromised account. Here's what you need to do.
How Do I Find Out What Program Is Using All My CPU?Occasionally, one program uses all of your computer's processing resources. Using Task Manager, it's easy to figure out which program that is.
What Good Is an Image If I Can't Restore an Old Backup to a New Computer?Image backups are excellent protection against data loss, but restoring an old backup to new computer isn't why you do them.
Ask Leo! on YouTube
Subscribe to Ask Leo! on YouTube to get the latest on YouTube.com. Your subscription (and "Likes") help others find Ask Leo!, and the the answers they're looking for.
What Good is an Image if I Can't Restore an Old Backup to a New Computer?Image backups are excellent protection against data loss, but restoring an old backup to new computer isn't why you do them.
How Do I Find Out What Program Is Using All CPU? Using Task Manager to Track Down CPU HogsOccasionally, one program uses all of your computer's processing resources - the CPU. Using Task Manager, it's easy to figure out which program that is.
What Recovery Email Address Should I Use? Why Your Choice MattersYour recovery email address is easy to overlook and forget, but it can be critical to regaining access to a compromised account. Here's what you need to do.
Tip of the Day: Change Your Router Password #shortIf I could have you do one and only one thing to your home network to improve security, changing your router's default administration password would be it.
Email Hacked? Seven Things You Need to Do As Soon As You Realize Your Email has Been HackedIf your email is hacked there are several steps you need to take to fix it, and prevent it from being hacked again.
How Do I Copy Copy Protected Website Text? Why Copy Protection is FutileThere are several techniques to copy protected website text. Content creators need to realize that at a very basic level, if it can be seen, it can be copied.
Support Ask Leo!
Here are examples of tips published this week:
- Tip of the Day: Change Your Browser's Home Page
- Tip of the Day: Add Your Own Auto-Start Programs
- Tip of the Day: Don't Overdo Security Software
- Tip of the Day: "Start Up Boost" May Slow You Down
- Tip of the Day: "Software Program" is Redundant
- Tip of the Day: Copy as Path
Support Ask Leo! and become a patron for these and other exclusive benefits and discounts!
Share Confident Computing!
Share the confidence: forward this (without your unsubscribe link at the bottom) to your friends! They'll thank you! (And so will I!)
Did someone forward this to you?
to get your own copy each week. It's FREE!
Social & more!✓ Discord
Not All News Is Bad - Each day I look for one story in the current news of the day with a positive bent. Just one. And I share it.
HeroicStories Since 1999, HeroicStories brings diverse, international voices to the world ' reminding us that people are good, that individuals and individual action matter. Stories - new and old - are published twice a week.
leo.notenboom.org - My personal blog. Part writing exercise, part ranting platform, it's where I write about anything and everything and nothing at all.