“Is It Possible” is the Wrong Question
How Can a Hacker Try All Possible Passwords If Systems Block the Login Attempts?
Why Do Password-strength Meters Give Different Results?
What the CCleaner Hack Means to You
What the Equifax Breach Means to You
Why Don’t Anti-malware Tools Work Better?
Recovering from Ransomware with an Online Backup
Is a Microsoft Office Subscription Worth It?
The Four Characteristics of Computer Speed
How Can I Tell If a Website is Safe?
Using OneDrive for Nearly Continuous Backup
Restoring Files with File History
Is Copyright Still an Issue If Something’s Not Available Anywhere?
Does a Lapsed Anti-malware Tool Leave an Open Door for Malware?
How Should I Password Protect an External Drive?
How Do I Hack Someone’s Account?
Yes, You Should Give Google Your Mobile Number
How Do I Get a Program to Auto-start When I Sign in to Windows?
What’s the Difference Between a “Trojan Horse”, a “Worm”, and a “Virus”?
Someone’s Sending from My Email Address! How Do I Stop Them?!
What’s a “Zero-Day” Attack?
Supercookies and Evercookies: Resistance is Futile
What Good is Incognito Mode?
Why SMS Two-Factor Is Better than No Two-Factor at All
Is It Time to Start Using an Adblocker?
What VPN Should I Use?
How Does a VPN Protect Me?
The Internet Is Forever, Except When It’s Not
The Biggest Risk to Your Privacy
How Do I Protect Myself from My ISP?
Walking Away From Your Computer
Are Free Email Services Worth It?
Every Application Adds Risk
How Much Can I Trust Information on the Internet?
What are the Differences Between an Email Account, Address, Program, and Service?
What is Cloud Computing?
How Can I Securely Delete Everything Except the Operating System?
How Do I Encrypt Email?
Ask Leo! #636 – How Do I Find Good Local Computer Help?
What Does It Mean for a Source to be “Reputable”?
Why Do Ads Follow Me Around the Internet? (and more)
What if My Security Software Vendor Gets Hacked? (and more)