Ask Leo! #621 – Windows 10 and Windows Update, Keeping Backups, Microsoft Accounts, Outlook versus Outlook, and more…

Ask Leo! Tip of the Day

As you may have heard, I'm playing around with Patreon. In fact, what I'm playing around with is giving my patrons more value for their patronage.

To that end I'm experimenting with The Ask Leo! Tip of the Day, mailed out to all patrons at the $2 or higher level, roughly every day. (Realistically I won't commit to 7 days a week, because life happens, but I'm shooting for at least five every week.)

These are short, hopefully useful tips about Windows, technology, and whatever else comes to mind. My first couple of weeks efforts have centered on travel (while I was on the road), Skype, the Windows 10 start menu and more.

I'm also working on an archive so that all tips will be visible to all patrons regardless of when you sign up.

To become a patron just visit Patreon.com and sign up. Your support helps me keep doing what I do: helping more people become more confident using their technology.

And, yes, I'm working on that "It's a secret" level of patronage as well. I really think you'll like that one when it's ready. Stay tuned!

Thanks!

Leo's Blog

Dealing with Windows Update and Windows 10

Keeping your machine as up-to-date as possible is critically important to keeping it, and yourself. safe and secure from discovered vulnerabilities. Yet, with Windows 10 of late, there seems to be risk in taking those updates as well. I'll review my strategy to stay both functional and safe.

Continue Reading: Dealing with Windows Update and Windows 10
https://askleo.com/23703

Featured

How Long Should I Keep My Backups?

Whenever I back up my computer, how long should I keep my backups? I have some from years ago, and I want to delete them.

The answer depends on the reason you made a backup in the first place.

Let's look at some of the reasons, and the implication of each on what's more formally called "data retention".

Continue Reading: How Long Should I Keep My Backups?
https://askleo.com/23473

What Is a "Microsoft Account"?

Windows 10 wants me to use a "Microsoft account". I've had a Hotmail account for years, is that the same? Different? Do I need to create yet another account to keep track of?

Many people are confused by the concept of a "Microsoft account". Microsoft introduced it around the time of Windows 8; with the arrival of Windows 10, they're pushing the concept even harder.

I've long held that Microsoft just doesn't do product names well, but in this case, they had no choice. They needed a term for a more general concept.

Your Hotmail account already is a Microsoft account – as are many, many other accounts. That's where people are getting confused.

Continue Reading: What Is a "Microsoft Account"?
https://askleo.com/23505

How Do Outlook and Outlook.com Relate?

I use Outlook.com. Does that mean I don't need Outlook? Are those just other names for the same thing? If not, how do they relate to each other?

The short answer is, they don't. Not at all. They have only two things in common: they're both related to email, and have the word "Outlook" in their names.

That's pretty much where the similarity ends. It's frustrating, because people often refer to "Outlook" when they mean "Outlook.com" … which is not actually related to "Outlook".

Let's define 'em, shall we?

Continue Reading: How Do Outlook and Outlook.com Relate?
https://askleo.com/1832

Sponsor

Become a Patron on Patreon

Previous Issue

Most recent forum posts

Questions recently posted at The Ask Leo! Forum. If you see "Answer Needed!", maybe you can help!

More: All forum questions in need of an answer.

Glossary Term

vulnerability

A vulnerability is a bug or design flaw in software that allows that software to be used in some malicious and unintended way.

All software has bugs, which are nothing more than mistakes made in the design or implementation of the software. Bugs can take many forms, from simply displaying something improperly, to crashing the application or entire machine.

When a bug can be intentionally triggered and in turn exploited for malicious purposes, that bug is termed a vulnerability.

The results of exploiting a vulnerability may have nothing to do with the software's primary purpose. All that matters is that the vulnerability can somehow be used by malware – typically to infect the machine on which the software is running.

Glossary Terms are featured selections from The Ask Leo! Glossary.
Have a term you'd like defined? Submit it here.

Featured Comments

What's the Difference Between "Image" and "Clone"?

B.J. writes:

I've been using Macrium Reflect, with which I make images and clone my main drive to an extra internal drive. In a pinch, I've found it much easier to simply switch to my cloned drive, and I'm immediately off and running again! I update my cloned drive as I do my work, so it's always up to date, and once a month re-clone in order to get all my Windows updates on the cloned drive. I also do a complete Macrium image every 2 weeks to cover my bases.

Clairvaux writes:

Thank you, Leo. This is a very puzzling question I have been asking myself for years, and never found the answer to. (Years of using the paid version of Macrium Reflect, and reading their manuals and forum, I may add...) Thanks also to the commenters who explained how they use cloning to be sure their backup is working. That was certainly illuminating.

By the way, making sure your system disk backup will work if you need it is one of the most irritating (and overlooked) problems... You once wrote an article on the subject, and if I remember correctly, your conclusion was that there was almost no way to simulate fully a restore operation for verification purposes... Hence the point of cloning. Please correct me if I'm wrong.

Leo writes:

It's not "the point" of cloning at all. Cloning serves certain purposes, but imaging it perfectly valid for 90% of most users. You can't "test" a clone without taking it live, which, depending on your technique, may have the same issues as testing an image.

Networking is Hard

D. writes:

A time-honored solution to the Network Problem:

"Never underestimate the bandwidth of a station wagon full of tapes hurtling down the highway."-Andrew S. Tanenbaum, Computer Networks, 4th ed., p. 91.

sneakernet n. Term used (generally with ironic intent) for transfer of electronic information by physically carrying tape, disks, or some other media from one machine to another. "Never underestimate the bandwidth of a station wagon filled with magtape, or a 747 filled with CD-ROMs." Also called 'Tennis-Net', 'Armpit-Net', 'Floppy-Net', or 'Shoenet'.

[1] E. S. Raymond, Ed., The New Hacker's Dictionary, 3rd ed. , Cambridge, MA: The MIT Press, 1996.

Leo writes:

I occasionally do the math ... for example what's the effective bandwidth of the Netflix delivery service? (How fast is Netflix? No, not streaming, I mean the DVD service.). For large volumes of data there's still no substitute for a hard drive packed with information flying down the freeway. In fact many cloud storage providers even have specific services where you can ship them a drive to pre-populate your cloud storage.

Leo's Books

Backing Up 101 Saved! - Backing Up with Macrium Reflect - 2nd Edition Saved! Backing Up With EaseUS Todo
Saved! - Backing Up with Windows 7 Backup Saved! - Backing Up with Windows 8 Backup
Just Do This: Back Up! The Ask Leo! Guide to Internet Safety The Ask Leo! Guide to Routine Maintenance Maintaining Windows XP - A Practical Guide

More Ask Leo!

Facebook - YouTube - Google+ - Twitter
Amazon - GoodReads
More..

Administration

Need more help with or have questions about the newsletter? Check out the newsletter administration page.

Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!

Newsletter contents Copyright © 2016,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC

Posted: October 11, 2016 in: 2016
Shortlink: https://newsletter.askleo.com/7552
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.



My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.