Ask Leo! #630 – My Backup Origin-Story, Moving OneDrive, Human Relation Skills, and more…

Leo's Blog

One of the Reasons I Think Backups Are SO Important

I have a good reason to always be talking about backups... Once upon a time everything was lost.

Continue Reading: One of the Reasons I Think Backups Are SO Important
https://askleo.com/24191

Featured

How Do I Move My OneDrive Folder?

When you set up OneDrive, it places the local machine copy of your files in a subfolder of your user folder. For example, on my machine, that would be:

C:\Users\lnote\OneDrive

Personally, I don't like that. I prefer to have cloud storage folders like OneDrive at the top, or "root", of my C: drive. Perhaps more practically, however, many people like to place these folders on another drive completely.

Let's move the OneDrive folder.

Continue Reading: How Do I Move My OneDrive Folder?
https://askleo.com/24099

Are Human Relations Skills Important in Tech?

This is actually for a school assignment for a class called Human Relations in Organizations. I have to ask someone with a career in my technology these three questions:

1.) What skills do you use every day to deal with others at work (co-workers and clients)?

2.) How often do you use those skills (a specific number, like a percentage of a typical day, or week)

3.) Do you think a class about human relations should be required for an Associates degree in computer programming? Why or why not?

Normally, I don't answer homework questions. You'd be surprised at how many I get that are obviously someone trying to get me to do their homework for them.

This one, besides appearing to be an honest question as part of an honest assignment, speaks to something I feel strongly about. It's not something I would have guessed when I started my career in computer programming.

Dealing with people is much more difficult than dealing with computers …

… and yet way more important.

Continue Reading: Are Human Relations Skills Important in Tech?
https://askleo.com/3068

Recover a Remembered Wi-Fi Password

I connected to my WPA-protected Wi-Fi network ages ago, and now I can't remember the password. How do I figure out what it is?

It's not at all uncommon to set up a wireless network securely, and then get on with your life, neglecting to write down the encryption password you created. Later, when it comes time to add another device, you're unable to remember that all-important password.

It's so secure, even you can't get in!

There are two approaches you can take.

Continue Reading: Recover a Remembered Wi-Fi Password
https://askleo.com/24108

Sponsor

Become a Patron on Patreon

Previous Issue

Glossary Term

backup

A backup is nothing more than an additional copy of data, ideally kept in a different location than the original.

If there's only one copy of something – say a photograph on a mobile phone – then it's not backed up. If that device were to fail or be lost, then the photograph would be lost forever as well.

Computers are excellent at making copies of digital data, and backups are one important use of that functionality.

It's generally recommended that important data be backed up in at least one, ideally more, separate devices or media, such as an external hard disk. In addition, it's recommended that critical data also be backed up in another physical location, such as a different building, or online.

More than anything, the important concept is that there never be only a single copy of important data. That's not backed up.

See also: back up

Glossary Terms are featured selections from The Ask Leo! Glossary.
Have a term you'd like defined? Submit it here.

Featured Comments

Why I'm Keeping My Note 7 (For a While)

Christopher Souter writes:

Leo, if you really are intending to keep using your Samsung Galaxy Note 7, I hope you're on Verizon.

The Register published this article today:

http://www.theregister.co.uk/2016/12/09/samsung_note_7_to_be_killed_dec_19/

Leo writes:

I mentioned elsewhere, but my Note 7 has been returned. I was waiting for something equivalent, and the Google Pixel XL fit the bill. :-)

Focusing on Security and Privacy

Ray Smith writes:

"Do you have a good source of finding out if a password is a secure password where a hack will be almost impossible?" - This:

https://howsecureismypassword.net

Password length/complexity is actually not as important as many people think. Passwords mainly get compromised in one of three ways. Database theft and phishing are by far the most common, and the complexity of the password does nothing to help in such scenarios (a complex password can be stolen or phished as easily as a simple password). The third way is for it to be guessed or otherwise discovered by a dishonest friend/family member/co-worker. In this scenario, complexity does help, but a password does not need to be enormously complex to defeat the attacker.

Password checkers, such as the one I linked to above, assume that somebody will be running cracking tools against your password. In the real world, however, that simply does not happen (unless, that is, you're specifically targeted because your laptop is loaded with trade secrets worth millions).

To be clear, I'm not suggesting that strong, long passwords shouldn't be used - it's easy to do, so you may as well do it - simply that it's not necessarily as important as people think.

Leo writes:

Actually there is an argument for complexity - or at least length - in the case of database theft: brute-force (or rainbow tables) in conjunction with poor password database design. The shorter/simpler your password is the more likely it is to be able for a hacker to try all possible passwords against a stolen database. At a minimum it's trivial for them to try huge databases of known or common passwords. As I said, good database design can make this significantly more difficult - but the opposite, poor database design, can also make it next to trivial for the hackers. And, sadly, we keep hearing about compromises where it turns out the stolen database was implemented poorly.

This is one of the reasons I've started promoting length over complexity. A short 8 character password can now be compromised no matter how complex it is. The odds of a longer (say 16 character) password being compromised in that manner are significantly smaller.

Ray Smith writes:

It's shocking. Too many people adopt the position, "So what? I've got nothing to hide." But as Edward Snowden very rightly said, "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.'

The societal implications of mass surveillance are enormous. In fact, it could very well turn out to be the biggest issue of our time.

The Ask Leo! Tip of the Day

A feature exclusively available to Ask Leo! Patrons.

Leo's Books

Backing Up 101 Saved! - Backing Up with Macrium Reflect - 2nd Edition Saved! Backing Up With EaseUS Todo
Saved! - Backing Up with Windows 7 Backup Saved! - Backing Up with Windows 8 Backup
Just Do This: Back Up! The Ask Leo! Guide to Internet Safety The Ask Leo! Guide to Routine Maintenance Maintaining Windows XP - A Practical Guide

More Ask Leo!

Facebook - YouTube - Google+ - Twitter
Amazon - GoodReads
More..

Administration

Need more help with or have questions about the newsletter? Check out the newsletter administration page.

Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!

Newsletter contents Copyright © 2016,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC

Posted: December 13, 2016 in: 2016
Shortlink: https://newsletter.askleo.com/7593
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.



My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.