
#1116 - How to Protect Your Credit Card Information
Problems viewing? Read online: https://newsletter.askleo.com/current-newsletter/
Newsletter FAQ & administration Answers to all your subscription and newsletter questions.
All the ways to Support Ask Leo!
Every so often I run into an offhand comment from someone -- usually someone experiencing networking problems -- that their data would move faster if it were instead carried by pigeons.
The official standards have you covered. You think I jest, but A Standard for the Transmission of IP Datagrams on Avian Carriers, published in 1990, is a detailed and formal specification for the use of carrier pigeons to carry internet traffic. Of course the protocol has high latency (aka it's slow), and subject to packet loss (addressed in an updated RFC2549: "Unintentional encapsulation in hawks has been known to occur, with decapsulation being messy and the packets mangled.")
The Wikipedia article has more on the topic.
I thought a fun way to start off April. (And yes, both RFC's were published on April 1 of their respective publication years
).
Have a good week,

This Week on Ask Leo!
How to Protect Your Credit Card Information
An ongoing challenge, to be sure.
Your credit card info can be stolen in stores or online. From tap-to-pay to virtual card numbers, I'll walk you through the best ways to keep your credit card safe.

How Do I Change My Email Address?
It seems simple, but there are ramifications.
Changing an email address changes a lot more than the address. I'll look at common scenarios and a few additional approaches.

How Can I Send a Document to Someone Securely?
Encrypt it.
Sending private documents by email feels risky because it is. What's the safest way to get sensitive information to the right person without it falling into the wrong hands?

What Can a Technician With Remote Access Do?
Anything.
You thought it was tech support, but it was a scam. You gave a stranger full access to your computer. How worried should you be?

How Do You Remove Bloatware?
My controversial position: don't waste your time.
Your new computer came loaded with software you never asked for. Before you reach for a debloating tool, here's my controversial take on what you should and shouldn't do about bloatware.
Ask Leo! Tip of the Day
For Bronze patrons of Ask Leo!
- Tip of the Day: Avoid UAC Blindness
- Tip of the Day: Back Up Everything Before You Do Anything
- Tip of the Day: Stop Freaking Out About Porn Spam
- Tip of the Day: Avoid the Registry Editor
- Tip of the Day: Have Edge Read to You
TEH Podcast
Find the latest episode here.
Ask Leo! on YouTube
Subscribe to Ask Leo! on YouTube.
How Can I Send a Document to Someone Securely?
Sending private documents by email feels risky because it is. What's the safest way to get sensitive information to the right person without it falling into the wrong hands?
What Can a Technician With Remote Access Do?
You thought it was tech support, but it was a scam. You gave a stranger full access to your computer. How worried should you be?
How Do You Remove Bloatware?
- ?? Your new computer came loaded with software you never asked for. Before you reach for a debloating tool, here's my controversial take on what you should and shouldn't do about bloatware.
Watch: How Do You Remove Bloatware?
How to Protect Your Credit Card Information
Your credit card info can be stolen in stores or online. From tap-to-pay to virtual card numbers, I'll walk you through the best ways to keep your credit card safe.
How Do I Change My Email Address?
Changing an email address changes a lot more than the address. I'll look at common scenarios and a few additional approaches.










