The Ask Leo! Newsletter
What can people tell from my IP address?
What exactly can someone tell from your IP address and what can they do with it? Can they find personal details or my precise geographical location?
It's typically very easy to find out your IP address or the IP address of someone with whom you are communicating somehow on the internet.
Unfortunately, many people believe that with an IP address, it's possible to find out all sorts of information about the person at that connected computer.
That's simply not the case.
Exactly how much it does expose about you specifically depends on your ISP and how their (and your) network is configured.
The very short answer? Not much.
Continue reading: What can
people tell from my IP address?
* * *
Answercast #43 - Password lists, Facebook impersonation or hacking, update problems, outlook.com and more...
Ever wonder if you can protect photos and conversations in a Yahoo chat, or if Facebook games open you up to hackers? Still annoyed by advertising emails and friend invites? Want to look at a suspicious email's source or see what is downloading to your computer? All that and more in this Answercast from Ask Leo!
Answercast #43 – Password lists, Facebook impersonation or hacking, update
problems, outlook.com and more...
Can I keep my password list on my iPad?
You can save your passwords insecurely... if you want. But it would be better to rely on software designed for the job.
Continue reading: Can I keep my password list on my iPad?
Could someone set up a Facebook in my name?
Facebook accounts use an email address as the identifier and they often collect email addresses from friends. That can lead to fake accounts and unwanted invitations.
Continue reading: Could someone set up a Facebook in my name?
Why can't I get my Hotmail email address at
The change from Hotmail.com to Outlook.com is not automatic. You are not guaranteed to get your old handle in the new system.
Continue reading: Why can't I get my hotmail email address at outlook.com?
Why is my computer uploading and downloading when it's doing
Most often, uninitiated connections to the internet are the result of your computer updating itself. Occasionally, it is malware and there is a good tool to help you sort it out.
Continue reading: Why is my computer uploading and downloading when it's doing nothing?
Can I prevent someone from saving photos shared over Yahoo
It is very easy to capture and save images from the internet, whether they are from websites or social networks. Anything you put out there can easily be grabbed.
Continue reading: Can I prevent someone from saving photos shared over Yahoo IM?
When I delete my Yahoo IM transcripts, are they really
IIn practicality, information is deleted when it is deleted, although there are several scenarios where it could be recovered if someone were motivated enough!
Continue reading: When I delete my Yahoo IM transcripts, are they really deleted?
Is View Source a safe way to view suspicious emails?
View Source is a relatively safe way to view suspicious emails, even though it is good to remain wary.
Continue reading: Is View Source a safe way to view suspicious emails?
How can I stop having to deal with annoying advertising emails every
Other than stopping spam on your end, there's little you can do to prevent it. The best bet is to learn to use the spam filters in your email program.
Continue reading: How can I stop having to deal with annoying advertising emails every day?
Can your email be hacked through the games on
Continue reading: Can your email be hacked through the games on Facebook?
I can't access the Windows Update site, what do I do?
A computer that won't update is a serious problem. We'll start by investigating potential malware.
Continue reading: I can't access the Windows Update site, what do I do?
*** Our Sponsor
Keeping Your PC Fast &
PC Matic is safe and simple to use software that automates the
regular maintenance necessary to keep your PC running like new.
Developed by PC Pitstop - relied on by millions of
computer users for award winning troubleshooting tools.
Start with a Free Diagnostic Scan Today!
Advertisement. Ask Leo about advertising here.
*** Last Issue's Articles
- Ask Leo! #379 - Happy Anniversary! Learning from a massive hack, ads that stalk you and more...
- How can I limit the time I spend on the internet?
- Can I read Open Office documents on my Android?
- Does index.dat mean someone is spying on me?
- How much memory does this particular CPU need?
- Do I need to worry about memory fragmentation?
- What can we learn from Mat Honan?
- Should I disable gadgets for security?
- Do I need a router if my modem has a firewall?
- How do I remove SkyDrive?
- Will my backup work if I replace my motherboard?
- Why do these ads keep following me around the internet?
- Answercast #42 - Troublesome advertising, Android docs, memory fragmentation, Skydrive, gadgets and more...
*** Word o' the Week
An IP address, short for Internet Protocol Address, is a number used to identify a device connected to a TCP/IP network.
In IP version 4 (IPv4) an address is a 32 bit number typically displayed as 4 decimal numbers ranging from 0 to 255 separated by periods. 188.8.131.52 is an example of a valid IP address. (IP version 6 uses 128 bits, and is typically displayed using hexadecimal notation separated by colons, with some portions being optional.)
Every device connected to a TCP/IP network is required to have a unique IP address. It's important to realize that an IP address is assigned to a device, and that device then in turn may be capable of hosting many different and potentially unrelated services including web sites.
The internet itself is, of course, the largest TCP/IP network, and every device connected directly to is does, indeed, have a unique IP address. Confusion sometimes results from the fact that many devices are actually not connected directly to the internet, but rather through some other device such as a router.
A router, as a device connected to the internet, is assigned an IP address on the internet, but it also establishes a completely separate network or LAN on which attached devices are assigned IP addresses that are unique to only that local network. The router then handles Network Address Translation or NAT to give the local devices the ability to contact services on the internet where they appear as connections from the router's internet IP address.
*** Thoughts and Comments
Is Your Data Secure?
I normally don't push recent posts here - I figure you've seen it mentioned in a previous newsletter and you either considered it interesting and already read it, or it looked boring and you moved on. That's kinda why the newsletter is laid out the way it is - you choose what interests you.
Regardless, I'd like to encourage you to read What can we learn from Mat Honan? if you haven't already.
It was in the previous newsletter, but I think it's important.
As a result of Mr. Honan's hack there's been a bunch of wailing and gnashing of teeth as to how scary the cloud is and how horrible it is that two major companies could be so lax in their security policies.
The problem is: none of this is new.
And no one is really talking about what steps you should consider taking as a result.
The cloud (I loath that moniker - all it means is "online services") doesn't have to be scary if you protect yourself. In fact it's one of the most powerful and liberating things to have come along in years.
That's why I'm trying to focus on lessons learned, not fingers pointed.
we learn from Mat Honan? certainly doesn't cover every possible base, but I
do believe it points out a couple of things that we don't normally consider
that could improve your overall security as you use
'till next time...
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at http://newsletter.ask-leo.com for their own FREE subscription!
Need more help with or have questions about the newsletter? Check out the newsletter administration page.
Newsletter contents Copyright © 2012,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC