Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

Ask Leo! #386 – Java versus Javascript, vanishing pictures, backups that include malware and more…


The Ask Leo! Newsletter

*** Featured

How do Java and Javascript relate to each other?

As you know, there is much talk on the web about the latest Java vulnerability, presumably coming from China. As I use Java a lot (being a non-geek !!) and that this is rumored to be quite serious, I would like your opinion on the matter. The usual remedy on the web is either to uninstall/disable Java altogether!

When I did this, however, I found that a lot lot of my favorite websites just did not function (at least not fully!). In particular, my online crosswords which I really like. So then as I use Firefox exclusively, I downloaded no-script (can remember that you use it yourself from previous article) and have used it sparingly (no whitelist's as yet).

*

That's actually just one example of several questions that I received this week relating to a recently discovered zero-day exploit of an unpatched vulnerability in Java. My understanding is that a fix is now available, but the scenario has brought to light something very important:

Many people confuse Java and Javascript.

Java is not Javascript. In fact, other than the first four characters of their names, Javascript and Java are not related to each other at all.

Let's look at each and why in situations like this it's so critical to understand that there is a difference.

Continue reading: How do Java and Javascript relate to each other?
http://ask-leo.com/C5762

* * *

*** Answercast

Answercast #49 - Printer troubleshooting, reactivating Hotmail, lost photos, backing up malware and more...

Are you worried that malware will be included in your backup or that your recovery partition is full? Wonder how to get your old Hotmail account back or change a battery? Need to recover files or save your browser from a hijacking? All that and more in this Answercast from Ask Leo!

Listen

Continue reading: Answercast #49 - Printer troubleshooting, reactivating Hotmail, lost photos, backing up malware and more...
http://ask-leo.com/C5758

How do I reactivate my Hotmail account?
A closed Hotmail account is either waiting for you to reactivate it or is closed for good. The only way to tell is to try it out.
Continue reading: How do I reactivate my Hotmail account?
http://ask-leo.com/C5759

My trip pictures vanished from my memory card. How can I recover them?
Even when traveling (or especially when traveling!), backing up is still important. A backup strategy would have saved these vacation photos.
Continue reading: My trip pictures vanished from my memory card. How can I recover them?
http://ask-leo.com/C5761

How do I recover my contact list in Outlook?
Recovering data from an Outlook PST file may not be possible. A complete backup would have saved an intact file for you.
Continue reading: How do I recover my contact list in Outlook?
http://ask-leo.com/C5763

My ISP's equipment is beeping and indicates a battery replacement is needed. What do I do?
Very often, when equipment is signaling for a battery change... it needs a new battery!
Continue reading: My ISP's equipment is beeping and indicates a battery replacement is needed. What do I do?
http://ask-leo.com/C5764

How do I free up space on my recovery drive?
Recovery partitions are meant to only hold system recovery files. It shouldn't be written to, and doesn't need more space.
Continue reading: How do I free up space on my recovery drive?
http://ask-leo.com/C5766

If an automated backup might automatically backup malware, shouldn't I backup manually when I know things are clean?
Backing up manually will not give you better options in recovering from malware; and could easily be worse than an automated system.
Continue reading: If an automated backup might automatically backup malware, shouldn't I backup manually when I know things are clean?
http://ask-leo.com/C5767

How do I get my two monitors to display at different maximum resolutions?
Windows is capable of displaying two monitors each at their recommended resolution. Changing the monitor settings may do the trick.
Continue reading: How do I get my two monitors to display at different maximum resolutions?
http://ask-leo.com/C5768

Can I install Office 2010 and keep Outlook 2007?
Trying to run two versions of Microsoft Office at the same time usually does not work well. Better to pick one version and stick with it.
Continue reading: Can I install Office 2010 and keep Outlook 2007?
http://ask-leo.com/C5769

How do I remove this hijack of my search engine?
You will need to start taking the basic steps for removing malware from your machine. Even if it wasn't intended as malware, it is acting like it.
Continue reading: How do I remove this hijack of my search engine?
http://ask-leo.com/C5770

*** Our Sponsor

Keeping Your PC Fast & Secure

PC Matic is safe and simple to use software that automates the
regular maintenance necessary to keep your PC running like new.

Developed by PC Pitstop - relied on by millions of
computer users for award winning troubleshooting tools.

Start with a Free Diagnostic Scan Today!
https://cart.pcpitstop.com/go.asp?id=500140

Advertisement. Ask Leo about advertising here.

*** Last Issue's Articles

*** Word o' the Week

Vulnerability

A vulnerability is a bug or design flaw in software that allows that software to be used in some malicious and unintended way.

All software has bugs, which are nothing more than mistakes made in the design or implementation of the software. Bugs can take many forms from simply displaying something improperly to crashing the application or entire machine.

When a bug can be intentionally triggered and in turn exploited for malicious purposes that bug is termed a vulnerability.

The results of exploiting a vulnerability may have nothing to do with the software's primary purpose. All that matters is that the vulnerability can somehow be used by malware, typically to infect the machine on which the software is running.

Word o' the Week features a computer term or acronym taken from the Ask Leo! Glossary. If there's a word you're not sure of and would like to see defined, click here to let me know.

*** Thoughts and Comments

This week saw the rise not only of vulnerabilities in Java, but the massive confusion surrounding the relationship between Java and Javascript (hint: they're not related at all). Microsoft doesn't get all the blame for choosing bad names - the folks behind the Java/Javascript name selections deserve some blame here now too.

It's not uncommon that I get thanks from folks who've been helped by an answer on Ask Leo! - I enjoy that and it really does make my day ... heck, it makes what I do that much more rewarding.

Some ask if they can help out.

Sure, you can buy me coffee or a beer, and I totally appreciate that when you do.

However there's something else that's cheaper, and actually helps even more.

Tell people about Ask Leo!.

Tell your friends, have them subscribe to this newsletter, become a fan on Facebook, link to articles that have helped you from your websites, forum posts, and of course on social media sites like Facebook, Twitter and Google Plus.

As I said it costs nothing, and honestly helps Ask Leo! a lot.

Thanks!

'till next time...

Leo
Leo A. Notenboom
Facebook - YouTube
Twitter - Google+

*** Administration

Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at http://newsletter.ask-leo.com for their own FREE subscription!

Need more help with or have questions about the newsletter? Check out the newsletter administration page.

Newsletter contents Copyright © 2012,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC