Can I make my C: partition bigger by taking space from D:?
Yes, I wouldn't expect that rename to work. There are simply too many places, such as within the system registry, that have recorded the fact that things are on "C:". If you rename C: to D:, the system wouldn't be able to find them.
What you're looking for is partitioning software.
And there's a good chance you already have what you need.
Continue Reading: Can I make my C: partition bigger by taking space from D:?
Are your backups asking you for dynamic disk options, or do you need to test them? Wondering about secure websites and anti-virus safety. Need to know more about how hackers work?
(Includes the raw transcript on which the articles below were based.)
What's a dynamic disk?
Chances are that you have a basic disk, and don't need the functionality offered by dynamic disk support. Even if that functionality actually is kind of cool.
Continue reading: What's a dynamic disk?
Is anti-virus dead?
Anti-malware tools have never been 100% solutions - but, despite what we hear on the news, they are far from dead!
Continue reading: Is anti-virus dead?
I see lots of failed attempts to login to my account, should I do anything?
One thing that everyone needs to realize is that our accounts are pretty much under constant attack. We certainly need to act like they are.
Continue reading: I see lots of failed attempts to login to my account, should I do anything?
How can a hacker try all possible passwords if systems block the login attempts?
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Continue reading: How can a hacker try all possible passwords if systems block the login attempts?
What makes a site secure?
A secure website means the site owner has jumped through the technical hoops necessary to qualify for https. Safety is another thing all together.
Continue reading: What makes a site secure?
How do I test my backups?
It's a good idea to test your backup image before disaster strikes. Let's look at the steps.
Continue reading: How do I test my backups?
*** Our Sponsor
*** Last Issue's Articles
- Ask Leo! #496 - Giving Away Your Privacy, Heartbleed and your Router, Port 80, Security Breaches and more...
- Should I worry about Heartbleed affecting my router?
- How can I find out what program keeps popping up in my taskbar and disappearing before I can click on it?
- Why are there websites in my browser history that I've never been to?
- Just what is Port 80?
- Giving Away Our Privacy
- Why do I need another email address to access my account?
- How can big services still have security breaches?
- Why do some web pages never finish loading?
- How do I force my email account to close on another device?
*** Featured Reader Comments
Hi. We have a confirmation that our email has been hacked. The info in those emails was shared through another person's email account. Is there a way we can show that we were hacked and who actually did the hacking? This relates to a big lawsuit, and the opposing side is using hacking tactics to obtain intel.
Connie Delaney writes:
Perhaps law enforcement, like the FBI, could trace that sort of thing down. But you or I couldn't do it, and the real world isn't like television cop shows. Meanwhile, read this article by Leo and make sure your account (all your accounts actually) are secure:
Be careful about using your work email address as recovery for your personal accounts. When I changed jobs I had to do a fairly thorough review of places where I had done that, and make the changes before I finally lost assess to that account.
Phone numbers can also be used for recovery but then you need to update the info if you ever change your phone.
Just adding my voice to the despair. Going round England visiting friends, some of whom have come over from Australia to meet me. All correspondence, itinerary, changes of plan via hotmail: the planning has been gong on for months. . And now hotmail won't let me in because I'm not at home on Grenada, which is of course where my phone is.
Yes, I'm grateful I've not been hacked, but what use is email if you can't use it?
*** Leo's Blog
"Right to be Forgotten": Misguided and Misleading
The European Union's highest court recently ruled that search engines, namely Google and maybe Bing, need to honor requests from individuals to be removed from their search indexes in support of a concept known as "the right to be forgotten".
There are many ethical, political and moral discussions that are happening around the topic right now. While I certainly have opinions in those realms, I want to take a look at it from a purely practical point of view.
It just can't work.
Continue Reading: "Right to be Forgotten": Misguided and Misleading
I'm not the only "Ask" in town! Last week I had the opportunity to guest post over at my friend Dave Taylor's site Ask Dave Taylor. Check out Do I need to use Internet Explorer to get Windows Updates?
Leo A. Notenboom
*** Leo's Books
Need more help with or have questions about the newsletter? Check out the newsletter administration page.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at http://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2013,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC