I was asked the other day to describe how I back up my machine. Presumably the intent was to learn some kind of "best practices" from what I choose to do for myself.
Oh, I'll describe what I do, as best I can, but I'll warn you: I'm a geeky edge-case, far away from what "average" computer users do. It's unclear whether anything I do might help you directly.
The big take-away might be that I'm crazy, I back up like crazy, and I automate as much as a I can.
Beyond that … well, it's a maze of twisty little passages.
Continue Reading: A Peek Behind My Backup Curtain
If you read my article Can we no longer view websites without getting pop-ups?, you'll see that some of the comments on that article range from annoyed to indignant – and not at the state of the web in general (though that's certainly represented there as well).
No, some people are absolutely outraged that while reading an article that will hopefully help them make pop-ups go away, they're suddenly faced with…
So, let's talk about pop-ups, why they exist, why some are worse than others, and why some sites (including Ask Leo!) use them.
Continue Reading: Why Do Websites Use Pop-ups?
While it works well most of the time, problems with Windows Update can be very, very frustrating. There's often no specific fix for whatever specific situation you're faced with, other than to "keep trying" or "let it run"…
… neither of which helps in many cases.
Fortunately, Microsoft has outlined what I'll call the nuclear option: resetting Windows Update completely. Regardless of the problem you're faced with, if it involves Windows Update, I suggest you give this a try.
Continue Reading: How Do I Fix Windows Update?
- Ask Leo! #590 - Security, Skepticism, Backing Up, and more...
- It Pays to be Skeptical
- How Do I Back Up My Computer?
- In Search of Perfect Security
Most recent forum posts
Questions recently posted at The Ask Leo! Forum. If you see "Answer Needed!", maybe you can help!
- hacking ip address possible?
- Win-external hard drive fixation?
- can't get desktop when booting normally
- Clickfree C6 Backup Imaging (Answer Needed!)
- Mount/Unmount USB Backup Disk Before/After Backup? (Answer Needed!)
- Continuous scamming calls
- Safe to Contribute Local Storage?
- Putting pictures on a DVD RW
- windows won't shut down or restart
- Windows 10 Apps
- Backing up and hidden partitions
- Windows 10 Start Menu
- How do i disable the two step securon my computer
- i have problem Proxy connection failed: 127.0.0.1:
- is 1.25 GB (out of 4) of unusable memory too much?
A rootkit is a virus that uses specific techniques to infiltrate your computer's operating system that make it nearly impossible to find. For example, a rootkit virus may exist as a file on your system, but it uses advanced techniques – more advanced than traditional malware – to hide itself in such a way that most anti-malware tools, and even the operating system itself, have no idea that it's present.
You started out well when you described how the only reason you are using Hotmail in a far away place is because you do not have access to your mobile, your computer with POP/IMAC mail etc. Then you miss the point entirely by praising Microsoft for putting these convoluted procedures in place that defeat the whole aim of an internet based email account; that is, for basic communication when you cannot use your normal accounts. Hotmail is essentially useless now so I do not bother with it anymore, but thankfully Yahoo and GMail are for the time being still usable in that role.
I did not praise them for their solution. I pointed out that their (bad) solution is attempting to solve a real and serious problem.
Connie (Team Leo) writes:
Hotmail was actually useless *before* because it was so often hacked. Ask Leo! used to be swarmed, daily, by questions (an mean comments) from people whose accounts were hacked. Not only did they lose everything, but their reputations were often harmed by the activities of the hackers, and everyone in their contact list was mercilessly spammed. Those complaints are pretty much gone now. So you choose: previously if a person did not set up their security and recovery options correctly they were hacked. Today if a person does not set up their security and recovery options correctly they are inconvenienced while traveling. Either way, the responsibility is on each account user to set up their account properly.
Ray Smith writes:
"Sometimes I wish I was also a moron." - While that's a very lofty goal, it can be achieved. Here's how:
1) Extend your right arm with the palm facing upwards.
2) Using your left hand, place a brick into the palm of your right hand.
3) Rapidly bend your right arm until your elbow makes a 90 degree angle and the brick makes contact with your head.
4) Re-extend your right arm and then repeat step #3.
5) Keep on repeating steps #3 and #4 until encryption backdoors start to seem like really, really great idea.
Ask Leo! on Business
There are three pages that every website should have. I'll cover what they are, and creating them. When done, your website will be ready to go to work.
Read: The Three Pages You Need
With your web site up and running, it's now time to begin gathering information about how visitors see and use it, including one special visitor: Google.
More Ask Leo!
Need more help with or have questions about the newsletter? Check out the newsletter administration page.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2016,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC
Fatal error: Call to undefined function related_posts() in /home/alnews/public_html/wp-content/themes/askleo-generatepress/functions.php on line 195