I recently had a question from someone that contained several common misconceptions about Windows 10. Let's clear a few of those up...
Continue Reading: Clearing Up Some Windows 10 Misconceptions
The short answer is that you can, and it certainly provides a level of protection.
But your safety net has a hole in it.
There are definitely things you're missing that a managed backup would catch and back up for you … things you'll really care about should the worst happen.
Continue Reading: Can't I Just Copy Everything Instead of Using a Backup Program?
The topic is an important one: how do you make sure you have a secure router? As your firewall, it's your first line of defense against malware trying to get at your computer from the internet.
You'll want to make sure there aren't big gaping holes. And sadly, very often and by default, there are.
Here are the most important seven steps to a more secure router.
Continue Reading: 7 Steps to a Secure Router
- Ask Leo! #598 - PUPs, Unknown Partitions, Contacting Outlook.com Customer Service, and more...
- How Do I Remove PUPs, Foistware, Drive-bys, Toolbars, and Other Annoying Things I Never Wanted?
- EaseUS Todo Gave Me An Error on an "Unknown Partition", What Should I Do?
- How Do I Contact Outlook.com Customer Service?
Most recent forum posts
Questions recently posted at The Ask Leo! Forum. If you see "Answer Needed!", maybe you can help!
- Windows 7 and Windows 10 on same PC
- windows 7xp to Windows 10
- Laptop Battery Drainage While Off
- What is the remote code execution vulnerability?
- Windows 10 Free
- Back up replacement
- Cannot get bluetooth to wrok in Win7 Pro 64 bit
- What's happening with my hard disk
- Text size in WIndows 10
The cloud is nothing more than a reference to services and technologies provided online over the internet.
The term "cloud", besides being a marketing buzz-word, conceptualizes the internet itself as a cloud so as to avoid having to detail the reality of its massively complex interconnections. Even before the term "cloud" was popular in general use, network diagrams often used the image of a cloud to represent large networks.
Cloud computing is nothing more than using internet-connected computers to perform computational tasks.
Cloud storage is nothing more than data storage provided by online services.
Cloud services are nothing more than services provided by online service providers.
Naturally, all of the above can be intermixed.
"The cloud" is nothing really new: email has been essentially a cloud service since its inception. What has changed, however, is the ubiquity of internet connectivity, the increased speeds at which people are connected to the internet, and the fact that using online services is becoming more and more practical for more and more people than ever before.
Ray Smith writes:
"I also clear my cashe and cookies and do a disk clean too almost daily after logging off everything. so that`s probably why." - You know, while there's nothing wrong with doing this, there's really not much point in doing it either. It does nothing whatsoever to prevent malware infections and isn't the reason that your MBAM/MSE scans are coming up clean. Nor does clearing the cache speed up either your PC or browsing. In fact, it's probably slowing things down somewhat. Windows caches stuff in order to speed up your browsing and, if you clear the cache, you prevent that from happening.
Phil Lock writes:
Another vote for 'unchecky'. Has saved my life more than a couple of times and seems infallible, despite my deliberately having done some VERY naughty downloads (immediately after a full backup of course!!) by way of a test.
I'm probably not understanding something or just not thinking it all the way through. What if someone STEALS your phone. They now have access to both factors. They have access to your email and your text messages and your phone calls so TFA no longer helps you stay secure, correct? Again, what am I missing? I have a passcode on my phone.
Right. If they hack your password, AND steal your phone they can get in. Those are two separate things, however. Given that most hackers are very, very far away from you (typically overseas) the likelihood of them having stolen your phone is next to nothing. 2FA remains incredibly robust.
Ask Leo! on Business
Photos and other images can make your posts more appealing and informative. They can also slow down your site and distract readers. At worst, choosing the wrong image can get you in trouble.
More Ask Leo!
Need more help with or have questions about the newsletter? Check out the newsletter administration page.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2016,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC
Fatal error: Call to undefined function related_posts() in /home/alnews/public_html/wp-content/themes/askleo-generatepress/functions.php on line 195