I have a good reason to always be talking about backups... Once upon a time everything was lost.
Continue Reading: One of the Reasons I Think Backups Are SO Important
When you set up OneDrive, it places the local machine copy of your files in a subfolder of your user folder. For example, on my machine, that would be:
Personally, I don't like that. I prefer to have cloud storage folders like OneDrive at the top, or "root", of my C: drive. Perhaps more practically, however, many people like to place these folders on another drive completely.
Let's move the OneDrive folder.
Continue Reading: How Do I Move My OneDrive Folder?
1.) What skills do you use every day to deal with others at work (co-workers and clients)?
2.) How often do you use those skills (a specific number, like a percentage of a typical day, or week)
3.) Do you think a class about human relations should be required for an Associates degree in computer programming? Why or why not?
Normally, I don't answer homework questions. You'd be surprised at how many I get that are obviously someone trying to get me to do their homework for them.
This one, besides appearing to be an honest question as part of an honest assignment, speaks to something I feel strongly about. It's not something I would have guessed when I started my career in computer programming.
Dealing with people is much more difficult than dealing with computers …
… and yet way more important.
Continue Reading: Are Human Relations Skills Important in Tech?
It's not at all uncommon to set up a wireless network securely, and then get on with your life, neglecting to write down the encryption password you created. Later, when it comes time to add another device, you're unable to remember that all-important password.
It's so secure, even you can't get in!
There are two approaches you can take.
Continue Reading: Recover a Remembered Wi-Fi Password
- Ask Leo! #629 - Privacy Threats, More PUPs, PINs vs. Passwords, and more...
- An Easy-to-Miss Source of PUPs
- How Can a PIN Be As Secure as a Password?
- Focusing on Security and Privacy
A backup is nothing more than an additional copy of data, ideally kept in a different location than the original.
If there's only one copy of something – say a photograph on a mobile phone – then it's not backed up. If that device were to fail or be lost, then the photograph would be lost forever as well.
Computers are excellent at making copies of digital data, and backups are one important use of that functionality.
It's generally recommended that important data be backed up in at least one, ideally more, separate devices or media, such as an external hard disk. In addition, it's recommended that critical data also be backed up in another physical location, such as a different building, or online.
More than anything, the important concept is that there never be only a single copy of important data. That's not backed up.
See also: back up
Christopher Souter writes:
Leo, if you really are intending to keep using your Samsung Galaxy Note 7, I hope you're on Verizon.
The Register published this article today:
I mentioned elsewhere, but my Note 7 has been returned. I was waiting for something equivalent, and the Google Pixel XL fit the bill. :-)
Ray Smith writes:
"Do you have a good source of finding out if a password is a secure password where a hack will be almost impossible?" - This:
Password length/complexity is actually not as important as many people think. Passwords mainly get compromised in one of three ways. Database theft and phishing are by far the most common, and the complexity of the password does nothing to help in such scenarios (a complex password can be stolen or phished as easily as a simple password). The third way is for it to be guessed or otherwise discovered by a dishonest friend/family member/co-worker. In this scenario, complexity does help, but a password does not need to be enormously complex to defeat the attacker.
Password checkers, such as the one I linked to above, assume that somebody will be running cracking tools against your password. In the real world, however, that simply does not happen (unless, that is, you're specifically targeted because your laptop is loaded with trade secrets worth millions).
To be clear, I'm not suggesting that strong, long passwords shouldn't be used - it's easy to do, so you may as well do it - simply that it's not necessarily as important as people think.
Actually there is an argument for complexity - or at least length - in the case of database theft: brute-force (or rainbow tables) in conjunction with poor password database design. The shorter/simpler your password is the more likely it is to be able for a hacker to try all possible passwords against a stolen database. At a minimum it's trivial for them to try huge databases of known or common passwords. As I said, good database design can make this significantly more difficult - but the opposite, poor database design, can also make it next to trivial for the hackers. And, sadly, we keep hearing about compromises where it turns out the stolen database was implemented poorly.
This is one of the reasons I've started promoting length over complexity. A short 8 character password can now be compromised no matter how complex it is. The odds of a longer (say 16 character) password being compromised in that manner are significantly smaller.
Ray Smith writes:
It's shocking. Too many people adopt the position, "So what? I've got nothing to hide." But as Edward Snowden very rightly said, "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.'
The societal implications of mass surveillance are enormous. In fact, it could very well turn out to be the biggest issue of our time.
The Ask Leo! Tip of the Day
A feature exclusively available to Ask Leo! Patrons.
- Tip of the Day: Be Skeptical
- Tip of the Day: Build and Search a List of Every File on Your PC
- Tip of the Day: The Three States of a Window
- Tip of the Day: The Taskbar Program Keyboard Shortcut
- Tip of the Day: Turn Off Background Apps in Windows 10
- Tip of the Day: Send Links Instead of Attachments
- Tip of the Day: Make Your Passwords Longer
More Ask Leo!
Need more help with or have questions about the newsletter? Check out the newsletter administration page.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2016,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC
Fatal error: Call to undefined function related_posts() in /home/alnews/public_html/wp-content/themes/askleo-generatepress/functions.php on line 195