A Weekly Newsletter From
Thank you. Thank you. Thank you.
If you're having problems with the formatting of this newsletter in email it's always available on the web here: http://ask-leo.com/currentnewsletter.html
Do you know someone who would benefit from this newsletter? Forward it to them! (See below for details.)
Did someone forward this email to you? Subscribe to get Leo's Answers in your own inbox every week.
*** This Week's New Articles on Ask Leo!
Why shouldn't I include my email address in a Twitter post or 'tweet'?
I included my email address in a 'tweet' on Twitter, and someone told me I shouldn't. Why?
I made that question up, because I noticed today that masses of people are doing exactly that: including their email addresses within posts they make on Twitter.
You really, really, really don't want to do that.
The reason is an old answer: spam.
"Why shouldn't I include my email address in a Twitter post or
* * *
I spilled water into my laptop, how do I get it working again?
While I was asleep, my cat must have tipped over a part full cup of water on my new laptop computer. The computer lid was closed and the AC power cord was connected when my daughter tried to turn it on in the morning. It did not turn on (and it hasn't ever since, even after leaving it to dry out for a couple of weeks). There was also a small pool of water under the computer (about 5cm in diameter) and drips of water come from the keyboard when tipped over. What should I do to maximize my chances of getting it working?
I'm going to recommend an obscure long shot as something to try.
I'm also going to ask for help.
"I spilled water into my laptop, how do I get it working
* * *
What's the risk of connecting to the internet without protection?
I remember reading not too long ago about virus programs that are computer generated and that conduct a random search for unprotected IP address' to download to. I was recently talking to some friends who also shut off their PC when not in use but leave the cable modem running and connected to speed up the startup process.
The question is are there such virus programs and if they exist what is the risk factor of being connected for even a brief period of time without operational protection?
I vaguely recall the worst case scenario that you're referring to: an unpatched and unprotected version of either Windows 2000 or an early version of Windows XP lasted about 30 seconds after connecting to the internet before it was infected with a virus.
Things are better today, but you still want protection. And turning your machine off isn't really helping.
"What's the risk of connecting to the internet without
* * *
How do I get Windows Explorer to show folder names in its taskbar buttons?
I just got a new computer.
On the old one, the taskbar shows open folders correctly: "Folder Name". It makes it easy to see which one you want to click on to get the desired folder up front.
On the new computer, the tab on the taskbar shows the folder name as "C:Documents and SettingsUser NameDesktopFolder Name" -- and since all that doesn't FIT on the little tab, they ALL read "C:Docume...", which means they're quite useless labels. How do I get it to just show the end folder name?
It's actually another of Windows buried and somewhat obscure settings.
In fact, I didn't even connect what this setting was for until I got this question.
"How do I get Windows Explorer to show folder names in its taskbar
* * *
Why does my anti-malware software say a link is suspected phishing?
My AT&T web mail says this is a suspected phishing site in regards to your newsletter. I still open and read it. Why would they suspect a forged address?
Unfortunately, there's a very legitimate way to craft links that also happens to be easily confused with a technique used by phishing attempts.
It's a difficult position for both the publisher, such as myself, who wants to gather information, and the anti-malware software that doesn't want to inadvertently miss an actual phishing attempt. By erring on the side of paranoia, the anti-malware software often reports "false positives" - links that are "suspected" of being phishing attempts, but really aren't.
Let's look at this in more detail, and how you can tell the difference.
"Why does my anti-malware software say a link is suspected
*** A Word from our Sponsor
Your PC is Not Slow ... It Just
Needs a Tune Up.
In just minutes, discover how you can improve the performance
of your computer and keep it running like new without the expense
of adding new hardware. Automatically diagnose problems with
your PC. Run the all new, no cost PC Pitstop Optimize 2.0 scan
now and in just minutes - discover numerous ways you can keep
your PC running at peak performance. Scan Now!
Advertisement. Ask Leo about advertising here.
*** Featured Comments
A sampling of some of the comments that have been posted recently on Ask Leo!
* * *
Mary Ann writes:
Thanks for the answer to,"Why Don't PDF's Print At Same Size As Original?" It's a real aggravation to print from A PDF and the print comes out so small you can barely read it. I just rescaled my page to "none" and it worked beautifully. We struggle with these little things and it doesn't occur to us sometimes to just "Ask Leo!" Mary Ann
This for those who use others "wi-fi" hotspots. Here where I live in Florida it is totally ILLEGAL to use someone else's hot spot. I personally do not have WiFi myself, but my laptop tries to connect ( and sometimes does ) to my neighbors. Recently they arrested a number of people who were doing this. It can be traced, and at least here. It can land you in the pokey!
Wow. I'd not heard of arrests (or jail time, for that matter) before, but I suppose it was only a matter of time. Illegal or not, depending on where you are, it's at least unethical.
There is one further point to make, and it is this: even if you have been backing up and have a complete image of the system that you can roll back to, you cannot be sure it was made prior to the infection unless it was made immediately after installing the operating system, and before connecting the computer to a network (local network or the Internet). So, for truly paranoid people like myself, reformatting and reinstalling is still required. The backup therefore just gives you the ability to selectively restore data you've created, as long as proper precautions are taken.
Furthermore, there are any number of possible infections that are not obvious, or even apparent to even the most technical users (I'm thinking spambot trojans, which survive longer if they can hide from the computer operator). It's a truly terrifying world out there for us paranoid people.
*** This Week's Most Popular
The ten most popular articles in the last 7 days on Ask Leo!
- How do I change my MSN Hotmail password?
- How do I delete history items from my Google tool bar?
- I accidentally deleted my Recycle Bin in Vista - how do I get it back?
- My desktop Recycle Bin has disappeared - why, and how do I get it back?
- How do I make a new MSN Hotmail account?
- How do I delete my Hotmail account?
- Can I send text messages between a computer and a cell phone?
- How do I put a picture into the caption of a picture on myspace.com?
- What are MSN HotMail's POP3 and SMTP settings for Outlook Express?
- How do I move my Outlook Express folders to my new machine?
*** Leo Recommends
Free CD/DVD Burning Tool
There are many CD burning tools out there, including several popular free ones as well as several commercial. In fact, there's a good chance you might have a trial version of on of the commercial products on your machine right now - they're often included in the pre-installed software.
I use ImgBurn: it's free, it's lightweight, it does more than I'd ever need, and it's relatively easy to use.
I say that it's "relatively" easy to use, because its interface can be just a tad intimidating to the first time user. To overcome that, let me show you how to do a few common operations using ImgBurn.
Continue reading: "ImgBurn -
Free CD/DVD Burning Tool"
Each week I recommend a specific product or resource that I've found valuable and that I think you may as well. What does my recommendation mean?
*** Popular Articles from the Archives
I just want support that works, I don't care where it comes from:
Outsourcing Tech Support - Good, or Evil?
Over here, or overseas, incompetence knows no boundaries.
If you call the tech support lines for many major companies these days, you can't really be sure that the person you're talking to isn't a few miles away or on the other side of the planet. We've all heard of technical supporting being outsourced to overseas companies, often in India, to reduce costs. The current state of technology allows us to communicate anywhere on the planet cheaply and instantaneously, so it does make a certain amount of sense that, all else being equal, companies would be foolish not to consider it.
But is it evil? Many think so.
Outsourcing Tech Support - Good, or Evil?
*** Thoughts and Comments
As many of you may, or may not know I post on Twitter a few times pretty much very day these days. You can follow me on LeoOnTwitter.com - you'll get occasional comments, pointers to particularly relevant articles I've stumbled on, notifications when I upload a new photo to Flickr, and so on. I also "tweet" (post) when I post most new articles, so it's also a quick way to stay on top of what's happening out here at Ask Leo! as well.
This weekend Twitter suffered from a major phishing attack that apparently caught a lot of people, and tricked them into providing their Twitter account information to a third party. In discussing it with some friends, I was pointed at this great video: Phishing in Plain English. If you've never quite understood what phishing is, or even if you do, have a look. It's very nicely done.
Another Twitter-related topic that came up resulted from a search I did on search.twitter.com, which searches all the public posts across all of Twitter's users. I searched for "hotmail", and what did I get? Tweet after tweet with bare-naked email addresses that spammers can just harvest and know that they're good. That's the reason I wrote "Why shouldn't I include my email address in a Twitter post or 'tweet'?", but it really applies to any publicly visible site or social media service. If anyone can see the email address you just posted, then spammers can see the email address you just posted. Expect more spam as a result.
Unless you want more spam, don't do that.
'till next time...
Leo A. Notenboom
* * *
A selection of Leo's articles are available for free re-use at http://articlesbyleo.com.
You can also subscribe to Ask Leo! on your Kindle.
Perhaps you'd like some Ask Leo! Stickers?
*** Newsletter Administration
Do you have a question? A comment, perhaps? Visit http://ask-leo.com/ask to submit your questions.
I'll be honest: I'll try to respond, but I get a lot of questions every day - I just can't answer everyone. Rest assured, though, that even if you don't hear from me directly, every email gets read.
Leo's Answers Newsletter is a weekly publication of Ask Leo! and Leo A. Notenboom. It's also available as an RSS feed at this URL: http://ask-leo.com/newsletter.xml. Archives of previous newsletter issues can be found on the Ask Leo! web site, http://ask-leo.com/newsletter.html.
Forward Me! You're quite welcome to forward this email in its entirety; it's a great way to help Ask Leo! grow. But you should probably delete your unsubscribe link below, so your friends don't unsubscribe you by accident.
You may forward individual articles from this newsletter only if you include all and only the text of that article as found in this newsletter, including any links therein. You may not copy full articles from the Ask Leo! website - more on that in my section on copyright: http://ask-leo.com/terms.html#copyright.
I'd sure appreciate it if regular readers got a subscription of their own. You can sign up at http://newsletter.ask-leo.com.
Interested in advertising on Ask Leo! or in this newsletter? Advertising details here.
Newsletter contents Copyright © 2009, Leo A. Notenboom & Puget Sound Software, LLC.]]>