A Weekly Newsletter From
I would kiss you if I could ...
If you're having problems with the formatting of this newsletter in email it's always available on the web here: http://ask-leo.com/currentnewsletter.html
Do you know someone who could use this newsletter? Forward it! (See below for details.)
Did someone forward this to you? Get Leo's Answers direct in your own inbox every week.
*** This Week's New Articles on Ask Leo!
Did someone really send me photos on Tagged?
This is less of a question than it is a warning about what many believe is malware or a scam, but is more closely related to simply super-aggressive and perhaps deceitful attempts to hook you in to some kind of social network.
No, no one sent you pictures on Tagged, and contrary to the "they may think you said no" guilt-trip, it's more likely that they had no idea that the email was sent in their name.
And likely without there knowledge (though whether or not it was with their "permission" is one for the lawyers to figure out).
And yes, as I understand it, lawyers have become involved.
Continue reading: "Did someone really send me photos on Tagged?"
* * *
Can I tell when someone logged into my machine, and what they did?
I suspect that somebody has attempted to access my computer when I was thoughtless enough to leave it physically unsecured for some time. (I've now read your article on securing and will comply in the future.) Is there any way of checking to see times and dates of when the computer was booted and if files have been copied off your computer? Date and time of when the file in question was copied last, if at all? I know when the laptop (Dell Inspiron 9100) was unsecured so if this type of information is logged somewhere on the (C:) or elsewhere I'd be able to know if someone other than myself used my computer.
Yes, we can probably tell when your computer was booted, and even when it was logged into.
But no, we can't tell what that person did once they were logged in; at least not to the granularity that you're looking for.
Continue reading: "Can I tell when someone logged into my machine, and what they did?"
* * *
Why do some web pages not update like they should?
Every once and a while after I visit a website (such as MLB.com and NASDAQ.com) when I go back to it old information comes up on the website. For instance, I went to MLB.com a week ago and now every time I go the scores, news stories, stats, etc. will all be from that day a week ago. Certain pieces of info on the website are current and sometimes clicking a link will bring up current info, but most is old. I clear the browser, delete history, cookies, etc. but no luck. The only thing that solves the problem is running defrag, but only temporarily, as soon the issue will reoccur. It only seems to happen on one of my 3 computers. Any ideas?
What you're experiencing isn't all that uncommon, though its persistence through the steps you've taken to clear it up is. The fact that defragging has an impact is completely mysterious.
Let's look at what happens under the hood, what steps we would normally take to clear it up, and then make some guesses as to what else you might try.
Continue reading: "Why do some web pages not update like they should?"
* * *
How do I determine the subnet mask I'm supposed to use?
How do I find my subnet mask number. I'm trying to log onto my router and I need my subnet mask number, gateway, dns 1 and dns 2 numbers.
I'm guessing you're not actually trying to logon to your router, but rather configuring your router so that you can use the connection to the internet provided by your ISP.
Exactly how we do what we do next depends on the specific router, so I'll use mine as an example.
But here's a hint: none of it depends on knowing a subnet.
Continue reading: "How do I determine the subnet mask I'm supposed to use?"
* * *
Why do I get "This operation is canceled due to restrictions in effect on this computer"?
For the past several weeks I have been getting a notice every time I try to open a link that is within an email. "This operation is canceled due to restrictions in effect on this computer. Contact your systems administrator". I am the systems administrator and I must have changed something, but I cannot figure where to reverse this error. I am running Vista Home Premium, Norton InternetSecurity with 4GB of RAM and a 320 GB Hard Drive on my system.
This is a very common error these days, and manifests in various situations.
It's not something you did, per se, but in all likelihood it is something you allowed to happen.
And it's not good.
* * *
How much can people find out from a photo I email them?
I am curious: how much information is made available to someone if I send a photo through email (if any at all)? For example, if I attach a photo through a provider such as Yahoo!, can the receiver of that photo find out any information about my computer or me? I know my IP address is viewable in the email - but I am curious about the photo.
More than you think, but most of it's pretty boring. And none of it is about the computer.
I'll set aside the obvious fact that whatever's in the photo is part of what you're sharing. That's the point, after all.
But modern digital photos often include a lot of additional information you might not realize is present.
Continue reading: "How much can people find out from a photo I email them?"
*** A Word from our Sponsor
Free Printables for
Instantly print cards, gift tags, coloring pages and more for Father's Day.
Dozens of free designs, including "World's Best Dad" certificates!
Advertisement. Ask Leo about advertising here.
*** Featured Comments
A sampling of some of the comments that have been posted recently on Ask Leo!
* * *
One of the things to remember about making full image copies, if you use full disk encryption (getting more and more popular on laptops), the current generation of image making software doesn't work (at least all the ones I've tried failed).
I wouldn't have thought of that, but on reflection it's good to know. It's a good idea to test backup strategies before you need them to make sure they work.
Jay Dishong writes:
One concern I had with the reader's question is that even if he does successfully create an image of his current system, he appears to want to transfer this to a new PC in the near future. This could be disastrous to the new PC as it would likely wipe out any drivers or other special utilities, apps, etc., that came with the new PC.
Absolutely, there are definitely limitations with this approach. It serves as a good backup strategy, but fails in many cases for migration.
I agree with your emphasis on protecting against data loss by regularly backing up data and/or by imaging the HDD. As you reported recently, recovering a computer in the event of a HDD failure may be impossible if you only have a manufactures recovery CD and do not have a full Windows CD. Imaging for that near certain eventuality has saved my butt several times.
Another good solution for me is "snapshot" software like AyRecovery and RollBack RX Pro, both of which I have purchased. These do not protect against HDD failure but I find them invaluable for other purposes. There primary purpose is to allow you to "rollback" the computer to a earlier time in the event you loss data, pick up a virus, etc. Also, when adding new software or doing major changes you can take a snapshot before making changes and if you are dissatisfied or run into a problem you can restore the snapshot and be right back to the point before the changes were made. These applications are somewhat similar to the old Norton GoBack, but with far greater capability.
*** Leo Recommends
Make FTP connections appear as virtual drives.
If you do anything on the web, particularly things like web development or other types of website maintenance, you're probably aware of "FTP" or File Transfer Protocol. The FTP protocol, and its sibling SFTP (Secure FTP), are two of the quiet workhorses of pushing bits around the internet.
The current traditional approach to dealing with file transfers via FTP is to use a graphical utility such as FileZilla, CuteFTP, WinSCP or others, and then drag-and-drop files to and from the remote site. The previous approach was to use the "ftp" program to perform the same operations at the command line.
I've become addicted to WebDrive which allows you to do both and much, much more, by simply making a FTP connection appear as a virtual disk drive on your machine.
That's an incredibly simple approach that enables a world of flexibility.
WebDrive - Make FTP connections appear as virtual drives.
Each week I recommend a specific product or resource that I've found valuable and that I think you may as well. What does my recommendation mean?
*** Popular Articles from the Archives
Getting information onto the web is actually fairly easy. Removing information from the web is darned near impossible. That lead me to ask:
Googled Yourself Lately?
Do you know what the internet says about you? And would you want your mother, or your boss, to see?
I occasionally get questions from people that boil down to: "how do I remove myself from search engine results?" The answer of course is track down every site that mentions you, convince each of those to remove you from their content, and wait 3 to 6 months for the search engines to re-index. Even then, there are sites and archives and search engines that didn't remove you, won't remove you, or just don't care.
So when you Google yourself, do you like what you see?
Googled Yourself Lately?
*** Sites of Interest
Reader Barbara sends in:
I have fun with computers and my friends were asking all the time for help so I decided why not charge for my services. Because of my price I am able to help the elderly and differently abled. I find it very rewarding. It feels good to teach them how to use their computers better and how to stay away from malware.
As you can imagine, I like hear from people who are helping others, in particular those who are making it easier for more people to connect, I agree with Barbara - it can be very rewarding.
Full disclosure: there was never any doubt that I would, but it kinda hurts to publish Barbara's site.
Why? It's a fine, fine site, with good information on it, but it propagates one of my biggest pet peeves: "Puter" is not word! Neither is the slightly less incorrect 'puter.
It's a computer. Always.
The word (that's not a word) "puter" just makes me cringe. (And seeing the responses to having tweeted that a while back, I know I'm not alone.) I know, it's a personal thing, but I just had to get it off my chest.
Sites of Interest are just that: sites I find interesting and just want to share. (Not an endorsement or guarantee.) If you have a suggestion or a website of your own that you think might be interesting use the regular ask a question form to suggest it. (Of course I can't guarantee I'll use your suggestion, I simply get too many.)
*** Thoughts and Comments
OK, I admit it. I screwed up.
Last week I asked if you would go fill out a one-question survey for me.
The lesson I learned was this: check out the limitations before using a free survey service. Sending out a request to 70,000+ people, when the survey will only accept 100 answers before closing down is just wrong.
And yes, the irony of my getting bitten by a free service, when I regularly rail against relying heavily on free services for important things like email isn't lost on me either. I was lazy.
What I should have done is implemented the survey technology myself, and that's what I've done.
So, to the 100 of you who made it in: thank you very much.
To the additional folks that also made it in after my mad scramble to replace the free service: thank you very much.
To those of you who tried, but were locked out: I apologize.
The (new, unlimited, and totally in my control) survey is still up at the original link here. I'd very much appreciate your feedback. This time I'll close the survey on schedule, on Saturday.
"When you take shortcuts in life, life
will cut you short."
In great news, the feedback I've been getting from the surveys I've received from people who made it in has been absolutely fantastic. I can't tell you how much I appreciate it. In fact there's been one change made already, as the survey somewhat confirmed my gut instincts on something.
I'll start sharing some of the results next week after more of you have had an opportunity to weigh in.
'till next time...
What I'm Reading
A great companion to "Brain Rules", this book give lots of insight on how irrational, or rather emotional, our decision making process really is, and why it often is exactly the right thing to "trust your gut".
More of what I've been reading in
* * *
*** Newsletter Administration
Do you have a question? A comment, perhaps? Visit http://ask-leo.com/ask to submit your questions.
I'll be honest: I'll try to respond, but I get a lot of questions every day - I just can't answer everyone. Rest assured, though, that even if you don't hear from me directly, every email gets read.
Leo's Answers Newsletter is a weekly publication of Ask Leo! and Leo A. Notenboom. It's also available as an RSS feed at this URL: http://ask-leo.com/newsletter.xml. Archives of previous newsletter issues can be found on the Ask Leo! web site, http://ask-leo.com/newsletter.html.
Forward Me! You're quite welcome to forward this email in its entirety; it's a great way to help Ask Leo! grow. But you should probably delete your unsubscribe link below, so your friends don't unsubscribe you by accident.
You may forward individual articles from this newsletter only if you include all and only the text of that article as found in this newsletter, including any links therein. You may not copy full articles from the Ask Leo! website - more on that in my section on copyright: http://ask-leo.com/terms.html#copyright.
I'd sure appreciate it if regular readers got a subscription of their own. You can sign up at http://newsletter.ask-leo.com.
Interested in advertising on Ask Leo! or in this newsletter? Advertising details here.
Newsletter contents Copyright © 2009, Leo A. Notenboom & Puget Sound Software, LLC.]]>