Leo’s Answers #266 – January 18, 2011

Ask Leo!

A Weekly Newsletter From
Ask Leo!
Leo Notenboom


Do you have a tech question? Ask it here. Newsletter questions? Check the newsletter administration page. You can also unsubscribe using the link at the bottom of this email.

*** New Articles

How do spammers know what sites I visit?

I have noticed that I am getting spams related to websites I access frequently. That is, if I am accessing my bank account online, or pay bills online, spams asking for passwords, security etc., are received. My question is, how do spammers know of the sites I visit. And how do I make my online transactions safe, and hidden from spammers.


My initial reaction is to say: they don't. And in most cases I'm going to stick with that as the most likely answer.


There are a few exceptions where you might get spam related to your visits. Some are benign, but others might be a sign of problems on your computer.

Continue reading: How do spammers know what sites I visit?

* * *

Why does nothing happen when I insert a disc?

I use an e system computer, Windows and Microsoft. For some reason I cannot play discs any more, I place a disc in and nothing happens, could you please advise me.


As inconvenient as it may seem, this is really a good thing.

What's most likely happened is that the "auto run" feature has been turned off - either on your system or on that specific drive. That means that by definition nothing happens when you insert a disc.

The reason that's a good thing is that autorun is one way - one very effective way - that malware can spread; you unsuspectingly insert a USB stick or malicious CD or DVD and without your needing to do anything else malware is automatically run and infects your machine.

So rather than making it easier for hackers to spread malware to your machine, let's look at what you can do instead.

Continue reading: Why does nothing happen when I insert a disc?

* * *

Why is my C: drive filling up even though I install programs on D:?

I am using the trial version of Windows 7 Enterprise 64 bits. I installed the operating system on a 50GB partition, and all other applications on a separate 50GB partition, the remaining space of my 320GB hard drive is for data (word documents, audio and video files, etc). Initially, after installation, windows 7 uses around 20 GB of the partition. But after installing all the applications softwares (Microsoft Office 2010 trial, Adobe CS4, etc) the space available on drive C is only about 15 GB. Can you please explain to me why and how to avoid this situation.


I'm not terribly surprised.

One probable reason is that the system drive (typically the C: drive) is special.

However, there are a couple of other things that could be going on as well.

I'll review a few possible causes, and which of those you can control.

Continue reading: Why is my C: drive filling up even though I install programs on D:?

* * *

Am I at risk for Internet Explorer vulnerabilities even though I use a different browser?

I keep seeing where hijacking, vulnerabilities, infections, etc., of various applications are prevalent. The latest one is another IE vulnerability; among other things. I believe there is a manual work-around for IE but no patch has been issued. I have IE8 installed. I use primarily Firefox (v3.6.13). My question is this ... am I still vulnerable to attach(s) although I do not use IE8; or whichever application may be installed on my computer? Thanks and good work!


In general if you don't have or use a particular piece of software then you can safely ignore the updates and or vulnerability notifications that you might run across.

In general.

Internet Explorer, on the other hand, is a special case. Use it or not, you must keep it up to date.

Continue reading: Am I at risk for Internet Explorer vulnerabilities even though I use a different browser?

* * *

What is a "questionable" or "suspicious" website?

So just what is a "questionable" or "suspicious" website?


It's not uncommon for computer support people such as myself to admonish computer users to never visit questionable or suspicious websites, as they're often a source of malware, scams and other bad things.

But just what does that mean?

Yes. Well. Ahem.

It's kinda like an apocryphal definition once applied to pornography - it's difficult to describe, but you'll know it when you see it.

The problem is that when it comes to web sites by the time you see it, it might be too late.

Continue reading: What is a "questionable" or "suspicious" website?

*** Our Sponsor

Bluehost Web Hosting
UNLIMITED Space & Transfer
2500 POP Email Accounts - FTP, CGI, SSL, PHP
One Click install of popular packages such as WordPress, phpBB and more...
Only $6.95/month
Learn more: BlueHost Professional Web Hosting

Advertisement. Ask Leo about advertising here.

*** Comments

Why is some email to me delayed by days?

hamab8lx writes:

One of the most cogent explanations for reading headers that I have seen. Good work Leo!


Why is some email to me delayed by days?

Mike writes:

Thank you. This explains much. I realize that email was never meant to be "instant", but I always thought of it as fast, meaning within an hour or two (as opposed to snail mail). I, too, have experienced delays of even a few days before receiving an email. (I know because the sender has called me a couple days earlier to find out why I hadn't responded.) Fortunately, for me anyway, such occurrences are sporadic, last only a day or two, and quite rare. Bottom line is, it's good to know that it's nothing that the sender did wrong or I did wrong (or necessarily our ISP's), and most of the time, it's beyond control of either end.


2010 Most Popular Questions

Glenn P. writes:

I'm curious: Why won't Outlook Express work in Win7? What's the prob with it?

Microsoft simply decided to no longer support it. Personally I'm kinda glad, even though it's causing a lot of grief for people - Outlook Express has been the cause of more lost email and other problems reported here than any other email program.



Why does Windows have a registry?

zygmunt writes:

Is there a way to replace the registry "database" with something more comprehensive and logically sensible? There are many available databases that would surely suffice if tailored to suit, to rid windows of its worst "nightmare".

Only by rewriting major, major parts of Windows. And, sadly, for compatibility reasons many of the registry's worst behaviours would have to be replicated so as not to break applications. To be honest the storage media (database engine) isn't the problem, it's the overall organization of it, and that would take a major rewrite of Windows and most applications that rely on it.



What happens to my recovery partition when I upgrade Windows?

Warren writes:

Is there no way that the recovery partition can be made into a bootable disk?

In general: not that I'm aware of, no. However since each manufacturer does something different it's possible that some can, and it's further possible that that's exactly what they have you do when they suggest you make recovery didks after getting your new machine.


*** Leo Recommends

Thunderbird - A Free, Open Source, and Powerful Email Client

Mozilla's Thunderbird is my choice for email. I use it all day every day, and I can heartily recommend it as an often more powerful and capable replacement for mail programs like Outlook Express, Windows Live Mail and many other desktop email applications.

The feature list is long, but I want to call out some of my favorite features and some of the things that personally draw me to Thunderbird and cause me to make it my recommendation for almost anyone using a desktop email program.

Continue reading...

Thunderbird - A Free, Open Source, and Powerful Email Client


Each week I recommend a specific product or resource that I've found valuable and that I think you may as well. What does my recommendation mean?

*** Popular Articles

Happens every day.

My computer's infected with a virus, how do I clean it up?

As a Mom of a couple teens, I get viruses all of the time. This latest one I cannot find a solution to; here goes - my control panel is GONE! There is a popup every time I start the 'puter with the filename of "mustafx2.exe" I can't find it anywhere in English. I am using AVG, Ad Aware and Spy-Bot as well as Windows Defender. I have Windows XP version - never mind; can't look that up anymore either....UGH! Nothing has helped. Got any clues?


I have a couple of reactions to this question.

One, of course, will be the steps I'd take to try and recover in this case. I'll outline those in a second.

But first, my other reaction, which you may not like Smile.

Continue reading...
My computer's infected with a virus, how do I clean it up?

*** Thoughts and Comments

The first video segment from last months webinar has been posted to YouTube: Scheduling a Weekly Defrag in Windows XP. I've got two or three other segments that have been processed and will be uploaded shortly. (There was a lot of "stuff" waiting for me when I returned home from CES - I'm still digging myself out.)


Do you share too much?

There's a news story making the rounds lately of an individual who used publicly posted information on women's Facebook account to correctly guess password recovery information and in doing so hack their accounts.

Here's just one source of the story.

Password recovery questions are important, but they rely on being things that only you know. If you're posting that same information publicly ... well, then, you've just given away the keys to your account.

(And I won't even comment on what this guy was finding in the accounts he hacked - but it definitely qualifies as "over sharing".)

'till next week...

Leo A. Notenboom

*** Administration

Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at http://newsletter.ask-leo.com for their own FREE subscription!

Need more help with or have questions about the newsletter? Check out the newsletter administration page.

Newsletter contents Copyright © 2010,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC

Posted: January 18, 2011 in: 2011
Shortlink: https://newsletter.askleo.com/4713
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.

My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.