Leo’s Answers #292 – July 19, 2011

A Weekly Newsletter From
Ask Leo!
Leo Notenboom


Please do not reply to this email.

If you have a tech question Ask it here. Newsletter subscribers using that link go to the head of the line.

Questions about the newsletter? Check the newsletter administration page. You can also unsubscribe using the link at the bottom of this email. The latest newsletter is always available on-line at http://ask-leo.com/currentnewsletter.html, where you'll also find links to complete archives.

*** New Articles

Do all these email bounces mean I have a bot infection?

I'm getting a lot of email bounces to messages I've never sent. Does this mean my computer is infected with one of those “bots”?



It's extremely unlikely that the bounces are the result of a bot infection on your machine, or anything related to your computer at all for that matter.


Depending on the bounces that you're getting, it could mean that you have a different problem.

Or none at all.

Continue reading: Do all these email bounces mean I have a bot infection?

* * *

What are .BAK files?

When I go to empty my Recycle Bin, I notice there are a lot of files in there called “BAK files”. What are they, are they important, where do they come from & is it okay to delete them with everything else that is in there?


".BAK" files are perhaps one of the oldest file types known to computing.

That's not to say that they're all the same thing, though. Far from it. It's very likely that you have many different kinds of .BAK files.

It all starts with the fact that BAK is short for BAcKup.

I'll describe where they come from.

Continue reading: What are .BAK files?

* * *

What are these “no media”, “removable” drives on my system?

I purchased your ebook “Maintaining Windows XP”. I was working in the “The Opportunities” section on page 82. When I opened up my Disk Management, I found that I have several disks two through six, also labeled “Removable E through G”, with “no media” associated with them. I'm wondering what to do with them. I have my main disk C as well as one disk associated with my external hard drive labeled "My Book (M:)" and another disk associated with the program “WD SmartWare (L:)”. The layout on all of three is Partition and the Type is Basic. The SmartWare is a program that came with my external drive.


I have drives like those on my machine: drive letters set aside and listed as "no media".

But in my case at least, they're there for a reason and the answer on what to do with them is simple:


Continue reading: What are these "no media", "removable" drives on my system?

* * *

What's the best way to bank online using a dedicated machine?

I am wary of using online banking and brokerage services, but I would like to use them for the convenience. With basic notebook computers now costing $300 and less, I am thinking of getting one to be used solely for financial transactions. No emailing, browsing, Facebooking, etc. Ideally, I want it to connect only to a short list of financial websites and have no contact in or out with any others. What would be the best way to do this? What other safety measures should I use? After all, it is one thing to have an email account hacked, but my retirement account is something else again.


There are a number of approaches that you can take - getting a dedicated machine is certainly one.

There are a variety of thoughts on how best to do this. Most add at least a layer of inconvenience and some become downright impractical, at least to me.

Much, of course, depends on your own level of concern and realistic confidence in your own abilities.

Continue reading: What's the best way to bank online using a dedicated machine?

* * *

Virtual Machines - What Are They?

Virtual machines are a way to run a computer-within-a-computer. It's a technology that I use frequently and specifically to set up clean machines for use in my webinars.

In this video excerpt from an Ask Leo! webinar, I'll talk a little about virtual machines, show you a few things about them, and generally go on about how cool I think they are. Smile

Continue reading: Virtual Machines - What Are They?

* * *

*** Our Sponsor


Sick of the same tired, stupid old jokes people e-mail around
like the flu? This is True's stories are new every week --
and free! Bizarre-but-true news briefs with off-the-wall
commentary by "The Jay Leno of Cyberspace" (L.A. Times).

Advertisement. Ask Leo about advertising here.

*** Last Week's Articles

*** Comments

What's the fastest safe way to abort a malware download?

Mike Noonan writes:

Seems obvious, but following your lead, I simply put a shortcut to the Local Area Connection icon on my desktop. Now it's just one right-click and a click away from disabling the connection


Webinar #1: Is this thing on?

Rick writes:

Like you, I missed the Quick Launch. Using your method, I deleted toolbar name, inserted a MyDocs shortcut, then shortcuts to folders containing my most frequently used programs. I left the MyDocs shortcut exposed, so one click opens MyDocs. Single-clicking on the >> brings up the Shortcut folders, and a hover opens the correct one for a single-click to open my program. So two clicks to get what I need is better than using the Start menu most of the time, the old quick launch bar, and particularly explorer/libraries, which is what I have been doing. (I keep an empty desktop, but even having the links there usually involves more work.) Thanks for the tip.


How do I send a .exe file if Gmail won't let me?

Glenn P. writes:

Leo, you wrote:

"Actually, it may not. Password protecting the zip doesn't hide the list of files contained in the zip, and if Gmail uses the filename only, then it has what it need to determine that there's a .exe in it - passworded or not."

Indeed. Zipfiles list their contents in a header, which serves as a "table of contents". This isn't necessarily encrypted.

If this proves to be an issue, first unencrypt the zipfile if it was encrypted (as encrypting it didn't hide the filenames) and rezip it unencrypted. (If it wasn't encrypted to begin with, then obviously there's no need to rezip.)

Next, zip the first zipfile inside a second, encrypted zipfile. This second zipfile should encrypt everything within it, this time including the filenames within the first zipfile, which aren't a "table of contents" anymore, but are now simply file data.

A lot of trouble, I know -- but it should work...!


If I have all the recommended security in place, is my computer safe and un-hackable?

Mike writes:

Nothing is completely safe. Period. Ever. Do you still look both ways before crossing the street? All clear? Until you step out and some car comes careening 50mph around the corner. Okay, sure, that's rare, but it does happen. Mostly you're safe, but not "completely". You put locks on your home. But they can break the window. You install a burglar alarm, but they might defeat it. You get a watchdog, but some burglars have a way with dogs. Each step improves your security and reduces the risk. Most people sleep pretty well at night and their security is good. But break-ins still happen. Nobody is "completely safe."

You do what you can, and that's usually pretty good. And that's the key; DOING something. Not just hoping. There are no guarantees, only assurances that your risk is substantially reduced.


Securing Your Router

jhosil writes:

Very interesting...except that there is no information as to where I can locate the router software. In short, where do I start?

With the manual for your router. This differs from manufacturer to manufacturer. Mine was an example - the software exists on the router and you access it using your web browser as demonstrated in the video. Your specifics will vary based on what router you have, so the place to start is with that router's documentation.


*** Leo Recommends

7-zip file archiving utility

Most of you are probably familiar with "ZIP" files, which are compressed archives that pack one or more files into a single file. ZIP files are often a convenient way to distribute large numbers of files and folder structures in a single container.

You're probably also familiar with Windows somewhat cumbersome built-in support for ZIP files, as well as WinZIP, the shareware file compression utility that lets you create and extract files from ZIP formatted archives.

7-zip is a free, open-source utility roughly equivalent to WinZIP, that includes support for multiple file formats as well as a command-line interface.

I highly recommend 7-zip.

Continue reading: 7-zip file archiving utility


Each week, I recommend a specific product or resource that I've found valuable and that I think you may as well. What does my recommendation mean?

*** Popular Articles

In the years since this article was written, the answer appears to be 'no' more often than it is 'yes'.

Can I move my system drive to another computer and have it work?

I would like your take on installing a C: hard drive from one computer into another computer. Would that computer boot up normally with the C: hard drive from another machine?

This is a classic case of "maybe".

Ultimately, it might work and it might not. Or something in between.

It depends on how similar the two machines are.

Continue reading...
Can I move my system drive to another computer and have it work?

*** Thoughts and Comments

I'm asked the occasional Mac question or asked if I even take Mac or Apple-related questions.

Kinda, sorta.

I do have a MacBook, but it sits unused most of the time. While many of the questions and answers here on Ask Leo! are not platform specific and apply equally well to all personal computers, there's clearly a bias towards Windows and Windows-related problems simply because that's where my greatest expertise lies.

However, I do have friends. (Honest!)

I've recommended MacMost before. Gary Rosenzweig runs what he bills as a site dedicated to "Mac, iPhone, iPad, iPod and Apple TV Help and Tutorials". The most obvious thing that you'll find when you arrive is his video podcast, but dig a little deeper and you'll find the MacMost forum, a great place to find and ask Mac-specific questions and answers.

Another resource that I've mentioned here before is run by another friend of mine, Steve Loyola, called Mac Help for Mom. It started just like it sounds: his mom got a Mac and occasionally asked Steve for help. Steve started recording videos of his answers and now posts them on this site. It's great if you feel like you're in the less than computer-savvy crowd. Naturally, he's taking questions from more than just his mom these days and has added a weekly newsletter (what a great idea! Smile) as well. Hop on over to Mac Help for Mom and let Steve's mom (she's real - it's no gimmick) tell you more.

'till next week...

Leo A. Notenboom
Twitter - Facebook

*** Administration

Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at http://newsletter.ask-leo.com for their own FREE subscription!

Newsletter Subscriber Benefits (only mentioned here)

  • Visit http://ask-leo.com/subscriber to submit your comments and questions and get to the top of the question queue.
  • Coupon code NEWS20 gets you 20% off everything in the Puget Sound Software Store, where you'll find my ebooks and other Ask Leo! related merchandise. That coupon code changes from time to time, so be sure to check here each week.

Need more help with or have questions about the newsletter? Check out the newsletter administration page.

Newsletter contents Copyright © 2011,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC

Posted: July 19, 2011 in: 2011
Shortlink: https://newsletter.askleo.com/4880
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.

My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.