Leo’s Answers #65 – February 16, 2007

Leo's Answers
A Weekly Newsletter From
Ask Leo!
Leo Notenboom


*** Contents

*** This Week's New Articles on Ask Leo!

How do I fix a cyclic redundancy check error when I try to copy a file?

Outlook started acting up, so as part of my attempts to fix it I tried to copy the PST to another location. The copy failed part way through with a cyclic redundancy check error. How can I get past this and backup my data?

The cyclic redundancy check or "CRC" error indicates a bad spot on your hard drive. The fact that you're seeing it when you try to copy a file indicates that the bad spot may be within the file itself.

We need to verify that, and then we need to try to recovery your file and repair your hard drive.

Continue reading: "How do I fix a cyclic redundancy check error when I try to copy a file?"

* * *

Can I mark my files so that they can be read, but not copied?

I want to put data on a disk only for people to read and not for them to be able to copy. I'd like to do this for email as well. How can I do this?

No, this question didn't come from the MPAA, or the RIAA, but it certainly seems like they've been asking the same question lately. How do you create content, be it MP3's, movies, or just random data for business purposes, that can be used, but not copied.

That's right, we're talking copy-protection and digital rights management here.

My opinion? It's a lost cause.

Continue reading: "Can I mark my files so that they can be read, but not copied?"

* * *

How do I get a .reg file to install?

I'm trying to register a software program. The company sent me a regkey.reg file that when clicked on creates a registry item that tells the program that it's a registered application.

When I click on the regkey.reg file, it doesn't run, instead the file opens in notepad.

How do I get my software registered.

There are a few ways to accomplish this, including making the ".reg" extension do the right thing. (Though we may elect not to, for security reasons as we'll see in a minute.)

I also want to clear up a confusion that some readers may have - software registration and "the registry" are two different things.

Continue reading: "How do I get a .reg file to install?"

* * *

How do I get rid of the Quicktime Icon in the Windows System Tray?

Every time I turn on my computer, I get the Quicktime Icon in the system tray. I ran MS Config and unchecked the line labeled "qttask" and rebooted but in a few days it comes back. What can I do to stop it once and for all from appearing in the system tray?

I feel your pain.

This is a clear case of an application vendor thinking they know what's best for us, regardless of what we really, really want.

Continue reading: "How do I get rid of the Quicktime Icon in the Windows System Tray?"

* * *

Does email coming from the same IP address imply that it was the same computer?

I have Hotmail and I've been getting nasty e-mails from somebody who I do not know. I figured out how to view the headers and try trace the IP addresses. As I was doing some trial and error from the X-Originating-IP addresses from people on my list, I noticed that one of my friends has the EXACT same X-Originating-IP address from the one I've been getting my nasty e-mails from. Is my old friend sending me nasty e-mails off of the same computer but through different e-mails? If it helps, there both Hotmail accounts. Thank you in advance for your help and assistance.

Of course he could be, but the IP address doesn't prove it.

There are several reasons that a single IP address could be used by several different computers.

Continue reading: "Does email coming from the same IP address imply that it was the same computer?"

* * *

Why am I getting email addressed to someone else?

I've received about six messages in my Hotmail account that actually had another person's email address in the "To" field rather than mine. All six of these account names have been fairly similar to mine (i.e. semiactualaddress@hotmail.com, rather than actualaddress@hotmail.com) My question is why did I receive these emails since they were not even sent to my actual email address? Is this something I should worry about? I've never heard of anything like it...

If you've never seen this before, consider yourself very lucky.

The good news is that it's nothing to worry about.

The bad news is that it's very common.

What you're seeing, in a word, is spam.

Continue reading: "Why am I getting email addressed to someone else?"

* * *

Identity Theft of Another Form

Cyber Bullying often involves an all too common problem: a much easier form of identity theft.

Continue reading: "Identity Theft of Another Form" Article Includes Audio

*** A Word from our Sponsor


Send FREE FAXES from your web browser to anywhere in the US or Canada


Advertisement. Ask Leo about advertising here.

*** Popular Articles from the Archives

Here's one from a couple of years ago that I think we all end up asking ourselves from time to time.

Why does email bounce?

Sometimes my email bounces. Every so often I'll send a message, and a short time later I'll receive a reply saying that the email failed to go through. Why does it happen? And how do I fix it?

Well, I'm afraid that there are many reasons mail could bounce. In fact there are so many ways it could fail that sometimes I'm amazed that it works at all. But it definitely works most of the time, and one of the ways it works is that very bounce message you get.

You see, there's gold in that bounce message. It's not only telling you that your message didn't go through, but if you look a little closer, you'll see it's trying to tell you why.

Read more... Why does email bounce?

*** Thoughts and Comments

Another blatant plug this week, but this time it's not tech related at all. Another good friend of mine, Tim Carter, is the man behind Ask The Builder - a Q&A site, much like Ask Leo!, focused on do-it-yourself home improvement. Tim's got his own channel up on YouTube: http://www.youtube.com/askthebuilder. He's a fun guy to watch, and if you're into home improvement at all, he presents a wealth of information. Check it out, and subscribe to his channel while you're there!

Speaking of friends, I'll be appearing on the February 19th episode of Anne Mitchell's podcast Three Things You Should Know. I'll be answering questions (of course!) about Internet Explorer 7. Have a listen!

This week I was catching up on listening to the highly recommended Security Now podcast with Steve Gibson and Leo Laporte ("the other Leo", as I like to call him :-). A hot topic of the last few weeks has been the new Digital Rights Management infrastructure incorporated into Windows Vista. In order to be able to play the new high definition HD-DVD and Blu-ray DVDs, Vista has had to incorporate a ton of new DRM, encryption and content protection.

It's complex, a little frightening, and very fascinating.

A lot of people will, of course, blame Microsoft - many already have. In reality, much of the complexity is mandated by the content providers. Any platform, Windows or not, will have to incorporate similar complexity if they want to play these new types of protected content. And on top of that, so will hardware manufacturers. Basically if Microsoft wants Windows Vista to be able to play this new media at all they had no choice but to implement the required security.

I mention all this because it was rather timely with respect to a question that came in, listed above Can I mark my files so that they can be read, but not copied?. That's basically the same question that the record and movie industry has been asking for years. They don't get it, yet, but the answer is "no". :-).

In fact, in an even better coincidence, news reports surfaced this week also that the complex encryption and DRM for HD-DVD and Blu-ray had already been cracked.

I'm really not surprised.

'till next time...


* * *

The Latest:
Forwarded Funnies: "Living it Up, Down South"
Taming Email: "Email is never urgent. Really."
Leo's MovableType Tips: "Leaving Breadcrumbs in Movable Type"

*** Newsletter Administration

Do you have a question? A comment, perhaps? Newsletter subscribers can visit http://ask-leo.com/askleosubscriber.html to submit your comments and questions. That page is only mentioned here, so I'll know it's from someone who's taken the time to read this far!

I'll be honest: I'll try to respond, but I get a lot of questions every day - I just can't answer everyone. Rest assured, though, that even if you don't hear from me directly, I read every email I get.

Leo's Answers Newsletter is a weekly publication of Ask Leo! and Leo A. Notenboom. It's also available as an RSS feed at this URL: http://ask-leo.com/newsletter.xml?UD=nl. Archives of previous newsletter issues can be found on the Ask Leo! web site, http://ask-leo.com/newsletter.html.

You're quite welcome to forward this email in its entirety, but you should probably delete your unsubscribe link below, so your friends don't unsubscribe you by accident. You may forward individual articles from this newsletter only if you include all and only the text of that article as found in this newsletter, including any links therein. You may not copy full articles from the Ask Leo! website - more on that in my section on copyright: http://ask-leo.com/terms.html#copyright.

I'd sure appreciate it if regular readers got a subscription of their own. You can sign up at http://newsletter.ask-leo.com.

Newsletter contents Copyright © 2007, Leo A. Notenboom & Puget Sound Software, LLC.

Posted: February 16, 2007 in: 2007
Shortlink: https://newsletter.askleo.com/2936
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.

My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.

1 thought on “Leo’s Answers #65 – February 16, 2007”

  1. Hi Leo

    Hw ru?
    ur answers are super, sir keep it up sir please sir keep sending the answers and me too want learn from u a lot

    thanks and regrds

Comments are closed.