A Weekly Newsletter From
- This Week's New Articles on Ask Leo!
- A Word from our Sponsor
- Popular Articles from the Archives
- Thoughts and Comments
- Newsletter Administration
*** This Week's New Articles on Ask Leo!
How can I tell if my email has been blocked?
How can I tell if my email address has been blocked? The email address I send to is good and working, the only problem is, it's not working for me; have I been blocked? Is there any way of knowing if my emails ever get opened or deleted? And if I'm blocked, it is my email address that's blocked or my IP address?
The ultra-short answer is: there's just no way to know for sure.
Let's look at why I say that.
Continue reading: "How can
I tell if my email has been blocked?"
* * *
Can I get Internet Explorer 7 without using Windows Automatic Update? And should I?
Now that IE7 is available to XP users without the Windows Genuine Advantage check a number of my friends want to try it out on their Win-XP Home or XP-Pro.
I understand you need to turn on windows auto update. This has a lot of people concerned that they may get more than they bargained for, myself included. This stems from the recent microsoft 'stealth' updates a few weeks back I think.
My question! Is there a way to get IE7 without turning on the auto update? Can you run IE7 next to or with IE6 on the same machine?
Taking your questions in reverse order:
Let me expand on each of those.
"Can I get Internet Explorer 7 without using Windows Automatic Update? And
* * *
How can I tell if my computer's been accessed by someone else, and how do I prevent it?
How can I tell if my flatmates have accessed or are accessing my computer? We have a BT homehub and we share the connection wirelessly, but I have the Norton firewall on. I don't know if the firewall only protects my computer from the intruders outside our network. I've heard it's easy for other people sharing the same wireless network to sneak into each others' computers. How is it done and how can I prevent it?
Let's see, you're worried about outside intruders accessing your system, you're worried about your privacy, and you're worried about your wireless connection.
What you've just described is the internet itself but just on a smaller scale.
It should be no surprise then that many of the concepts that used to protect ourselves from the people we don't know out on the internet would be used to protect ourselves from the people we do know sharing our internet connection.
"How can I tell if my computer's been accessed by someone else, and how do I
* * *
Does a file's name matter?
If you download a file (say, an update for your video card drivers), and change the name from, say "xxx123.45.exe" to "vidcardupd1", will the program still install/run properly, or does renaming the filename affect the actual program itself?
Changing the filename certainly doesn't change what the file is or does, but doing so it can prevent Windows from knowing what to do with it.
I know I regularly rename downloads.
Let's review some guidelines.
Continue reading: "Does a file's name
* * *
Where's my disk space going?
Under your previous question "How can I tell what's taking up so much disk space?" I ran chkdsk /f and this ran but didn't free up any space? Then I downloaded diruse and this wouldn't run? I wondered if you could please help me further? Our disc drive is split into a C and a D drive which both have between 30 and 40 gig on each, we only ever save on the D drive, however the C drive is up to about 31.9 Gig with 540 meg left available! Apart from about 5 gig of photo's I can't understand what is taking up all the memory? The memory seems to continually go down and is now getting to a critical level. I have run spyware and adware checks and deleted all critical errors, but still not been able to free up any memory. I can't even defrag as I need 20% free to run this option.
I wanted to revisit the "what's taking disk space" issue so I could recommend a tool that might be better for most people than the command line tool diruse I recommended in that previous article.
However this question also gives me an opportunity to clear up some misconceptions and some terms that don't mean what you think they mean.
Continue reading: "Where's my disk space
* * *
Why am I not getting asked additional security questions when I expect them?
Lately, even if all cookies have been deleted, my online banking site doesn't bother to ask me my security questions but goes straight to the password entry screen. If I logon from a different machine, however, it does ask the security questions. This also seems to happen with the site of my credit card company. What could possibly be causing this?
Sitekey is a technique being used by many financial institutions as a way of more securely making sure you are who you say you are when you login. They claim that it's stronger security, however some security experts disagree with that assessment.
Stronger or not, it's there. How it works and how it decides to ask you your additional questions is all kind of mysterious.
To start with, your question implies an assumption; an assumption that may not be true.
"Why am I not getting asked additional security questions when I expect
* * *
Windows tries to be helpful again.My machine had slowed to a crawl. Why? Windows was "helping"!
Continue reading: "Windows tries to
be helpful again."
*** A Word from our Sponsor
Forget Vista! Speed Up Your XP
Is your PC getting slow? Run our free Optimize scan to find out how to
fine-tune your Internet and System settings. Identify registry cobwebs
and get rid of hard drive clutter. Over time, everyday use of your PC
will slow down performance. Optimize is an exciting software program
that automatically diagnoses your PC and gives you a custom report
detailing every issue hurting your PC's performance: Scan Now!
Advertisement. Ask Leo about advertising here.
*** Popular Articles from the Archives
Three years ago I was faced with seriously infected machine belonging to one of my in-laws. Here's the story:
This computer's infested, what do I do?
There's no one answer to this question, because virus and malware infestations can be so insidious and so different from machine to machine. However, it might be helpful to walk through a real life example.
You see, this article's question was one I asked myself when I started looking at my brother-in-law's machine.
So this article will be less of an "answer", and more of an example of what recovery looks like as I walk through the steps I took.
Read more... This computer's
infested, what do I do?
*** Thoughts and Comments
Ever have one of those days?
I wrote up a nice new article earlier today, and was searching around on my site for related articles to include in the "related links" section. I do that much like I hope most readers do: by using the Google site-search box that's on every page.
The first result was a great article that I'd written earlier this year. On the same topic. Saying pretty much the exact same things. Rendering my new version kinda pointless.
I may not remember everything I've written (with 1,300+ entries on the site right now I can't really be surprised), but at least I appear to be consistent.
In case you're interested the article from earlier this year: What's NAS? How do I go about setting one up?. The new version I wrote today? That went into the bit bucket.
Oh, well. I think I've said it here before: I really need to search my own site before I start writing.
'till next time...
* * *
Some of Leo's other sites: The Ask Leo! Store, Leo's Online Business Card, Taming Email, MovableType Tips, Leo's Blog, Buy Leo a Latte, Buy Leo a Beer, A Letter To Myself, Dolls and Friends, Corgwn.com
*** Newsletter Administration
Do you have a question? A comment, perhaps? Newsletter subscribers can visit http://ask-leo.com/askleosubscriber.html to submit your comments and questions. That page is only mentioned here, so I'll know it's from someone who's taken the time to read this far!
I'll be honest: I'll try to respond, but I get a lot of questions every day - I just can't answer everyone. Rest assured, though, that even if you don't hear from me directly, every email gets read.
Leo's Answers Newsletter is a weekly publication of Ask Leo! and Leo A. Notenboom. It's also available as an RSS feed at this URL: http://ask-leo.com/newsletter.xml. Archives of previous newsletter issues can be found on the Ask Leo! web site, http://ask-leo.com/newsletter.html.
You're quite welcome to forward this email in its entirety, but you should probably delete your unsubscribe link below, so your friends don't unsubscribe you by accident. You may forward individual articles from this newsletter only if you include all and only the text of that article as found in this newsletter, including any links therein. You may not copy full articles from the Ask Leo! website - more on that in my section on copyright: http://ask-leo.com/terms.html#copyright.
I'd sure appreciate it if regular readers got a subscription of their own. You can sign up at http://newsletter.ask-leo.com.
Interested in advertising on Ask Leo! or in this newsletter? Advertising details here.
Newsletter contents Copyright © 2007, Leo A. Notenboom & Puget Sound Software, LLC.