Tuesday, 17 November 2020

Windows Security wants your Outlook password (over and over) - SOLVED

Scenario: Outlook on your Windows 10 PC has stopped working. It continually asks for your username and password, but nothing you type will work.

You rarely want to see this, particularly on a busy day

You've tried Googling it. There is lots of advice about resetting Profiles, deleting Credentials from Windows and so in. Much of this is scary and time-consuming. Most of it doesn't work. And you need to get your work done. What should you do?

Wednesday, 8 July 2020

Blogger to WordPress URLs (permalinks)

If you have ever migrated a blog from Blogger to WordPress you might be worried that the links to your articles won't work anymore. And you would be right to be concerned.

There are lots of complicated things to pay attention to when moving a website from one hosting company or platform to another. In this article I'm going to cover the very specific issues around Blogger's handling of links vs. WordPress' approach.

Thursday, 28 May 2020

Backup Windows 10 to an encrypted drive more easily

Back up your data to an encrypted external disk for free - money-free and hassle-free.

Summary: use auto-unlock so you don't need to enter your drive's encryption password every time you use it.

Backing up your data has always been important but, with the rise of ransomware, never more so than now...

Friday, 24 November 2017

Quick Excel Tip: VLOOKUP

Excel's VLOOKUP feature lets you turn it into a sort-of database.

If you use Excel to manage projects, invoices or other tasks where you enter the same set of contact details you can semi-automate the process using a handy function called VLOOKUP.

It's extremely handy but many descriptions I've read have been a little brain-bending so here's my cheat sheet.

Friday, 6 May 2016

Certified insane: Anti-malware certifications

[Nearly ten years ago I wrote an article for Computer Shopper magazine about anti-virus (aka anti-malware) certifications. The words, along with my website, have long since shuffled off into archive.org. Here's a copy, which I think stands up pretty well even today, despite the progress that testers (including myself) have made since then.]

Saturday, 18 July 2015

How was Hacking Team hacked?

The attacker who stole Hacking Team's data gained access to an employee's computer while the victim was still logged in.

The attacker either had direct physical access to Christian Pozzi's PC or they used malware to achieve a similar level of access. Whichever way it was, we can tell that Christian was logged in at the time simply by looking at a folder name among the files that were leaked onto the internet.

Tuesday, 12 May 2015

12 computer security tips

The bad guys can try to break in using computers only or they can try to trick you into providing them with access. Or they can use a mixture of tactics. Let's consider two main types of attack:

* Technical – breaking in via computers only
* Human – tricking people into aiding the attack

For the technical attacks you might consider the following, in order of priority/effectiveness: