Begun in 1999, HeroicStories brings diverse, international voices to the world – reminding us that people are good, that individuals and individual action matter. Our mission is to publish examples of people being good to each other, to inspire similar heroic actions in others.
Woodinville, Washington

Does splitting your hard drive into two partitions makes your computer faster and backups easier? I'll share my opinion on what partitioning really does and doesn't do, and what works better.

A website you use keeps misbehaving. Clearing cookies might fix it, but you don't want to lose your sign-ins everywhere else. Good news: your browser lets you clear cookies for just one site. I'll show you how.

Your email address changed, but the website where you have an account won't let you update it. Now what?

You've got a password manager and you've done everything right. Then you encounter some website that won't let you paste your password. It's maddening. And here's the kicker: whoever designed it that way actually made the site *less* secure.

Someone's cheating on you, or maybe you just lost access to your own account. Either way, you want to hack in. Before you go looking for help in all the wrong places, let me share the truth about hacking accounts.

Power outages are a different problem than just flipping a switch, and your computer could pay the price.

Before you pull a "Zuck" and slap a sticky note over your camera, it's worth asking whether the threat is actually real.

It's not trying to annoy you, it's an important part of keeping you safe. With an extra step or click, you can easily be the administrator when needed.

Your photos capture moments you can never get back, but one lost phone or crashed hard drive could wipe them out forever. Protecting them is easier than you think. Here's a simple plan to make sure your memories are never just one accident away from gone.

You didn't ask for it, but there it is: email meant for someone else in your inbox. I'll discuss why this happens and what you can do about it.

Losing your phone can lock you out of your accounts if it's your second factor for authentication. Here's how I recovered while traveling, the backup options that saved me, and the steps you can take now so you're never stuck without access.

Passkeys are supposed to make signing in easier and safer, but what happens when it stops working or your device is gone? I'll show you what to do if your passkey fails or is lost and a technique that makes passkeys work everywhere.

Someone hacked your email and you want answers. Who did it? Where are they? Can you track them down? Here's what you should do.

Yes, your computer can get hacked even when it's fully updated. Zero-day attacks exploit vulnerabilities that your antivirus software doesn't yet know exist. I'll explain how these attacks work and what you can do to protect yourself.

Why will your computer sometimes tells you "access denied" when you're the only user? Windows has a system of administrator account types that are easy to misunderstand. I'll describe which type of account you likely have, and what the other options can and can't do.

Ever wonder why your computer shows one IP address, but websites see something totally different? They're both right. I'll describe how your router juggles two addresses behind the scenes and how that protects you every time you go online.

If you're not using a password manager, you're likely compromising your security more than necessary. Here's why using one is safer.

Your computer might be chatting with hundreds of servers right now, including sites you might not expect, without you knowing! I'll show you free tools that let you see what your machine is up to online.

A Google account includes Gmail, YouTube, and much more. If you want to keep those services separate, you'll need separate Google accounts.

Ever wondered if your Wi-Fi card can handle the latest speeds, or why it won't connect in certain places? I'll show you exactly how to check which Wi-Fi protocols your computer supports, and what those cryptic "802.11" labels actually mean.

Think you're too smart to fall for a scam? Think again. Scammers aren't targeting your intelligence; they're targeting your humanity. I'll share the sneaky mind tricks they use every day and help you spot the red flags before it's too late.

It's important to understand the risks of buying a used computer.

Keyboard not working, but you need to type to sign in to Windows? There's a solution for that.

Worried your sleeping computer might get hacked? The short answer is no, but there's a catch. I'll explain what that is and why you're still probably safer than you think with basic security in place.

Technology isn't optional anymore. I'll explain why embracing computer literacy matters more than ever, and how complaining only isolates you further.

Looking to format a USB thumb drive but confused about FAT32, exFAT, and NTFS? I'll break down each file system's strengths and limitations and help you choose the best format based on compatibility needs, file sizes, and which devices you'll use it with.

Deleted an email and think it's gone forever? I'll explain what “delete” really means in webmail and desktop programs, why trash folders and database files can leave messages recoverable, how backups and even court orders can bring them back, and the inconvenient fact that the other person may still have a copy.

Found a website you've never heard of and not sure you should click? I'll show you three fast clues -- domain dates, server location, and site history -- that can help you judge whether a site feels trustworthy or sketchy before you commit.

Cloud storage sounds mysterious, but it's really just your files living on someone else's online computer. Let's look at how synchronization moves your changes between devices, why it can feel like backup, and the big catch: deletes spread everywhere too.

Traveling and suddenly locked out of Outlook.com? I'll explain why Microsoft asks for extra sign-in proof, what “something unusual” really means, and how to set up backup email, phone, or authenticator options before you leave so you can get your code and your account back when it matters most.

Online harassment can happen to anyone, but what can you actually do about it? I'll break down whether it's illegal, how to identify who's behind it, ways to make it stop, and the critical mistakes to avoid so you can protect yourself and your loved ones.

There are common causes, and sometimes simple solutions, for a video that starts and stops as you watch it.

I'll explain the Nirvana Fallacy -- rejecting helpful tools because they aren't perfect -- and show how that thinking can make you less safe.

Curious about what's hiding in your spam folder, but worried a single click could infect your computer? I'll explain the simple rules that keep you protected and how to view raw message source safely.

Struggling to organize photos? Me too. I'll explore the features of my ideal photo management app.

OneDrive's “backup” can quietly move your Desktop and Documents into the cloud, fill your free 5GB of storage, and start pushing you to “free up space.” Here's the scary part: the wrong click can delete files everywhere.

Feeling “stupid” about computers? STOP IT. I'll discuss why that label holds you back, how attitude changes what you can accomplish, and better words to use when you need help.

Email is typically very fast, but sometimes it can take hours or even days. I'll explain why delays might happen, what spam filters and busy servers really do, and how long mail servers keep trying before they give up.

I'll share three simple ways spammers know you've read their email, and how you can avoid more spam in the future.

An injury turned everyday tech into a lifeline and exposed a few surprises. From what worked to what failed, I'll share my experience so you can be a little better prepared when life throws you an inevitable curveball.

Copilot popping up everywhere? I'll show you how much of it you can disable or hide.

Prevention and preparation are the best solutions to ransomware.

Tired of keyboards that fail too soon or slow you down? I'll share what I think matters when choosing a keyboard and mouse, what I do, and why “wireless” may not be your friend.

File Explorer's messy left side driving you crazy? I'll show you how to clean up the navigation pane, remove clutter, and pin only the folders you actually use.

Want a program to start automatically every time you sign in to Windows? There's a simple, built-in way to do it.

It's easy to jump to the conclusion your computer has been hacked, but it's usually not the case. Regardless, preventing a hack is easier than recovering from one.

People often use free email providers only to lose everything when a problem occurs. So what should you look for in a paid email provider?

Random authenticator requests can be unsettling. Are you being hacked, or is something else going on? I'll discuss why these alerts might happen, what they really mean, and what to do.

Google quietly removed the Gmail feature that let you pull all your email into one inbox. If you relied on Gmail as your central hub, it's time to rethink your setup. Here's what no longer works and the options that still do.

Running a small business, especially from home, puts your data at risk in ways you might not expect. I'll discuss what I see as the five biggest security threats facing small teams.

Think the Recycle Bin on your PC is the last stop for deleted files? Not always. I'll show you a second, often-overlooked Recycle Bin hiding in your cloud storage. It might rescue files you thought were gone for good.