Begun in 1999, HeroicStories brings diverse, international voices to the world – reminding us that people are good, that individuals and individual action matter. Our mission is to publish examples of people being good to each other, to inspire similar heroic actions in others.
Woodinville, Washington
Switching from Outlook (classic) to Thunderbird? You don't need to buy tools. With a little time and a free email account, you can move your messages yourself. I'll walk you through the steps to transfer your email safely and reliably.
Just copying your entire drive is not a safe backup, Learn why a real backup program is safer, faster, and more reliable when disaster strikes.
Got a mystery file with no extension or an ambiguous one? You may be able to uncover what it is by checking its signature. I'll show you how to peek inside with a free tool and match the clues to known formats.
Tired of feeling left behind by today's tech? It's not your fault. I'll look at why computers aren't getting any simpler, what basic devices exist, and how the right attitude and support can make all the difference.
Even if you avoid OneDrive, using standard Windows folders might not be as safe as you think. Microsoft's been known to make changes you didn't ask for. I'll explain why I don't trust those folders or Microsoft, and what I do instead to keep my stuff organized and safe.
BitLocker could be running on your PC without your knowledge. Without the recovery key, you risk losing everything. I'll show you three ways to check, find, and save your key.
Worried your computer is secretly saving everything you type? It's not. While there are hidden files and places keystrokes can live temporarily, there's no master file of your entire typing history (unless malware is involved). Learn what's real, what's myth, and how to truly erase your data.
Your phone holds the keys to your digital life. If it's lost or stolen, things can get messy fast. I'll show you simple steps like locking, tracking, and backing up that protect your data and give you peace of mind before the worst happens.
AI might feel sudden and overwhelming, but it's not the first fast-moving, world-changing technology we've faced. I'll compare AI to the rise of the automobile and explore why understanding and engaging with AI, rather than dismissing it, is probably the smartest move we can make.
I'll help you decide if having a spare computer makes sense, what your backup options are, and how to prepare without spending more than you need to. Peace of mind might be easier than you think.
Reusing passwords on sites you don't care about might feel harmless, but it still can open the door to bigger problems. I'll look at why even “unimportant” accounts matter more than you think, the risks of cutting corners, and simple ways to stay safe.
Just because something's old or unavailable doesn't mean you can make copies of it. I'll explain why copyright still matters, how technology complicates things, and what you need to know before making that backup or download. It's simpler and more important than you might think, even if you don't like the answer.
Another scare about two-factor authentication being hackable? DO NOT let that stop you from using it.
Where do you store an .exe file so it works best? I'll break down your options and show you the smart, safe ways to store and use portable programs on your PC.
Choosing between Google Docs and Microsoft 365? They look similar, but there are differences in cost, features, and how they work. I'll help you decide which fits your needs best.
Scammers take advantage of AI's ability to create fake photos that look very real. From phony images of your car to completely made-up situations, it's easier than ever to be fooled. Learn how they're made, why they're dangerous, and what you need to do to protect yourself.
Was your email exposed in a data breach? Don't rush to get a new address. I'll discuss what really matters, like strong passwords, staying alert, and simple steps to keep your account secure.
Do you worry that ransomware might lock up more than your files? It can. I'll show you how to better protect your cloud storage and backups using tools like Macrium Reflect, OneDrive, and Dropbox. Even if malware strikes, you've got a way to recover.
Think you're too old? You're not. It's not your age; it's a plethora of other things, ranging from society's expectations to bad software design, waging war on your self-confidence. Let me show you why you're more capable than you think.
Loneliness can leave us vulnerable, and scammers know it. I'll cover how romance scams work, the tactics scammers use to build trust and steal thousands, and the red flags to watch for, both for yourself and your loved ones. If you think it can't happen to you, think again.
Changes are coming to Ask Leo!, including the removal of outside ads. I'll explain why this (very) scary step is necessary, how search engines and AI are changing the game, what it means for the future of the site, and how you can help.
Online advertising is the equivalent to the wild west. Advertisers use every technique they can get away with to get attention and sales. I'll review what you can do about it and what steps I'm taking as a website owner.
Turning off remote access in Windows might feel safe, but it doesn't block the kind of access scammers use. I'll show you why those settings aren't enough, how remote scams really work, and what simple habits will actually keep your computer secure.
Think clearing your browser or deleting files keeps your work computer activity private? Nope. I'll walk you through the ways employers can recover or track what you've done, sometimes even after you've “erased” it, and why you should always assume they're watching.
Dozens of Edge processes in Task Manager? Not to worry. It's not a bug, it's a feature. I'll show you why modern browsers split tasks across multiple processes and how it actually helps things run faster, smoother, and more reliably.
A security professional shared the top four most successful hacks that compromise business accounts. I'll walk through them and show how they all apply to you and me as well.
It's important, yet sometimes hard to tell, if a website is safe. You can stack the odds in your favor. I'll show you simple tools and smart habits to help spot shady sites before they cause trouble, even if there's no way to always be 100% sure.
If a website makes you re-enter your email just to unsubscribe, it's bad design, or worse, a shady tactic. I'll explain why this happens, what it means, and how to spot when it's just spam trying to trick you.
Thinking about closing your email account? You might want to think again. From lost data to unexpected lockouts, and even someone else ending up with your old email address, I'll walk you through what happens, and why keeping the account might be the smarter move.
File History doesn't let you limit how much space it uses, but there's a workaround. I'll show you how to partition your drive so File History stays in its lane, protecting both your backups and your disk space.
I'll discuss what you should do in the wake of the latest data breach.
I'll explain why searching for a tech-support phone number is one of the most dangerous steps you can take when you're looking for help.
Current partition style won't work? I'll walk you through what that means and two ways to convert between GPT and MBR partition styles.
Closing or abandoning an email account can have unexpected and perhaps unwanted side effects. I'll explain what those are and what options you have.
Two factor authentication is one of the most important things you can set up to protect your accounts. Even so, it's possible to share certain 2FA types with multiple authorized people. I'll show you how I do it.
Here's my step-by-step guide on how to run a complete malware scan using Windows 10 and 11's built-in Windows Security.
Https is important, but now that it's ubiquitous it's not really protecting you as much as you might think. I'll explain what I mean and why that is.
Email bounces from messages you didn't send can be disconcerting. I'll explain what's happening, why you probably don't need to worry, and what steps you might take anyway.
There are some persistent myths about two-factor authentication that stop people from adopting it. I'll clear them up so you can use this simple yet powerful security feature with confidence.
Extracting data from a hard drive in a dead computer shouldn't be too difficult (unless it's the drive itself that caused the problem). I'll walk you through some of the options and steps you can take.
Your computer's CPU is a complex piece of circuitry trying to maximize how much it can do and how quickly it can do it. I'll outline one of the techniques that makes a single CPU core look like two.
Accidentally clicking a malicious link might be benign if you catch it soon enough. I'll review what makes the difference, and what steps you need to take next.
Copying text from error messages or images can be difficult. OCR tools like Text Extractor make it easy. I'll show you how.
What OneDrive does with your files can be both frustrating and confusing. I'll walk through two important issues: what's really on your computer (or not) and the impact of using OneDrive's horrid "backup feature".
Any security software can miss something. It's important to understand why this is and what you can do about it.
The Windows clipboard is a fundamental and exceptionally useful feature that many take for granted. I'll review what it is and what it's good for.
The concept of phishing has spawned a variety of "ishing" terms. They represent different ways scammers try to achieve a common goal: to scam you. I'll review what they all mean.
I want to explain why I have more than one recommendation for a backup program. Talking about one doesn't mean I've stopped recommending the other(s).
I wanted to see if I could live without OneDrive and avoid the risk that OneDrive would make changes I didn't request. Turns out, it's not that hard. I'll walk you through what I did and how I did it.
A BIOS password provides a surprising amount of security on a computer -- so much that if the password is lost, chances for recovery are slim.
Printer problems can be frustrating. I'll show you a quick, safe, easy technique to try first.