HeroicStories

Follow HeroicStories
Share on
Copy link to clipboard

Begun in 1999, HeroicStories brings diverse, international voices to the world – reminding us that people are good, that individuals and individual action matter. Our mission is to publish examples of people being good to each other, to inspire similar heroic actions in others.

HeroicStories

Woodinville, Washington


    • Jul 30, 2025 LATEST EPISODE
    • weekdays NEW EPISODES
    • 7m AVG DURATION
    • 906 EPISODES


    Search for episodes from HeroicStories with a specific topic:

    Latest episodes from HeroicStories

    Changes for Ask Leo!

    Play Episode Listen Later Jul 30, 2025 6:16


    Changes are coming to Ask Leo!, including the removal of outside ads. I'll explain why this (very) scary step is necessary, how search engines and AI are changing the game, what it means for the future of the site, and how you can help.

    Who Polices Misleading Advertising?

    Play Episode Listen Later Jul 28, 2025 7:36


    Online advertising is the equivalent to the wild west. Advertisers use every technique they can get away with to get attention and sales. I'll review what you can do about it and what steps I'm taking as a website owner.

    Why Disabling Remote Access Doesn’t, and What to Do Instead

    Play Episode Listen Later Jul 25, 2025 5:31


    Turning off remote access in Windows might feel safe, but it doesn't block the kind of access scammers use. I'll show you why those settings aren't enough, how remote scams really work, and what simple habits will actually keep your computer secure.

    How Can an Employer Recover Information I’ve Erased?

    Play Episode Listen Later Jul 25, 2025 7:10


    Think clearing your browser or deleting files keeps your work computer activity private? Nope. I'll walk you through the ways employers can recover or track what you've done, sometimes even after you've “erased” it, and why you should always assume they're watching.

    Why Does Edge Have So Many Processes?

    Play Episode Listen Later Jul 24, 2025 6:59


    Dozens of Edge processes in Task Manager? Not to worry. It's not a bug, it's a feature. I'll show you why modern browsers split tasks across multiple processes and how it actually helps things run faster, smoother, and more reliably.

    A Hacker’s Four Favorite Ways to Get You

    Play Episode Listen Later Jul 23, 2025 7:01


    A security professional shared the top four most successful hacks that compromise business accounts. I'll walk through them and show how they all apply to you and me as well.

    How Can I Tell If a Website Is Safe?

    Play Episode Listen Later Jul 21, 2025 10:29


    It's important, yet sometimes hard to tell, if a website is safe. You can stack the odds in your favor. I'll show you simple tools and smart habits to help spot shady sites before they cause trouble, even if there's no way to always be 100% sure.

    Why Must I Re-Enter my Email to Unsubscribe?

    Play Episode Listen Later Jul 19, 2025 3:52


    If a website makes you re-enter your email just to unsubscribe, it's bad design, or worse, a shady tactic. I'll explain why this happens, what it means, and how to spot when it's just spam trying to trick you.

    What Happens When You Close an Email Account?

    Play Episode Listen Later Jul 18, 2025 7:13


    Thinking about closing your email account? You might want to think again. From lost data to unexpected lockouts, and even someone else ending up with your old email address, I'll walk you through what happens, and why keeping the account might be the smarter move.

    How to Limit File History Disk Usage

    Play Episode Listen Later Jul 17, 2025 4:51


    File History doesn't let you limit how much space it uses, but there's a workaround. I'll show you how to partition your drive so File History stays in its lane, protecting both your backups and your disk space.

    limit usage disk file history
    What Should I Do About the Latest Breach?

    Play Episode Listen Later Jul 14, 2025 5:57


    I'll discuss what you should do in the wake of the latest data breach.

    Searching for a Technical Support Support Phone Number? Avoid This Huge Trap

    Play Episode Listen Later Jul 12, 2025 7:49


    I'll explain why searching for a tech-support phone number is one of the most dangerous steps you can take when you're looking for help.

    How Do I Convert a GPT Disk to MBR?

    Play Episode Listen Later Jul 11, 2025 7:05


    Current partition style won't work? I'll walk you through what that means and two ways to convert between GPT and MBR partition styles.

    Could Someone Reopen My Closed Email Account?

    Play Episode Listen Later Jul 11, 2025 6:14


    Closing or abandoning an email account can have unexpected and perhaps unwanted side effects. I'll explain what those are and what options you have.

    How to Share Two-Factor With Another Person

    Play Episode Listen Later Jul 10, 2025 12:03


    Two factor authentication is one of the most important things you can set up to protect your accounts. Even so, it's possible to share certain 2FA types with multiple authorized people. I'll show you how I do it.

    How to Run a Full Scan Using Windows Security

    Play Episode Listen Later Jul 5, 2025 3:56


    Here's my step-by-step guide on how to run a complete malware scan using Windows 10 and 11's built-in Windows Security.

    Don’t Rely on the Padlock: What the Lock Icon in Your Browser Really Means

    Play Episode Listen Later Jul 4, 2025 8:06


    Https is important, but now that it's ubiquitous it's not really protecting you as much as you might think. I'll explain what I mean and why that is.

    Does Getting Bounces to Email I Didn’t Send Mean I’ve Been Hacked?

    Play Episode Listen Later Jul 3, 2025 4:38


    Email bounces from messages you didn't send can be disconcerting. I'll explain what's happening, why you probably don't need to worry, and what steps you might take anyway.

    Two-Factor Authentication: It’s Not as Complicated as You Think

    Play Episode Listen Later Jul 2, 2025 11:18


    There are some persistent myths about two-factor authentication that stop people from adopting it. I'll clear them up so you can use this simple yet powerful security feature with confidence.

    How to Get Data Off a Hard Drive in a Dead Computer

    Play Episode Listen Later Jun 30, 2025 5:51


    Extracting data from a hard drive in a dead computer shouldn't be too difficult (unless it's the drive itself that caused the problem). I'll walk you through some of the options and steps you can take.

    Core vs. Logical Processors: What Really Powers Your CPU?

    Play Episode Listen Later Jun 28, 2025 10:02


    Your computer's CPU is a complex piece of circuitry trying to maximize how much it can do and how quickly it can do it. I'll outline one of the techniques that makes a single CPU core look like two.

    What Happens If You Click a Bad Link?

    Play Episode Listen Later Jun 27, 2025 9:37


    Accidentally clicking a malicious link might be benign if you catch it soon enough. I'll review what makes the difference, and what steps you need to take next.

    How to Extract Text with Text Extractor

    Play Episode Listen Later Jun 26, 2025 5:17


    Copying text from error messages or images can be difficult. OCR tools like Text Extractor make it easy. I'll show you how.

    Where Are My OneDrive Files?

    Play Episode Listen Later Jun 25, 2025 22:28


    What OneDrive does with your files can be both frustrating and confusing. I'll walk through two important issues: what's really on your computer (or not) and the impact of using OneDrive's horrid "backup feature".

    I Run Security Software. Why Do I Still Sometimes Get Infected?

    Play Episode Listen Later Jun 23, 2025 4:30


    Any security software can miss something. It's important to understand why this is and what you can do about it.

    What Is the Clipboard? Where Is the Clipboard?

    Play Episode Listen Later Jun 21, 2025 9:44


    The Windows clipboard is a fundamental and exceptionally useful feature that many take for granted. I'll review what it is and what it's good for.

    All the “Ishings” Trying to Scam You

    Play Episode Listen Later Jun 20, 2025 5:17


    The concept of phishing has spawned a variety of "ishing" terms. They represent different ways scammers try to achieve a common goal: to scam you. I'll review what they all mean.

    Why Do You Have Two Different Backup Program Recommendations?

    Play Episode Listen Later Jun 19, 2025 4:02


    I want to explain why I have more than one recommendation for a backup program. Talking about one doesn't mean I've stopped recommending the other(s).

    My OneDrive-free Experiment

    Play Episode Listen Later Jun 18, 2025 16:58


    I wanted to see if I could live without OneDrive and avoid the risk that OneDrive would make changes I didn't request. Turns out, it's not that hard. I'll walk you through what I did and how I did it.

    How Do I Remove a BIOS or UEFI Password?

    Play Episode Listen Later Jun 14, 2025 7:20


    A BIOS password provides a surprising amount of security on a computer -- so much that if the password is lost, chances for recovery are slim.

    Fix Printer Problems with an Uninstall and Reinstall

    Play Episode Listen Later Jun 13, 2025 3:23


    Printer problems can be frustrating. I'll show you a quick, safe, easy technique to try first.

    How Big a Backup Disk Do I Need?

    Play Episode Listen Later Jun 12, 2025 7:06


    I share my rule of thumb for choosing the size of an external backup drive.

    Why I Don’t Expect a Windows 10 Apocalypse

    Play Episode Listen Later Jun 11, 2025 9:46


    There's a lot of FUD (fear, uncertainty, and doubt) about the supposed risk of using Windows 10 past its end of support. Here's what I think.

    Size Matters! (When It Comes to Passwords)

    Play Episode Listen Later Jun 9, 2025 5:47


    The results are in for last year's most common passwords. The implications are depressing.

    How to Copy Text From Images

    Play Episode Listen Later Jun 7, 2025 9:25


    Sometimes, a picture is worth a thousand words, but sometimes you just want the words! I'll show you how to use Windows built-in Snipping Tool to extract the text from an image using its built-in OCR.

    Windows 12?

    Play Episode Listen Later Jun 6, 2025 4:04


    Windows 12 isn't even a glimmer in anyone's eye yet. Anyone that says different is misguided and/or misleading. I'll review what we do and don't know, and who you should and shouldn't pay attention to.

    Passkeys and Hardware Keys

    Play Episode Listen Later Jun 6, 2025 8:32


    Passkeys and hardware authentication keys are completely different but partially related. You can use some, but not all, hardware keys as passkeys. I'll clear up the confusion, and tell you what to look for.

    How Can I Securely Delete Everything Except the Operating System?

    Play Episode Listen Later Jun 2, 2025 5:09


    Before giving away a machine or returning a loaner, it's important to remove your personal information from it. That may be both harder and easier than you think. I'll show you where traditional suggestions fail, and what you need to do instead.

    Is Internet Provided by My Landlord Safe?

    Play Episode Listen Later May 31, 2025 4:04


    Connectivity is becoming an added perk in some housing situations. Make sure you know the risks and alternatives when someone else provides your internet connection.

    How to Hover Over a Link to Check It’s Not a Scam

    Play Episode Listen Later May 30, 2025 12:25


    When it comes to links on webpages and HTML email, what you see is not always where you go. Hovering over a link is an important technique to look before you leap.

    The Big One Is Coming. Are You Tech-Ready?

    Play Episode Listen Later May 29, 2025 8:21


    Disaster planning includes thinking about your technology and online access.

    How End-to-End Encryption Protects Your Messages and Where It Fails

    Play Episode Listen Later May 28, 2025 10:44


    You would think that for such an important concept as end-to-end encryption there's be some agreement on exactly what it means. Sadly, not so. There's the correct definition, and then there's the marketing definition. One protects you, the other not so much.

    CHKDSK: What Is It and How Do I Run It?

    Play Episode Listen Later May 26, 2025 9:40


    CHKDSK, short for Check Disk, is a utility that checks the integrity of the files and file structure of your hard disk. I'll walk you through it.

    Many Ways Your Account Can Be Hacked and What to Do About It

    Play Episode Listen Later May 24, 2025 9:35


    There are many ways accounts can be compromised. There are also many simple ways you can protect yourself.

    The Curious History of A:, B:, and Why C: Rules the PC

    Play Episode Listen Later May 23, 2025 4:58


    Floppies come and floppies go, but C: is apparently forever.

    Can You Really Know Your PC Is Clean and Malware-Free?

    Play Episode Listen Later May 22, 2025 6:10


    It's common to want confirmation your machine hasn't been compromised in some way. We can get close, but we can't prove it.

    Should You Leave Your Backup Drive Plugged In? The Real Risk

    Play Episode Listen Later May 21, 2025 7:05


    Some people are afraid to leave their external backup drive connected. They're trading a small risk for a much, much larger one.

    The Event Viewer, Explained

    Play Episode Listen Later May 19, 2025 10:36


    Many Windows components log messages and use Event Viewer to display them. Sadly, the messages are often cryptic and inconsistent, and the result is a mess that scammers take advantage of.

    My (Not So) Favorite Question

    Play Episode Listen Later May 17, 2025 6:16


    My favorite question? You'll never guess. Hint: it makes my job super easy, and you don't want that.

    Can AI Block Spam?

    Play Episode Listen Later May 16, 2025 6:52


    Can we apply AI to the problem of spam? We're already there.

    Passkeys Are Never the Only Way In

    Play Episode Listen Later May 15, 2025 6:48


    Losing a device with a passkey to one of your accounts will not lock you out.

    Claim HeroicStories

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel