An Internal Server Error happens within the server attempting to show you a webpage. It's usually a server-side problem out of your control.
Question: I’m trying to download software from a specific site. No matter what I try to download, I get this error message:
Internal Server Error
The server encountered an internal error or misconfiguration and was unable to complete your request. Please contact the server administrator webmaster@******.com and inform them of the time the error occurred and anything you might have done that may have caused the error. More information about this error may be available in the server error log.
Additionally, a 500 Internal Server Error was encountered while trying to use an ErrorDocument to handle the request.
How is this resolved?
I’m very familiar with this error. Too familiar. I see it all the time when setting up or making changes to websites.
The good news? It’s not your fault.
The bad news? There’s probably nothing you can do.
Recovering individual files from a Cryptomator encrypted vault can be tricky. I'll discuss why and how to protect your access to those files.
Question: As files are encrypted by Cryptomator, how can I identify a file to recover a previous version? I can’t even see where I’d find version history.
The short answer is that you can’t. Not directly. I’ll explain why in a moment.
Cryptomator is a free program built to encrypt files before they’re uploaded to cloud storage. To access those files, you must have both Cryptomator and your passphrase. Even with the information, if you want to recover just a single encrypted file, things get challenging.
I’ll address how to protect yourself from scenarios like this. One approach relies on something I’ve been suggesting you do for a long time.
When it comes to technology, it seems like there's a whole 'nother language to learn. Using the right terminology is important to being understood and getting your problems resolved.
Computers and technology, much like medicine, automobiles, and many more disciplines, has its own set of words, buzzwords, and terminology.
And just like when you go to the doctor or take your car to a mechanic, it’s important that you be able to communicate clearly what you want them to look at.
The more accurately you use terminology, the more likely you’ll get the correct and desired outcome.
Zetabytes? Petaflops? Gigahertz? Confusing terms for the ever-increasing capacity and speed of our computers.
Question: I feel like I’ve just crawled out from under a rock or something. Apparently, Seagate has come out with new drives with… zetabytes of storage? There are terabytes, which I know, this is how I store stuff, but now there are petabytes and zetabytes? In communications with someone at Seagate, they are telling me that the CIA has a computer with petaflops of processing power. I know what GHZ is, but what is a petaflop, or more importantly, how many gigahertz is a petaflop? Can you even buy this stuff, or is this reserved for large companies? If you could clear some of this up, I would greatly appreciate it, thanks.
The only unchanging thing in the computer industry is change itself. Today’s topic is storage: specifically, how much and what we call it.
Let’s review some size-related and speed-related terms for good measure.
Occasionally, Microsoft Office becomes damaged. Fortunately, you can repair it.
Question: When I want to open a file in Excel, a dialog box appears: “PROGRAM ERROR: EXCEL.EXE has generated errors and will be closed by Windows. You will need to restart the program.” How do I fix this?
That was the question that spawned this article some 12(!) years ago, but I’m revisiting it for a simple reason.
It’s happening to me. Right now.
No error messages; Excel just goes away after a few seconds when I open a spreadsheet.
I need to explain one of those approaches in a little more detail, since it targets perhaps the most popular form of 2FA: the one-time password. If you’re not wary, you could fall victim.
The good news is that this attack requires your participation. The bad news is that you might not realize it until too late.
I know less than you think I do, but I make up for it with a very important skill -- a skill anyone can benefit from improving.
Once I answered a question from a reader, and they responded to the answer by saying, “So easy when you know how.”
I don’t know if they were making an honest observation or a snarky comment (I suspect the former), but I started thinking about what I’ll call my deep, dark secret.
I didn’t know how. In fact, I often have absolutely no clue.
Unfortunately, that turns you into, yes... a spammer! There are many, many problems with this idea. I'll explain a few.
I received a rather lengthy question mentioning a specific service claiming to turn the tables on spammers either by spamming them back or by using the content of their messages to harm them in some way… or at least annoy the heck out of them.
However, as much as spam angers us, besides ultimately being ineffective, vigilante justice isn’t the answer. Here’s why.
Facebook Marketplace scams are on the rise. Here are three red flags that should tell you something's not right.
As Facebook Marketplace gets more use, it also gets more scams. It’s a popular place to buy and sell, which makes it more profitable to scam there as well.
There are several things to look for, but in this article, I’m going to focus on the concept of accountability and what scammers do to avoid it.
You can associate multiple email addresses with your Microsoft account. Who knew?
Every so often, I get a request that boils down to someone wanting to change the email address associated with their Microsoft account. I’ve maintained that you couldn’t — that your email address is your Microsoft account, and vice versa. No change was possible.
Turns out I was wrong.
Not only can you change the email address, but you can have multiple email addresses, and you can sign in with any one of them you like.
An email claims your email account has been hacked, possibly even including a password you've used. Don't be fooled; it's a scam.
Question: Today, I received this lovely email. While I think it is complete BS and I certainly have no intention on taking any action on it, it *does* look like it was sent from my account, i.e., it appears that someone can send emails impersonating me. Do you have any advice what I should do about this?
You don’t need to do anything.
The email in question described how this person’s account had been hacked, how changing the password wouldn’t help, and that the account was being held for ransom to be paid in Bitcoin. And it appeared to be “From:” this person’s email address.
Variations of this scam even include a password — a password you’ve actually used. I’ve gotten them myself.
Even so, “complete BS” is very accurate.
Though if there is a password, there is one thing you should do.
It's hard enough to experience the loss of a friend or a loved one. To get email from them thereafter can be very disturbing.
Question: I am very upset this morning!! Some way, somehow I got an e-mail from a dear friend who recently passed. the message was sent today, from his e-mail. His family also received the same e-mail, and they assure the rest of us (friends) they do not have access to his password and they want to know how this happened. Is this legal, is somebody tapping into his account, is it a hacker? Can you please shed some light on this? Also, does his family need to take any sort of actions to somehow delete his account so this doesn’t happen again in the future? There are a lot of confused people over this, needless to say quite upset also. This one action has stirred up very deep feelings of the recent passing of our loved one.
I understand this would be a deeply disturbing event, regardless of the cause.
Unfortunately, I don’t have much good news. There are things to try and things to understand.
This choice is about what you back up on your computer. It can make the difference between an easy or difficult recovery.
Question: Recently, I bought a one-terabyte external hard drive and Macrium Reflect backup software as you recommended. But now I’m very much confused about two features of it… and that is “Create Backup Image Wizard” and “Backup Files and Folder Wizard”. What is the difference between the two? What are the respective purposes? I’ve Googled about this and even searched on your site, but I couldn’t figure it out, so I finally decided to write you my first question.
It’s no secret that image backups are my go-to, and we’ll see why shortly.
Files-and-folders backups have their place, and tools like Reflect can automate them and make them part of a reasonable backup strategy.
Scam emails often have clues ranging from obvious to obscure. I'll take a scam email and show you what I see.
Emails are frequent targets of scammers trying to get our account credentials and more. I suspect many more people fall for fake emails, scams, and phishing attempts than we realize.
In this article, I’ll review a scam I received recently for signs of fakery.
You can take the internal hard disk of an old computer and install it as an additional drive in a new one, or consider a more flexible alternative.
Question: My sister has a computer with Windows. However, it is crashing on her. She got a new computer with the latest Windows. My question is, can she install her old hard drive onto her new PC so she can transfer her files over to her new hard drive? She is very illiterate when it comes to computers.
A working hard disk formatted for use by any prior version of Windows can certainly be read by Windows versions that come later.
Of course, you’ll have to open the old computer and extract the drive. Then you can either install it as an internal or external drive of the new machine.
Being over quota means you've received or kept too much email. To deal with it, you need to understand where that email is being kept.
Question: After I did a recovery on my computer, my email program has not worked properly as far as the inbox is concerned. I used to be able to get 700-800 or more emails in my inbox (if I went on vacation or didn’t check for a while) and after the recovery, once I reached about 80 emails it started bouncing my messages saying I was OVER QUOTA!!! How can that be? It is getting worse now. I can have only 40 messages in my inbox and it will start bouncing my messages, still saying I am OVER QUOTA! Soon, I won’t get ANY messages!
Believe it or not, being over quota has nothing to do with the inbox on your PC or even what email program you’re using.
But it might have everything to do with how your email program is configured.
If you're embarrassed at having fallen for a scam, it's tempting to want hide and not tell anyone. But it's important to learn from the experience and share it. There's no need to feel shame.
This is an odd admonition, but it was brought to mind by one of the cyber-security podcasts1 I listen to.
When it comes to falling for the various online scams we warn against, people tend to fall into a couple of buckets: those too ashamed to admit it happened to them and those too smug to think it ever will.
URLs are simple in concept, yet can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.
This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.
The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.
There are several ways to be signed in to multiple Gmail accounts simultaneously. I'll review the most common and what I find the most useful.
It’s not uncommon for people to have multiple email accounts, often with the same provider. Gmail is a good example. Free Gmail accounts are easy to create.
When you’re signed in to one Gmail account, how do you access another?
I have three approaches for you: sign out and then sign in to the other account; “add an account” so you can switch between accounts with one click; or use separate internet browsers.