How Do I Fix “Internal Server Error”?

It’s probably not your problem to fix.

An Internal Server Error happens within the server attempting to show you a webpage. It's usually a server-side problem out of your control.
Internal Server Error
(Image: canva.com)
Question: I’m trying to download software from a specific site. No matter what I try to download, I get this error message:

Internal Server Error
The server encountered an internal error or misconfiguration and was unable to complete your request. Please contact the server administrator webmaster@******.com and inform them of the time the error occurred and anything you might have done that may have caused the error. More information about this error may be available in the server error log.
Additionally, a 500 Internal Server Error was encountered while trying to use an ErrorDocument to handle the request.

How is this resolved?

I’m very familiar with this error. Too familiar. I see it all the time when setting up or making changes to websites.

The good news? It’s not your fault.

The bad news? There’s probably nothing you can do.

Read more

How Do I Recover Encrypted Files From Cryptomator?

With preparation.

Recovering individual files from a Cryptomator encrypted vault can be tricky. I'll discuss why and how to protect your access to those files.
A vault or safe with a fogged glass front. Inside the vault, there are vague shapes of files and folders barely visible through the foggy glass.
(Image: DALL-E 3)
Question: As files are encrypted by Cryptomator, how can I identify a file to recover a previous version? I can’t even see where I’d find version history.

The short answer is that you can’t. Not directly. I’ll explain why in a moment.

Cryptomator is a free program built to encrypt files before they’re uploaded to cloud storage. To access those files, you must have both Cryptomator and your passphrase. Even with the information, if you want to recover just a single encrypted file, things get challenging.

I’ll address how to protect yourself from scenarios like this. One approach relies on something I’ve been suggesting you do for a long time.

Read more

How Do I Download All OneDrive Files to My PC?

There are a couple of ways.

Downloading all your OneDrive files isn't particularly difficult; it's just not particularly obvious. I'll show you two ways to do it.
Puzzle pieces of various digital file icons (documents, photos, videos) coming together to form a large cloud symbol, which represents the OneDrive cloud.
(Image: DALL-E 3)

OneDrive is confusing to many people. It can be difficult to understand where your files are at any point in time on your PC or online.

Some folks want to download everything. They may want to walk away from OneDrive or just make sure all OneDrive files are included in their backups.

Depending on your situation, there are a couple of approaches.

Read more

Terminology Matters

Because accuracy matters.

When it comes to technology, it seems like there's a whole 'nother language to learn. Using the right terminology is important to being understood and getting your problems resolved.
A scene that metaphorically represents the challenge of learning the technical language of computers and technology, similar to learning a new spoken language. Imagine a person standing before a giant, glowing computer screen filled with complex technical diagrams, code, and jargon. The person looks intrigued but slightly overwhelmed, holding a dictionary of computer terms. In the background, diverse symbols and icons of technology, such as circuit boards, USB symbols, and cloud computing icons, float in the air, signifying the vastness of technology's language.
(Image: DALL-E 3)

Computers and technology, much like medicine, automobiles, and many more disciplines, has its own set of words, buzzwords, and terminology.

And just like when you go to the doctor or take your car to a mechanic, it’s important that you be able to communicate clearly what you want them to look at.

The more accurately you use terminology, the more likely you’ll get the correct and desired outcome.

Read more

What Comes After Terabytes?

After terabytes comes petabytes — and then more and more bytes.

Zetabytes? Petaflops? Gigahertz? Confusing terms for the ever-increasing capacity and speed of our computers.
Gigabytes and higher.
Gigabytes and higher. (Image: askleo.com)
Question: I feel like I’ve just crawled out from under a rock or something. Apparently, Seagate has come out with new drives with… zetabytes of storage? There are terabytes, which I know, this is how I store stuff, but now there are petabytes and zetabytes? In communications with someone at Seagate, they are telling me that the CIA has a computer with petaflops of processing power. I know what GHZ is, but what is a petaflop, or more importantly, how many gigahertz is a petaflop? Can you even buy this stuff, or is this reserved for large companies? If you could clear some of this up, I would greatly appreciate it, thanks.

The only unchanging thing in the computer industry is change itself. Today’s topic is storage: specifically, how much and what we call it.

Let’s review some size-related and speed-related terms for good measure.

Read more

How Do I Repair Microsoft Office?

Sometimes Office needs a bigger hammer.

Occasionally, Microsoft Office becomes damaged. Fortunately, you can repair it.
Fixing something Microsoft related.
(Image: Midjourney)
Question: When I want to open a file in Excel, a dialog box appears: “PROGRAM ERROR: EXCEL.EXE has generated errors and will be closed by Windows. You will need to restart the program.” How do I fix this?

That was the question that spawned this article some 12(!) years ago, but I’m revisiting it for a simple reason.

It’s happening to me. Right now.

No error messages; Excel just goes away after a few seconds when I open a spreadsheet.

It’s time to repair Microsoft Office.

Read more

Can Permanently Deleted Email Be Recovered?

Permanent means permanent… mostly.

In most cases, deleted email is gone beyond your ability to recover it. As always, however, there are exceptions.
Image that visually represents the concept of email deletion and potential recovery in the context of Yahoo!, Gmail, and Hotmail services. The image depicts a digital environment with visual elements such as an email being deleted, a trash bin symbolizing temporary storage, archive folders, and a representation of cloud backups. Incorporate symbols or metaphors for legal access and personal backups, like a gavel or an external hard drive.
(Image: DALL-E 3)
Question: Are email messages and attachments located on email accounts with Yahoo!, Gmail, and Hotmail really gone when you delete them?

It seems like such a direct and simple question would result in a direct and simple answer.

In a practical sense, I suppose, the answer would be “Yes, as far as you’re concerned, they’re really gone and they cannot be recovered.”

But that qualification — “as far as you’re concerned” — opens up a Pandora’s box of possibilities.

Whether those possibilities matter depends on why you’re asking.

Read more

Beware the Middleman: How Your 2FA Could Be Compromised

It requires your participation.

Some forms of two factor authentication have vulnerabilities. Here's how to avoid it.
A user in a modern, well-lit office environment. The user is viewing their computer screen, which displays an email with a phishing attempt; a large, transparent fish hook symbol overlays the email content, indicating danger. Beside the computer, on the desk, is a smartphone showing a notification for a two-factor authentication (2FA) request.
(Image: DALL-E 3)

In a recent article, I discussed the different ways that various forms of two-factor authentication (2FA) can be compromised and which are the most resilient.

I need to explain one of those approaches in a little more detail, since it targets perhaps the most popular form of 2FA: the one-time password. If you’re not wary, you could fall victim.

The good news is that this attack requires your participation. The bad news is that you might not realize it until too late.

Read more

The Secret Behind Ask Leo! I Know Less Than You Think

How my deep, dark secret can help you.

I know less than you think I do, but I make up for it with a very important skill -- a skill anyone can benefit from improving.
Concept image of the six most common questions and answers on a signpost.
(Image: istockphotos.com)

Once I answered a question from a reader, and they responded to the answer by saying, “So easy when you know how.”

I don’t know if they were making an honest observation or a snarky comment (I suspect the former), but I started thinking about what I’ll call my deep, dark secret.

I didn’t know how. In fact, I often have absolutely no clue.

Read more

Can’t We Just Spam the Spammers to Death?

Oh so tempting… but ultimately ineffective or worse.

Unfortunately, that turns you into, yes... a spammer! There are many, many problems with this idea. I'll explain a few.
A digital battle scene symbolizing the ineffective and illegal attempts to fight spam with spam. Include visual metaphors such as email icons clashing like swords, a figure representing a regular email user transformed into a spammer wearing a villainous mask, and digital debris to illustrate the chaos and negative impact of such actions. The scene should convey the message that while the idea of retaliating against spammers is tempting, it ultimately backfires and turns the well-intentioned user into part of the problem.
(Image: DALL-E 3)

I received a rather lengthy question mentioning a specific service claiming to turn the tables on spammers either by spamming them back or by using the content of their messages to harm them in some way… or at least annoy the heck out of them.

However, as much as spam angers us, besides ultimately being ineffective, vigilante justice isn’t the answer. Here’s why.

Read more

Facebook Marketplace Scams: 3 Warning Signs You Shouldn’t Ignore

These are major red flags.

Facebook Marketplace scams are on the rise. Here are three red flags that should tell you something's not right.
An image that visually represents the theme of being cautious on Facebook Marketplace due to the rise of scams. The image features symbolic red flags to indicate warning signs, along with icons or illustrations related to Facebook Marketplace, such as the Facebook logo, a marketplace setting, and representations of the scams mentioned (moving conversations off Facebook, cryptocurrency, gift cards).
(Image: DALL-E 3)

As Facebook Marketplace gets more use, it also gets more scams. It’s a popular place to buy and sell, which makes it more profitable to scam there as well.

There are several things to look for, but in this article, I’m going to focus on the concept of accountability and what scammers do to avoid it.

Read more

Has a Hacker Really Hacked My Email Account?

Possible, but unlikely.

An email claims your email account has been hacked, possibly even including a password you've used. Don't be fooled; it's a scam.
The scene includes a computer screen displaying an email inbox with several spam email subjects visible, such as "Account Hacked!" and "Urgent: Security Alert." A large, bold, red 'X' is superimposed over these scam emails, symbolizing rejection or marking them as spam. In the foreground, a figure symbolizing a user (not specific in appearance) confidently presses the 'delete' or 'spam' button on the email client, ignoring the scam attempts.
(Image: DALL-E 3)
Question: Today, I received this lovely email. While I think it is complete BS and I certainly have no intention on taking any action on it, it *does* look like it was sent from my account, i.e., it appears that someone can send emails impersonating me. Do you have any advice what I should do about this?

You don’t need to do anything.

The email in question described how this person’s account had been hacked, how changing the password wouldn’t help, and that the account was being held for ransom to be paid in Bitcoin. And it appeared to be “From:” this person’s email address.

Variations of this scam even include a password — a password you’ve actually used. I’ve gotten them myself.

Even so, “complete BS” is very accurate.

Though if there is a password, there is one thing you should do.

Read more

What Happens If You Delete System 32?

Nothing good. Don’t do it.

Apparently, there's a prank or scam suggesting that people delete their System32 folder. Don't do it. It's a trap!
It's a trap!
(Image: DALL-E 3)

This question took me by surprise. Seriously.

I mean, why would you consider deleting the System32 folder?

Well, apparently there’s a prank or scam running around (again) that encourages people to do exactly that.

Don’t.

Read more

What’s the Difference Between an Image Backup and a Files-and-Folder Backup?

The difference is in how much is backed up.

This choice is about what you back up on your computer. It can make the difference between an easy or difficult recovery.
Images versus Files and Folders
(Image: askleo.com)
Question: Recently, I bought a one-terabyte external hard drive and Macrium Reflect backup software as you recommended. But now I’m very much confused about two features of it… and that is “Create Backup Image Wizard” and “Backup Files and Folder Wizard”. What is the difference between the two? What are the respective purposes? I’ve Googled about this and even searched on your site, but I couldn’t figure it out, so I finally decided to write you my first question.

It’s no secret that image backups are my go-to, and we’ll see why shortly.

Files-and-folders backups have their place, and tools like Reflect can automate them and make them part of a reasonable backup strategy.

But first, we need to understand the differences.

Read more

Behind the Scam: Decoding the Secrets of Fraudulent Emails

How to tell if that email is sketchy.

Scam emails often have clues ranging from obvious to obscure. I'll take a scam email and show you what I see.
An investigator, characterized by a friendly and approachable design, using a magnifying glass to look closely at an email message on a computer screen. The scene is set in a dimly lit room, highlighting the focus on the screen, suggesting the importance of paying attention to detail. The investigator's expression is one of curiosity and determination, emphasizing the significance of scrutinizing every piece of information to uncover the truth behind the email message. This image should inspire viewers to be more diligent and thoughtful when examining their own emails.
(Image: DALL-E 3)

Emails are frequent targets of scammers trying to get our account credentials and more. I suspect many more people fall for fake emails, scams, and phishing attempts than we realize.

In this article, I’ll review a scam I received recently for signs of fakery.

Read more

Can I Move My Old Hard Drive to My New Computer to Transfer Data?

My recommendation.

You can take the internal hard disk of an old computer and install it as an additional drive in a new one, or consider a more flexible alternative.
An external USB hard drive positioned vertically on its side, with a carrying handle attached to its top. The hard drive has a 'Moving' sticker prominently displayed.
(Image: DALL-E 3)
Question: My sister has a computer with Windows. However, it is crashing on her. She got a new computer with the latest Windows. My question is, can she install her old hard drive onto her new PC so she can transfer her files over to her new hard drive? She is very illiterate when it comes to computers.

A working hard disk formatted for use by any prior version of Windows can certainly be read by Windows versions that come later.

Of course, you’ll have to open the old computer and extract the drive. Then you can either install it as an internal or external drive of the new machine.

Read more

What Does “Over Quota” Mean? What’s a Quota?

Mailbox full.

Being over quota means you've received or kept too much email. To deal with it, you need to understand where that email is being kept.
A cauldron overflowing with email.
(Image: DALL-E 3)
Question: After I did a recovery on my computer, my email program has not worked properly as far as the inbox is concerned. I used to be able to get 700-800 or more emails in my inbox (if I went on vacation or didn’t check for a while) and after the recovery, once I reached about 80 emails it started bouncing my messages saying I was OVER QUOTA!!! How can that be? It is getting worse now. I can have only 40 messages in my inbox and it will start bouncing my messages, still saying I am OVER QUOTA! Soon, I won’t get ANY messages!

Believe it or not, being over quota has nothing to do with the inbox on your PC or even what email program you’re using.

But it might have everything to do with how your email program is configured.

Read more

What Is Credential Stuffing?

Simpler than it sounds.

Credential stuffing: less complicated than the fancy words imply and easy to prevent.
A line of dominoes on a sleek, modern table. The first domino in the line is labeled "Your Password", and the subsequent dominoes are labeled with generic online service categories like "Email", "Social Media", "Banking", etc. Each domino represents a different aspect of one's digital life, illustrating the concept of how a single compromised password can lead to a chain reaction affecting various online accounts.
(Image: DALL-E 3)

Security experts often express concern about something called credential stuffing. It’s a way hackers gain access to online accounts.

The good news is that it’s easy to understand.

The better news is that it’s easy to prevent.

The bad news is that too many people don’t.

Read more

What Is My Microsoft Account Recovery Email?

It’s something you set up before you need it.

Your Microsoft account recovery email address is an important part of making sure you never lose access to your account.

A realistic digital illustration of a PC computer screen. The screen displays a user interface with a prominent, centered prompt that reads "Enter recovery email address:". The background of the screen is a simple, user-friendly design, suggesting a security or account settings page. The entire setting conveys a modern, technological environment, focusing on the importance of security and account recovery.

One of the important aspects of keeping your Microsoft account secure is to set up account recovery methods in case you ever lose access.

Your recovery email address is one of those things.

I’ll show you how to find out if you have one set already, add it if you don’t, and change it if you need to.

Read more

Don’t Be Ashamed or Smug

It can happen to any of us, and it’s important we all learn.

If you're embarrassed at having fallen for a scam, it's tempting to want hide and not tell anyone. But it's important to learn from the experience and share it. There's no need to feel shame.
Scam Alert message
(Image: canva.com)

This is an odd admonition, but it was brought to mind by one of the cyber-security podcasts1 I listen to.

When it comes to falling for the various online scams we warn against, people tend to fall into a couple of buckets: those too ashamed to admit it happened to them and those too smug to think it ever will.

Both camps are wrong.

Read more

How Can I Tell If a Web Address Is Safe?

What to look for, what to check.

URLs are simple in concept, yet can be constructed in ways that might fool you. I'll look at some examples and discuss what's important.
An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.
(Image: DALL-E 3)
Question: Security when clicking onto a website confounds me. Some sites put the section of the site you are wanting ahead of the web address. Example http://photos.kodak.com and some put the section after example http://kodak.com/photos. These examples are just made up but I hope you understand what I’m saying. How do I know if I’m on the secure website I’m supposed to be on? At times I see other addresses flashing by on the toolbar that are not the site I clicked on before the actual site appears.

This simple question opens up a veritable Pandora’s box when it comes to understanding URLs and what is safe to click on. And yet it’s important to have some sense of safety to avoid links that might take you to malicious or misleading sites.

The concepts are simple, but how those concepts can be combined is complex, particularly if someone is attempting to deceive you.

I’ll try to make some sense of it all.

Read more

How Do I Sign In to a Different Gmail Account?

There are three approaches.

There are several ways to be signed in to multiple Gmail accounts simultaneously. I'll review the most common and what I find the most useful.
A skilled juggler is performing an impressive feat, effortlessly juggling bright and easily recognizable Gmail icons in mid-air. The juggler is focused, with a look of concentration and joy on their face, as they stand against a simple, unobtrusive background that doesn't detract from the spectacle of the Gmail icons being tossed with expert precision.
(Image: DALL-E 3)

It’s not uncommon for people to have multiple email accounts, often with the same provider. Gmail is a good example. Free Gmail accounts are easy to create.

When you’re signed in to one Gmail account, how do you access another?

I have three approaches for you: sign out and then sign in to the other account; “add an account” so you can switch between accounts with one click; or use separate internet browsers.

Read more