Frequently Asked Questions

Common questions from our guides, all in one place.

View, Manage, and Export Saved Passwords in Your Browser

Is it safe to export passwords as a CSV file?

No. The CSV file contains every username and password in plain text with no encryption. Anyone who can access the file can read all your credentials. Export only when you need to (like importing into a password manager), and delete the CSV immediately after.

Can I sync browser passwords across devices?

Yes, if you are signed into the browser with your account (Google account for Chrome, Firefox account for Firefox, Apple ID for Safari, Microsoft account for Edge). Passwords sync automatically between devices using the same browser and account.

What happens if I delete a saved password?

It is permanently removed from that browser's password manager. If sync is enabled, it will also be deleted from all other devices signed into the same account. This does not change your actual password on the website — it just removes the saved copy.

Why does my browser keep asking to save passwords after I turned it off?

Some browsers have the setting in multiple places. Make sure you also check AutoFill settings and any password manager extensions you have installed, as they have their own save prompts separate from the browser's built-in one.

Can I use both a browser password manager and a dedicated one?

You can, but it gets confusing fast. Both will compete to fill in login forms, and you will end up with passwords saved in two places. Pick one and disable the other for a cleaner experience.

Clear Cache and Cookies

Will clearing my cache erase my saved passwords?

No. Clearing your cache and cookies does not delete saved passwords in most browsers. Passwords are stored separately. However, clearing cookies will log you out of websites, so you may need to re-enter your password to sign back in.

Why do some websites load slower right after clearing the cache?

Your browser cache stores copies of images, scripts, and other files from websites you visit. After clearing it, your browser needs to download these files again on the first visit, which takes a moment. After that first load, the files get cached again and speeds return to normal.

How often should I clear my cache?

There is no strict rule, but clearing your cache every few weeks or when you notice issues like pages not displaying correctly is a good practice. You do not need to clear it daily.

Your Connection Is Not Private Error

Does this error mean I'm being hacked?

Almost never. The vast majority of these errors are caused by expired certificates, wrong system clocks, or corporate firewalls. Actual man-in-the-middle attacks are rare for typical browsing. That said, don't ignore it on sites where you enter passwords or payment info.

What does the "thisisunsafe" bypass do?

It tells Chromium-based browsers (Chrome, Edge, Brave, Arc) to skip the certificate check and load the page anyway. It's a hidden developer feature – there's no visible text field, you just type it while the error page has focus. It only applies to that specific page load.

Will bypassing the warning put my computer at risk?

Bypassing means your connection to that site isn't encrypted in a verified way. On your own network with a known device (like a router admin page), this is fine. On a public network connecting to an unknown site, your data could potentially be intercepted. Never bypass for banking, email, or shopping sites.

Why does my company's internal site show this error?

Many internal tools use self-signed certificates that browsers don't trust by default. Your IT department may need to install a root certificate on your machine, or you can bypass the warning since it's an internal resource. If your company uses a web proxy, the proxy's certificate should be installed on managed devices automatically.

I fixed my clock but still see the error. What now?

Clear your browser cache (old certificate data may be stuck), restart the browser, and try again. If the error is only on one site, the problem is likely on the server side and there's nothing you can do except wait for the site owner to fix it.

Install and Manage Browser Extensions

Are browser extensions safe to install?

Not all extensions are safe. Stick to extensions from official browser stores, check ratings and reviews, and be cautious of extensions that ask for broad permissions like "read and change all your data on all websites." Only install extensions from developers you trust.

How many extensions is too many?

There is no fixed limit, but each extension uses memory and can slow your browser. If you notice sluggish performance, try disabling extensions one at a time to find the culprit. A good rule of thumb is to only keep extensions you actively use.

Can extensions slow down my browser?

Yes. Extensions run code in the background and some can significantly impact performance. Ad blockers and password managers are generally lightweight, but extensions that modify every page you visit can cause slowdowns.

Browser Running Slow

How many tabs is too many?

There's no universal number, but if your computer has 8 GB of RAM, keeping under 20-30 tabs is a good guideline. Each tab typically uses 50-300 MB depending on the site. If you regularly need lots of tabs open, consider a tab suspension extension that unloads inactive tabs.

Why is Chrome/Edge using so much memory?

Chromium-based browsers run each tab and extension in its own process for stability and security. This means they use more memory than single-process browsers, but a crash in one tab won't take down the whole browser. If memory is a concern, Firefox typically uses less.

My browser is fast but websites load slowly. What gives?

That's likely your internet connection, not the browser. Run a speed test to check your bandwidth. If your connection is fine, the specific website might be having server issues. Try the same site in a different browser or on your phone to confirm.

Will clearing my cache make the browser permanently faster?

It helps temporarily by removing outdated or corrupted data. But the cache will build up again as you browse, which is normal and actually helpful – cached files make repeat visits faster. Clear it when you notice problems, not as a daily habit.

Can too many bookmarks slow down a browser?

Not really. Bookmarks are tiny text entries and don't affect browsing performance. The exceptions are if you have thousands of bookmarks and your bookmark sync is constantly running, but even then the impact is minimal compared to tabs and extensions.

Which Browser Should You Use?

Is Chrome really that bad for privacy?

Chrome is not "bad" — it is a secure browser with fast updates. But Google's business is advertising, so Chrome's default settings are designed to support that. If you use Chrome and care about privacy, turn off ad personalization at myaccount.google.com, use extensions like uBlock Origin, and review sync settings. Or switch to a browser where privacy defaults are stronger.

Should I use the same browser on my phone and computer?

It helps for sync. If you use Chrome on your computer, using Chrome on your phone means bookmarks, passwords, and even open tabs carry over. Same with Firefox, Edge, and Brave. Safari syncs automatically between Mac, iPhone, and iPad through iCloud. Using different browsers on each device is fine — you just lose the convenience of cross-device sync.

What happened to Arc Browser?

Arc Browser was discontinued in mid-2025 after The Browser Company was acquired by Atlassian. The app is still available but only receives minimal security patches. If you used Arc, consider switching to Firefox, Brave, or Vivaldi as alternatives with similar tab management features.

Do I need to install Chrome for certain websites?

Rarely, but it happens. Some enterprise web apps and Google services work best in Chrome. If you run into a site that does not work in your browser, try it in Chrome before assuming the site is broken. Most modern websites work fine in any major browser.

Does my browser choice affect battery life on a laptop?

Yes, noticeably on Mac laptops. Safari is optimized for Apple hardware and uses less energy than Chrome or Firefox. On Windows laptops, Edge tends to be more efficient than Chrome. If battery life matters, try Safari (Mac) or Edge (Windows) and see if you notice a difference.

Pop-ups and Ads

I accidentally clicked "Allow" on a notification prompt. How do I undo it?

Follow the steps above for your browser to revoke the notification permission. Every browser lets you remove or block sites from the notification allowed list. Once you block or remove the site, the notifications stop immediately.

How do sites trick me into allowing notifications?

Common tricks: a fake "verify you're not a robot" checkbox that's actually the notification prompt, a "click Allow to continue" overlay that triggers the browser's real permission dialog, or a "your download will begin after you click Allow" message. If any website asks you to click "Allow" on a browser pop-up to do something basic, it's a trick. The browser prompt comes from the browser itself (usually top-left of the window), not from the page.

Is the "Your computer has a virus" pop-up real?

No. It's never real. No website can scan your computer for viruses. These pages are designed to scare you into calling a fake support number (where scammers will charge you money or install actual malware) or downloading fake antivirus software. Close the tab. If it won't close, press Cmd + W (Mac) or Ctrl + W (Windows/Linux) to force-close the tab, or force-quit the browser entirely.

How do I know if I have adware vs just notification spam?

Notification spam only appears as browser notifications and stops when you revoke the permission. Adware shows ads in places they shouldn't be – inside apps, on your desktop, or as separate pop-up windows. If ads appear outside your browser, run a malware scan. On Windows, use Windows Security (built-in). On Mac or Linux, download Malwarebytes (free version works fine for a scan).

Will an ad blocker stop all of this?

An ad blocker (like uBlock Origin) will stop most in-page ads and some pop-up tricks, but it won't stop notification spam from sites you've already allowed. You still need to revoke those notification permissions manually. That said, an ad blocker is still worth having – it blocks the deceptive prompts that trick you into allowing notifications in the first place.

Private and Incognito Browsing Explained

Does private browsing make me anonymous?

No. Websites still see your IP address, your browser type, screen resolution, and other details that can identify you. Your ISP logs every domain you visit. Private browsing only prevents your browser from saving history and cookies locally.

Can my employer see what I do in Incognito mode?

Yes. If you're on a company network or a company-managed device, your employer can monitor your traffic through the network, DNS logs, or device management software. Private mode has no effect on network-level monitoring.

Should I always browse in private mode?

No. Private mode disables useful features like saved passwords, browsing history, and cookie-based logins. You'd have to sign in to every site every time. Use it when you have a specific reason, not as your default.

What's the difference between private browsing and a VPN?

Private browsing controls what your browser saves locally. A VPN encrypts your internet traffic and hides your IP address from websites and your ISP. They solve different problems and can be used together — a VPN for network privacy, private mode for local cleanup.

Do private browsing tabs share cookies with each other?

In most browsers, yes — tabs within the same private window share a temporary cookie jar. Safari is the exception: starting with Safari 17, each private tab is isolated. In all browsers, private tabs never share cookies with regular tabs.

What Is a Browser?

Is Google a browser or a search engine?

Google is primarily a search engine (the service at google.com that finds websites for you). Google Chrome is a web browser (the app). They are made by the same company but are two different products. You can use Chrome without Google Search, and you can use Google Search without Chrome.

Do I need to download a browser?

Your device already came with one. Macs and iPhones have Safari. Windows computers have Microsoft Edge. Android phones have Chrome. You can use the built-in browser or download a different one if you prefer.

Does it matter which browser I use?

For most people, any modern browser works fine. They all show the same websites. The differences are in speed, privacy features, and extra tools. Chrome is the most popular and has the most extensions. Safari is optimized for Apple devices and battery life. Firefox and Brave prioritize privacy.

What is the difference between the internet and Wi-Fi?

Wi-Fi is the wireless connection between your device and your router (the box in your house). The internet is the worldwide network your router connects to. You can have Wi-Fi without internet (if your provider is down), and you can have internet without Wi-Fi (if you plug in with a cable or use mobile data).

Can I have more than one browser on my computer?

Yes. You can install as many browsers as you want and use them for different things. Many people use one browser for work and another for personal browsing. Each browser keeps its own bookmarks, history, and saved passwords.

Use Browser Profiles to Separate Work and Personal Browsing

Do browser profiles share extensions?

No. Each profile has its own set of extensions. You will need to install extensions separately in each profile. This is actually useful — you might want your work profile to have work-related extensions while your personal profile stays minimal.

Can I have different bookmarks in each profile?

Yes. Bookmarks, saved passwords, browsing history, cookies, and extensions are all completely separate between profiles. That is the whole point — each profile acts like an independent browser.

Does creating a new profile use a lot of disk space?

A fresh profile uses very little space. It grows as you save bookmarks, install extensions, and build up cache and history — just like a regular browser would. If you are concerned about space, you can periodically clear the cache within each profile.

Can I transfer data between profiles?

Not directly within the browser. But you can export bookmarks as an HTML file from one profile and import it into another. Passwords can be exported as CSV and reimported. See our export and import browser data guide for steps.

What happens when I delete a profile?

All bookmarks, saved passwords, browsing history, extensions, and cookies for that profile are permanently deleted. If the profile was synced to an account (Google, Microsoft, Firefox, Apple ID), the data still exists in the cloud and on other devices — but the local copy is gone.

Free Up Disk Space

Is it safe to delete temp files?

Yes. Temporary files are meant to be disposable. They're created by apps and the OS for short-term use (caching, updates, installers). Deleting them is safe and is exactly what built-in cleanup tools do. If an app needs a temp file again, it will recreate it.

What is "Other" or "System Data" storage on Mac?

This category includes caches, logs, Time Machine local snapshots, and various system files. It often looks alarmingly large but is mostly stuff that can be reclaimed. The storage panel in System Settings will let you browse some of it. Local Time Machine snapshots are the biggest culprit and clear themselves automatically over time, or after a full backup to an external drive.

How much free space should I keep?

Aim for at least 10-20% of your total drive capacity. Your operating system needs free space for virtual memory, updates, and temporary files. Performance degrades noticeably when a drive is above 90% full, and some updates will refuse to install entirely. On smaller drives (256 GB or less), keeping 20-30 GB free is a good minimum.

Right-Click and Context Menus

Why does my Mac trackpad not right-click?

Mac trackpads use a two-finger click for right-click, but this has to be enabled. Go to System Settings > Trackpad > Point & Click and make sure Secondary click is turned on and set to Click with Two Fingers. You can also always use Control + click as an alternative.

What's the difference between the short and full right-click menu on Windows 11?

Windows 11 introduced a simplified right-click menu that shows fewer options. To see everything (like the classic Windows 10 menu), click Show more options at the bottom of the menu, or skip straight to the full menu by pressing Shift + F10 instead of right-clicking.

Can I customize what appears in the right-click menu?

On Windows, some apps add items to the right-click menu when installed (like "Open with VS Code" or "Scan with antivirus"). You can't easily customize the built-in items, but uninstalling apps removes their entries. On Mac, some apps add items to the Share menu or Quick Actions section. On Linux, the context menu is often configurable through your file manager's settings or extensions.

Is long press on a phone the same as right-click?

Yes, functionally. Long-pressing an item on a phone shows a context menu with actions specific to that item, just like right-clicking on a computer. The options vary depending on what you're pressing — a link, an image, text, an app icon, or empty space.

What does "Inspect" do in the browser right-click menu?

Inspect opens the browser's developer tools, which show the code behind the web page. It's mostly used by web developers for debugging. It won't break anything if you click it by accident — just close the panel that opens by pressing F12 or clicking the X on the developer tools panel.

App Permissions

Why can't an app access my camera or microphone even though I allowed it?

There may be multiple layers of permissions. On desktop, both the operating system and the browser need to allow access. Check your OS permissions first (steps above), then check your browser's site permissions. On TheTest.com, if the camera or mic test doesn't work, both need to be set to Allow.

Is it safe to grant location access to apps?

Only grant location access to apps that genuinely need it, like maps or weather apps. For everything else, choose Never or While Using the App. Constant location tracking drains battery and raises privacy concerns.

What happens if I revoke a permission an app needs?

The app won't be able to use that feature. It may show an error, ask you to grant the permission again, or simply not work for that function. You can always re-enable the permission later.

Should I deny all permissions by default?

Denying everything isn't practical, but being selective is smart. Grant permissions only when an app requests them and the request makes sense for what you're trying to do. If a calculator app asks for your microphone, something is wrong.

How do I know which apps have access to my camera right now?

On macOS, an indicator light (green dot in the menu bar) shows when the camera is active. On Windows, an icon appears in the taskbar when the camera or mic is in use. On iOS and Android, colored dots appear at the top of the screen (green for camera, orange for microphone).

Undo and Recover

Does undo work everywhere?

Almost. Ctrl + Z (or Cmd + Z on Mac) works in nearly every app that involves typing or editing – word processors, email, spreadsheets, image editors, and even file managers. A few apps and web forms do not support it, but those are rare. The more you use it, the more you will realize just how many places it works.

Can I recover a file after emptying the Trash or Recycle Bin?

It is very difficult. Once you empty the Trash (Mac/Linux) or Recycle Bin (Windows), the files are marked as permanently deleted. If the file was stored in a cloud service like Google Drive, iCloud, or OneDrive, check the trash on that service's website – it keeps deleted files for about 30 days independently. For local files, specialized recovery software sometimes works if you act quickly, but there are no guarantees.

How many times can I undo?

It depends on the app. Most text editors, word processors, and design tools support many levels of undo – sometimes hundreds. Simpler apps or web-based tools might only support a few undos. The safest habit is to undo right away when you notice a mistake, before doing more actions that might push the old ones off the undo history.

Is there a difference between Delete and Shift + Delete?

Yes. On Windows and Linux, pressing Delete sends a file to the Recycle Bin or Trash where you can recover it. Pressing Shift + Delete skips the Recycle Bin/Trash entirely and permanently deletes the file immediately. On Mac, Cmd + Delete sends to Trash, and there is no single shortcut to permanently delete from Finder (you empty the Trash instead).

Will undo bring back something I deleted days ago?

Undo only goes back through your recent actions in the current session. If you deleted a file days ago, undo will not help. Instead, check the Trash or Recycle Bin on your computer, or the trash folder in your cloud storage service (Google Drive, iCloud, OneDrive). These keep deleted files for about 30 days before permanently removing them.

Storage Full — What to Do When Your Disk Is Almost Full

Will deleting files break anything?

Emptying the Trash/Recycle Bin, clearing Downloads, and removing browser cache won't break anything — those are always safe. Be more careful with files in system folders like Library on Mac or AppData on Windows. If you're unsure about a file, search its name online before deleting. App caches regenerate automatically, so clearing them just means a slightly slower first load.

How do I stop getting the "disk full" warning?

The warning triggers when free space drops below a threshold (usually around 5-10% of total capacity). Free up enough space to get above that threshold and the warning goes away. For a long-term fix, either regularly clean up (see Disk Cleanup) or move files to cloud storage. If you consistently run low, it might be time for a larger drive or external storage.

Should I buy more storage or just clean up?

If your drive is under 256 GB and you work with large files (video, photos, development tools), more storage is the real fix — you'll keep running into the limit no matter how much you clean. If your drive is 512 GB or larger and you're suddenly full, cleaning up usually reveals a specific culprit (old backups, cached media, forgotten downloads). Start with cleanup, and if you're still tight after a thorough pass, it's time for more storage.

What is "System Data" or "Other" storage on my Mac?

This category includes caches, logs, app data, Time Machine local snapshots, and anything macOS can't neatly classify. It often grows to 20-50 GB or more. Time Machine local snapshots are the most common cause of a surprisingly large "System Data" — they clear automatically when space is needed, but you can manually remove them with tmutil deletelocalsnapshots [date] in Terminal. Restarting your Mac can also reduce this category by clearing temporary files.

Is it safe to use "Storage Sense" or "Optimize Storage" features?

Yes. Windows Storage Sense and macOS Optimize Storage are designed to be safe — they remove temporary files, old update data, and files you can re-download. The iCloud and OneDrive optimization features keep your files accessible in the cloud and only remove the local copy when space is needed. You can always re-download files when you need them, as long as you have internet access.

App Crashing or Not Opening

Will clearing an app's cache delete my files or data?

No. Cache files are temporary data the app creates to speed things up (like thumbnails, temporary downloads, or layout info). Deleting them forces the app to rebuild them on the next launch. Your actual files, documents, and account data are stored separately. Clearing preferences or config files will reset the app's settings to defaults, but still will not delete your files.

Why does an app work fine for a while and then start crashing?

Common causes: the cache grew too large or became corrupted, an OS update changed something the app depends on, the app updated and introduced a bug, or your disk is running low on space. Start with a restart, then clear the cache, then check for updates.

What is the difference between "Not Responding" and a crash?

"Not Responding" (or a spinning beach ball on Mac, or a grayed-out window on Windows) means the app is stuck but still running. It might recover on its own if you wait 10-15 seconds. A crash means the app closed itself entirely and is no longer running. For "Not Responding," give it a moment before force quitting. For a crash, just try reopening it.

Should I restart or shut down to fix a crashing app?

Use Restart, not Shut down. On Windows, Shut down uses Fast Startup by default, which saves part of the system state and does not give you a fully clean boot. Restart performs a full reboot and clears more temporary data. On Mac and Linux, Restart and Shut down followed by powering back on are effectively the same.

An app crashes only when I open a specific file. What should I do?

The file itself might be corrupted. Try opening a different file in the same app to confirm. If other files work fine, try opening the problem file in a different app. If it is a document, try the web version of the app (Google Docs, Office Online) to see if it can recover the content.

Touchpad Gestures and Settings

My touchpad feels too fast or too slow. What should I change?

Adjust the tracking speed (called "Tracking speed" on Mac, "Touchpad sensitivity" on Windows, "Touchpad speed" on Linux). Start in the middle and move the slider in small increments until pointing feels natural. On Windows, if the sensitivity dropdown is not enough, you can also adjust cursor speed separately in Settings > Bluetooth & devices > Mouse > Mouse pointer speed.

Should I turn on natural scrolling?

This is entirely personal preference. Natural scrolling (content moves the direction your fingers go) matches how phones work, so it feels intuitive if you use a phone a lot. Traditional scrolling (content moves opposite to your fingers) is what desktop users have done for decades. Try natural scrolling for a day – you will know quickly if you like it.

Can I use touchpad gestures with an external trackpad?

Yes. Apple's Magic Trackpad works with all macOS gestures. On Windows, external precision touchpads support all the same gestures as built-in ones. On Linux, external trackpad support depends on the specific hardware and driver.

Why do some gestures not work on my laptop?

Older laptops may not have a precision touchpad. On Windows, check Settings > Bluetooth & devices > Touchpad – if it says "Your PC has a precision touchpad," all gestures will work. If it does not say that, you are limited to basic pointing and two-finger scrolling. On Linux, some hardware requires additional drivers for multi-finger gestures.

Can I disable the touchpad when I plug in a mouse?

Yes. On Windows, toggle Leave touchpad on when a mouse is connected off in touchpad settings. On macOS, go to System Settings > Accessibility > Pointer Control and check Ignore built-in trackpad when mouse or wireless trackpad is present. On GNOME Linux, there is a "Disable while external mouse is plugged in" option under Mouse & Touchpad settings on some distributions.

Where Your Downloads Go

I downloaded a file but it disappeared. Where did it go?

It's almost certainly still there — you're just looking in the wrong place. Open your browser's download list (Ctrl + J on Windows/Linux, Command + J on Mac) and it will show you the exact file name and location. If a browser was set to a custom download folder, the file won't be in the default Downloads folder.

Is it safe to delete everything in my Downloads folder?

Generally, yes. The Downloads folder is just a holding area — deleting files from it doesn't uninstall apps or remove anything from the cloud. Just make sure you've already installed any setup files and moved anything important (like documents or photos) to a permanent location before deleting.

Why do I have so many duplicate files in Downloads?

Browsers add a number to the filename if a file with the same name already exists — you'll see things like document.pdf, document (1).pdf, document (2).pdf. This happens when you download the same file multiple times. Keep the most recent one and delete the rest.

How do I make my browser ask where to save every time?

In most browsers, go to Settings > Downloads and enable the option that says something like "Ask where to save each file before downloading" or "Always ask you where to save files." This way you can organize files as you download them instead of everything piling up in one folder.

Can I move my Downloads folder to an external drive?

On Windows, yes — right-click the Downloads folder, go to Properties > Location > Move, and pick a folder on the external drive. On Mac, you can change each browser's download location individually to a folder on an external drive, but the system Downloads folder itself stays in your home directory. Just keep in mind that if the drive isn't connected, downloads will fail.

Debloat and Secure a New Machine

Do I need third-party antivirus software?

On Windows, Windows Security (Defender) is good enough for most people. On macOS, the built-in Gatekeeper and XProtect handle most threats. On Linux, the attack surface for desktop malware is small. A third-party antivirus is only necessary if your workplace requires it or you regularly handle high-risk files.

Will removing pre-installed apps break anything?

No. The apps listed as removable through Settings > Apps are safe to uninstall. Windows protects true system components and won't let you remove them through the normal uninstall flow. If you change your mind, most can be reinstalled from the Microsoft Store.

Can I fully disable telemetry on Windows?

Not completely through Settings alone. The toggles above reduce telemetry to the minimum allowed on Home and Pro editions. Windows Enterprise and Education editions can disable it further through Group Policy. The base-level "required diagnostic data" cannot be turned off on consumer editions.

Should I do this on a work-managed computer?

Be careful. If your machine is managed by IT (enrolled in Intune, Jamf, or another MDM), some of these settings may be controlled by policy and could revert. Disabling certain features might also flag compliance issues. Check with your IT department first.

How often should I revisit these settings?

Major Windows updates (like 24H2 or 25H2) can reset some privacy toggles or add new ones. It's worth rechecking after any feature update. macOS and Linux settings tend to stick across updates.

Copy, Paste, and the Clipboard

Does the clipboard save things permanently?

No. The clipboard is temporary. It holds whatever you last copied, and it gets cleared when you restart your computer. On Windows, if you enable clipboard history (Win + V), it keeps a list of recent copies during your session, but this also clears on restart unless you pin specific items.

Can I copy a file the same way I copy text?

Yes. In your file manager (Finder on Mac, File Explorer on Windows, Files on Linux), click a file to select it, then use the same copy (Cmd + C or Ctrl + C) and paste (Cmd + V or Ctrl + V) shortcuts. The file gets duplicated in the new location. Use cut to move it instead of copying.

Why does my pasted text look different from the original?

When you copy text from a website or formatted document, the formatting (fonts, colors, sizes) comes along for the ride. When you paste into a different app, it tries to keep that formatting, which can look strange. Use paste without formatting (Cmd + Shift + V on Mac, Ctrl + Shift + V on Windows and Linux) to paste just the plain text, which then matches whatever you are pasting into.

What happens if I copy something new before pasting?

The new copy replaces the old one. The clipboard only holds one item at a time (unless you use clipboard history on Windows with Win + V). If you copied something important, paste it before copying anything else.

Is there a way to see what is on my clipboard right now?

On Windows, press Win + V to see your clipboard history. On Mac and Linux, there is no built-in clipboard viewer, but you can always paste into a blank document or text field to see what is there. Third-party clipboard manager apps are available for all platforms if you want a full history.

Virtual Desktops and Workspaces

Do virtual desktops use more memory or slow down my computer?

No. Virtual desktops are just a way of organizing your existing windows. The windows themselves use the same resources whether they are on one desktop or spread across five. The desktop feature itself uses a negligible amount of memory.

Do my desktops persist after a restart?

On macOS, your Spaces layout is remembered across restarts (the desktops persist, though app windows depend on your login settings). On Windows, virtual desktops persist across restarts starting with Windows 11. On Linux with GNOME dynamic workspaces, the layout resets on restart since workspaces are created on the fly.

Can I have different wallpapers on each desktop?

On macOS, yes – right-click each desktop in Mission Control and choose a different wallpaper. On Windows 11, right-click a desktop thumbnail in Task View and select Choose background. On GNOME Linux, this is not natively supported without third-party extensions.

What is the difference between Mission Control, Task View, and Activities?

They are the same concept with different names. macOS calls it Mission Control, Windows calls it Task View, and GNOME Linux calls it Activities. All three show you an overview of your open windows and let you manage multiple desktops or workspaces.

Can I use virtual desktops with multiple monitors?

Yes. On macOS, each monitor gets its own set of Spaces by default (configurable in Desktop & Dock > Mission Control). On Windows, all monitors share the same set of virtual desktops. On GNOME, you can choose whether workspaces span all displays or are per-monitor in Settings > Multitasking.

Tabs and Windows

What happens to my tabs if my browser crashes?

Most modern browsers (Chrome, Firefox, Edge, Safari) automatically save your session. When you reopen the browser after a crash, it will usually offer to restore your tabs. If it does not, check the browser's History menu for your recent pages.

Do too many tabs actually slow down my computer?

Yes. Each tab uses memory, and some tabs (especially ones with video or complex websites) use a lot. If your computer is running slowly, try closing tabs you are not using. Even 15-20 heavy tabs can make a noticeable difference on computers with 8 GB of RAM or less.

What is the difference between a tab and a window?

A tab is a single page inside a browser window. A window is the entire browser frame that can hold many tabs. Think of a window like a book and tabs like bookmarks in that book. You can have multiple books (windows) open, each with their own bookmarks (tabs).

Can I reopen a tab I closed a long time ago?

Ctrl + Shift + T (or Cmd + Shift + T on Mac) reopens tabs in reverse order, so you can press it many times. For tabs closed much earlier, go to your browser's History (usually Ctrl + H or Cmd + Y) to search through everything you have visited.

Is there a limit to how many tabs I can have open?

There is no hard limit, but your computer's memory sets a practical one. Chrome and other browsers will eventually slow down or stop loading tabs properly when you run out of memory. If you regularly have dozens of tabs open, consider bookmarking groups of tabs or using a tab management extension.

Windows Registry Basics

Can editing the Registry break Windows?

Yes, but only if you delete or modify critical system keys. The tweaks described in well-known guides (like the ones in this article) are safe because they target specific, well-documented values. The risk comes from deleting things blindly or importing untrusted .reg files. Always back up before editing, and you can always reverse your changes.

Do I need to restart after every Registry change?

Not always. Some changes take effect immediately, others require you to sign out and back in, and some need a full restart. If a guide does not specify, try signing out and back in first. If the change still has not applied, restart.

Is there a command-line way to edit the Registry?

Yes. The reg command lets you read and write Registry values from Command Prompt or PowerShell. For example, reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" shows the values in that key, and reg add can create or modify values. This is useful for scripting but the graphical Registry Editor is easier for one-off changes.

What is a DWORD vs a String value?

A DWORD (Double Word) is a 32-bit number, commonly used for on/off toggles (0 for off, 1 for on) and numeric settings. A String value holds text, used for things like file paths and names. When a guide tells you to create a specific type, use exactly that type — the wrong type will not work even if the name and data are correct.

Are "Registry cleaner" programs safe to use?

Microsoft recommends against using Registry cleaners. The Registry is not a bottleneck for system performance, and cleaning it provides no meaningful speed improvement. These tools often delete legitimate entries needed by installed software, causing crashes or broken features. The risk outweighs any hypothetical benefit.

File Management Basics

What is the difference between zip and unzip?

Zipping compresses one or more files into a single .zip archive to save space or make sharing easier. Unzipping (extracting) reverses the process and pulls the original files back out.

Can I open .exe files on Mac or Linux?

No, .exe files are Windows executables. They won't run on macOS or Linux without compatibility software like Wine. macOS uses .dmg and .pkg files, and Linux uses .deb, .rpm, or .AppImage files.

Will showing hidden files break anything?

No. It just makes invisible files visible in your file manager. These files are hidden because most people don't need to touch them, not because they're dangerous. Just don't delete hidden files unless you know what they do.

How do I change what app opens a file type?

On Mac, right-click the file, click Get Info, and change the Open with app. Click Change All to apply it to all files of that type. On Windows, right-click the file, click Open with > Choose another app, and check Always use this app. On Linux, right-click, choose Properties or Open With, and set your preferred application.

What if I can't see file extensions?

Your operating system might be hiding them. Follow the "Show file extensions" steps for your platform above. Seeing extensions helps you identify file types and avoid opening something suspicious disguised as a document.

Computer or App Frozen: How to Force Quit and Recover

Will force quitting an app damage my computer?

No. Force quitting ends the app process and releases its memory back to the system. It will not damage your computer. However, you will lose any unsaved work in that app. The app itself is fine and you can reopen it immediately.

What is the difference between force quitting and restarting?

Force quitting closes one specific app. Restarting shuts down and restarts your entire operating system, closing all apps in the process. Always try force quitting the frozen app first. Only restart if the entire system is unresponsive.

My computer keeps freezing repeatedly. What should I do?

Repeated freezes suggest an underlying problem. Check how much free disk space you have, look for apps using excessive memory or CPU in Task Manager (Windows) or Activity Monitor (Mac), make sure your OS and drivers are up to date, and check for overheating. If it keeps happening, it could be a hardware issue like failing RAM or a dying hard drive — contact IT or a repair service.

Is it safe to hold the power button to shut down?

It is safe as a last resort but should not be your regular shutdown method. A forced power-off cuts power immediately without letting the operating system close files and save state properly. In rare cases this can corrupt open files or cause filesystem issues. But if your computer is completely frozen and nothing else works, it is the right thing to do.

Why does my computer freeze when I open too many browser tabs?

Each browser tab uses memory (RAM). A typical tab uses 50 to 300 MB depending on the page content. Open enough tabs and you exhaust your available RAM, forcing the system to use much slower disk storage as overflow (called "swap" or "virtual memory"). This makes everything dramatically slower and can lead to freezes. Close tabs you are not actively using or use a tab suspender extension that unloads inactive tabs.

Manage Startup Apps

Will disabling a startup app delete it?

No. Disabling a startup app only stops it from launching automatically. The app stays installed and you can open it manually whenever you want. You can also re-enable it later.

Which startup apps are safe to disable?

Most third-party apps are safe to disable: messaging apps, cloud storage sync, game launchers, updaters, and media players. Avoid disabling antivirus software, accessibility tools you depend on, or anything from your hardware manufacturer that you're not sure about (like audio drivers or trackpad utilities).

Why does my computer take so long to boot?

The most common reason is too many programs launching at startup, especially heavy ones like chat apps, game launchers, and cloud sync tools. Disabling the ones you don't need immediately can cut boot time significantly. If boot is still slow after that, a full or fragmented disk, aging hardware, or a failing drive could also be factors.

Printing to PDF

What's the difference between "Save As PDF" and "Print to PDF"?

In most cases, they produce similar results. "Save As PDF" (in apps like Word) tends to preserve hyperlinks, bookmarks, and text selectability better. "Print to PDF" creates an exact visual copy of what would print, which may flatten some of those features. Use Save As PDF in Office apps when the option exists, and Print to PDF for everything else.

Why does my PDF look different from the original document?

The PDF captures what would be printed, not what's on screen. Check your print settings for page size, orientation, and margins. Web pages in particular may look different because the print layout removes navigation, ads, and adjusts column widths. Use "Print preview" to check before saving.

Can I edit a PDF after creating it?

PDFs created by printing are essentially snapshots and aren't easy to edit. For basic text changes, you can use Preview on Mac or Adobe Acrobat. For major edits, it's better to go back to the original document, make changes there, and print to PDF again.

How do I reduce the file size of a PDF?

When printing to PDF, large images and complex layouts create bigger files. On Mac, Preview has a Quartz Filter > Reduce File Size option when exporting. On any platform, free tools like Smallpdf or iLovePDF can compress PDFs online. For sensitive documents, use an offline tool instead.

Can I password-protect a PDF?

On Mac, when saving as PDF from the print dialog, click Security Options to set a password. On Windows, you'll need a third-party tool like the free Adobe Acrobat Reader or LibreOffice (open the PDF, then export with password protection).

Change Default Apps

Why does Edge keep becoming my default browser on Windows?

Windows updates sometimes reset your default browser to Edge. After a major update, go back to Settings > Apps > Default apps, click your preferred browser, and hit Set default again. Make sure all the individual protocols (HTTP, HTTPS) and file types (.htm, .html) are assigned too.

Can I set different apps for different file types?

Yes. You can have one PDF viewer for .pdf files, a different image editor for .png files, and so on. Each file type has its own default app. On Mac, use the Get Info > Open with > Change All method for each type. On Windows, use Settings > Apps > Default apps and search by file type.

What happens to links when I change my default browser?

Any link you click in other apps (email, Slack, documents) will open in the new default browser. Bookmarks, history, and saved passwords stay in whatever browser they were created in — they do not move automatically. If you want to bring those over, look for an import option in your new browser's settings.

Blank Monitor Troubleshooting

My monitor says "no signal" but the computer is on. What's wrong?

The monitor isn't receiving video data. Check the cable connections (reseat both ends), try a different cable, make sure the monitor's input source matches the port you're using (HDMI 1 vs HDMI 2 vs DisplayPort), and try a different port on the computer. If nothing helps, the cable, port, or adapter may be faulty.

Why does my screen go black after booting but works in Safe Mode?

This almost always means a display driver problem. The basic Safe Mode driver works, but the full driver is crashing or outputting a resolution your monitor can't handle. Uninstall the display driver in Safe Mode, restart, and let the OS reinstall a default driver. Then install the latest driver from the manufacturer's website.

Can a bad cable cause a black screen instead of "no signal"?

Yes. A partially damaged cable might establish a connection (so the monitor doesn't say "no signal") but fail to transmit a stable picture, resulting in a black screen, flickering, or intermittent signal drops. Try a known-good cable to rule this out.

My laptop screen works but the external monitor is blank. What should I try?

Press Win + P (Windows) and select Extend or Duplicate. On Mac, hold Option in System Settings > Displays and click Detect Displays. Also check that the monitor is set to the correct input source. If using a dock or adapter, try connecting the monitor directly to the laptop. See external display setup for detailed steps.

Does HDMI vs DisplayPort matter for this problem?

Both work fine for most monitors. DisplayPort is generally more reliable for high refresh rates and multi-monitor daisy-chaining. If one cable type isn't working, try the other. Some monitors default to a specific input on power-up, so check the input source setting on the monitor itself.

Where Apps Store Data (And What's Safe to Delete)

Will deleting an app's cache break it?

No. Caches exist specifically to be disposable. The app will recreate its cache when it runs again. You might notice slightly slower performance or need to re-download some content the first time, but nothing will break. Always close the app before deleting its cache folder.

How do I find which app a folder belongs to?

Most folders are named after the app or its developer. On Mac, Preferences files use reverse-domain names like com.google.Chrome.plist. On Windows, look for the company or product name. On Linux, folder names usually match the package name. If a folder name is cryptic, search it online to identify it.

Why don't uninstallers clean up all these files?

Most uninstallers only remove the app's main program files, not its per-user data. This is partly intentional — if you reinstall the app later, your settings come back. But it also means junk accumulates over time. Dedicated cleanup tools (like AppCleaner on Mac) can find and remove these leftovers during uninstallation.

How much space can I recover by cleaning app data?

It depends on what you have installed. Browser caches alone can be several gigabytes. Apps that download content for offline use (Spotify, Slack, Teams) can use significant space in Application Support or AppData. Start with Caches/Temp folders for the quickest wins, and look at Application Support or AppData for uninstalled apps next.

Is there a difference between clearing cache in an app's settings vs deleting the cache folder?

Sometimes. Clearing cache from within an app is the safest approach since the app knows which files to remove. Deleting the entire cache folder achieves the same thing but is more thorough. Both are safe. Use the app's built-in option when available, and delete the folder manually when the app is misbehaving or already uninstalled.

Power and Sleep Settings

Does leaving my computer on instead of sleeping damage it?

No. Modern computers are designed to run continuously. Sleep saves energy and reduces wear on fans and mechanical drives, but skipping sleep occasionally for downloads or presentations is perfectly fine. If you're on a laptop, keeping it awake on battery will drain the battery faster.

What is the difference between sleep and hibernate?

Sleep keeps your session in memory and uses a small amount of power to maintain it. Your computer wakes up almost instantly. Hibernate saves your session to disk and powers off completely, using zero power. Waking from hibernate takes longer, similar to a fresh boot, but your open apps and files are restored. macOS handles this automatically. On Windows, hibernate is available as an option in the power settings.

Why does my laptop sleep when I close the lid?

That is the default behavior on every operating system. On Windows, you can change it in the Power Options settings described above. On macOS, the only way to keep it awake with the lid closed is to connect an external display, keyboard, and mouse (clamshell mode). On Linux with GNOME, the setting is not available in the graphical interface by default, but KDE Plasma includes it in Power Management.

My screen keeps turning off during presentations. How do I stop it?

Set the screen timeout to Never before your presentation. On Mac, go to System Settings > Lock Screen and change the display timeout. On Windows, go to Settings > System > Power & battery > Screen and sleep and set screen off to Never. Remember to change it back afterward to save power.

Computer Running Slow

How do I know if I need more RAM?

On Mac, check the Memory Pressure graph in Activity Monitor – if it's consistently yellow or red, you need more RAM. On Windows, open Task Manager and look at the Performance tab; if memory is consistently above 85-90%, more RAM would help. On Linux, check htop – if swap is heavily used, you're memory-constrained. 8 GB is the bare minimum for modern use; 16 GB is comfortable for most people.

Will restarting actually help?

Yes, genuinely. Restarting clears out memory leaks, finishes pending updates, and kills stuck processes. If your computer has been on for days or weeks, a restart alone may fix the slowness. Make it the first thing you try before digging deeper.

Is my computer just too old?

Maybe, but probably not. Computers from the last 5-7 years should still handle everyday tasks fine. The most impactful upgrade is adding an SSD if you still have a spinning hard drive – it makes everything dramatically faster. Adding more RAM is the second-best upgrade. A "slow old computer" with an SSD and 16 GB of RAM often feels brand new.

Why is my computer slow only when browsing the internet?

That's a browser problem, not a computer problem. See the browser running slow guide – the usual causes are too many open tabs, heavy extensions, or a bloated browser cache.

Why does my computer slow down after being on for a while?

Memory leaks. Some apps gradually consume more RAM the longer they run without being restarted. Browsers are the worst offenders. Restarting the app (or your whole computer) reclaims that memory. If it happens constantly, check Activity Monitor or Task Manager to identify which app is the leak.

Accessibility Features

Are accessibility features only for people with disabilities?

No. Many of these tools are useful for anyone. Zoom is great for presentations and demos, larger text reduces eye strain during long work sessions, reduce motion helps with motion sensitivity, and voice control is convenient when your hands are full. Try them out – you might find a few you want to keep on.

Will turning on accessibility features slow down my device?

Most features have no noticeable performance impact. Screen readers (VoiceOver, Narrator, Orca, TalkBack) use some additional processing, and zoom on older devices can feel slightly heavier, but modern hardware handles all of these without issue.

Can I toggle accessibility features on and off quickly?

Yes, every OS has shortcuts. On Mac, press Cmd + F5 for VoiceOver or set up Accessibility Shortcut in System Settings. On Windows, Win + Plus for magnifier, Win + Ctrl + C for color filters, Win + Ctrl + Enter for Narrator. On iOS, triple-press the side button. On Android, use the floating accessibility button or volume key shortcut.

What's the difference between text size and display scaling?

Text size only makes text bigger while keeping icons and UI elements the same size. Display scaling (also called resolution scaling) makes everything larger, including buttons, icons, and windows. Start with text size if you just need more readable text. See screen resolution and scaling for more on display scaling.

I keep accidentally triggering Sticky Keys. How do I stop that?

On Windows, pressing Shift five times triggers the Sticky Keys prompt. On Mac, pressing Shift five times can trigger it too. To disable the shortcut without disabling Sticky Keys entirely, see keyboard and mouse troubleshooting for steps to turn off the trigger shortcut on each OS.

Install and Uninstall Programs

What if uninstalling a program does not fully remove it?

Some programs leave behind configuration files, caches, or registry entries. On Mac, apps like AppCleaner can find leftover files. On Windows, the built-in uninstaller handles most cleanup, but third-party tools like Revo Uninstaller can do a deeper clean if needed.

Is it safe to delete an application folder manually?

On Mac, dragging an app from the Applications folder to the Trash usually works fine for simple apps. On Windows, do not delete program folders manually because this can leave behind registry entries and system references. Always use the proper uninstall method.

How do I uninstall programs that do not appear in the list?

Some programs, especially small utilities, may not register themselves with the system uninstaller. Check if the program has its own uninstall option in its menu. Otherwise, you can usually safely delete the application file directly on Mac, or look for an uninstall.exe in the program's folder on Windows.

Restart vs Shutdown vs Sleep

Why does restarting fix so many problems?

Most computer problems aren't caused by something permanently broken. They're caused by software getting into a bad state — a process crashes, memory gets fragmented, a driver glitches. Restarting wipes the slate clean by clearing memory and reloading everything from scratch. It's the simplest way to undo whatever went wrong.

Is shutdown the same as restart?

Not on Windows. Windows uses a feature called Fast Startup that saves part of the system state during shutdown, so it boots faster next time. This means a shutdown doesn't fully clear everything. A restart does a complete reset. On Mac and Linux, they're functionally the same — both fully clear the system.

How often should I restart my computer?

There's no strict rule, but restarting once a week is a good habit. It clears out accumulated junk and installs pending updates. If your computer starts feeling sluggish, a restart is always the first thing to try.

When is restarting not enough?

If the same problem comes back after restarting, it's likely something more persistent — a misconfigured setting, a buggy app, a failing hard drive, or malware. At that point, look into the specific symptoms rather than restarting again. Check for OS updates, uninstall recently added apps, or run a malware scan.

Will I lose my work if I restart?

You'll lose anything that isn't saved. Most apps will ask you to save before closing, but if something is frozen and you need to force restart, unsaved work in any open app will be lost. Get into the habit of saving frequently with Cmd + S (Mac) or Ctrl + S (Windows/Linux).

Notifications and Focus Modes

What's the difference between Do Not Disturb and Focus modes?

Do Not Disturb silences everything. Focus modes (on macOS, iOS, and Windows) are more granular – you can choose which people and apps are still allowed to notify you. Think of DND as a Focus mode with everything blocked.

Will alarms still work during Do Not Disturb?

Yes, on all platforms. Alarms are treated as exceptions to DND by default. Phone calls from repeated callers (calling twice within 3 minutes) can also break through on iOS and Android.

Why did my notifications stop working after an OS update?

Updates sometimes reset notification permissions or change default settings. Go to your notification settings and check that your important apps still have notifications enabled. On Android, also check that battery optimization hasn't been re-enabled for those apps.

Can I allow calls from certain people during Focus mode?

Yes. On iOS and macOS, go to Settings > Focus > [mode] > Allowed People to pick specific contacts or groups. On Android, go to Do Not Disturb > People to allow calls from favorites or specific contacts. On Windows, use the priority notifications list.

How do I see notifications I missed while DND was on?

On macOS, open Notification Center (click the date/time). On Windows, press Win + N. On iOS, swipe down from the top-left of the lock screen. On Android, swipe down from the top. Missed notifications are queued and appear when DND is turned off, though some time-sensitive notifications may be discarded if they're too old.

Find Your System Information and Specs

Why does IT need my serial number?

Your serial number uniquely identifies your specific machine. IT uses it to look up warranty status, check what hardware you have, track which machines are assigned to whom, and order replacement parts. It is the single most useful piece of info you can give them.

My computer shows less RAM than what was advertised. Is something wrong?

Probably not. Some RAM is reserved by your operating system or integrated graphics. A machine advertised with 8 GB might show 7.6 GB or 7.8 GB available, and that is normal. If a large chunk is missing (like showing 4 GB on an 8 GB machine), one of your RAM sticks might not be seated properly or could be faulty.

What is the difference between storage and memory?

Memory (RAM) is temporary working space your computer uses while running programs. It gets cleared when you shut down. Storage (SSD or hard drive) is where your files, apps, and operating system live permanently. When people say "my computer is running out of memory," they usually mean storage, not RAM.

How do I find my IP address?

IP addresses are not shown on the system info pages covered here. Check the understanding IP addresses guide for how to find yours.

Can I upgrade my RAM or storage?

It depends on your machine. Most modern laptops (especially MacBooks and ultrabooks) have RAM soldered to the motherboard and it cannot be upgraded. Storage (SSD) is upgradeable on many laptops but not all. Desktops are generally upgradeable for both. Check your model's specifications to confirm.

What Is the Cloud?

Will I lose my files if I stop paying for cloud storage?

Generally no, your files are not deleted immediately. Most services stop syncing new files and prevent you from adding more, but your existing files stay in the cloud for a period of time. Eventually, if you exceed the free tier and do not pay, some services may start deleting files (usually with plenty of warnings first). The safest approach is to download anything important to your device before canceling a paid plan.

Is everything I do automatically saved to the cloud?

Not necessarily. It depends on your settings. Some services (like iCloud Photos or Google Photos) can be set to automatically upload everything. Others only sync files you specifically put in certain folders (like the Google Drive or OneDrive folder on your computer). Check your cloud app's settings to see what is and is not being synced.

Can someone else see my cloud files?

Not unless you share them. Cloud files are private by default. Only you can see them (by logging in with your account). If you share a file or folder with someone else using a link, then they can access it. You can revoke that access at any time.

What happens if the cloud company goes out of business?

This is extremely unlikely for major providers like Apple, Google, or Microsoft, but it is a valid concern. This is one reason why having a local backup in addition to cloud storage is smart. If you use a smaller or niche cloud service, keep copies of important files on your own device or a second cloud service.

Do I need internet to use the cloud?

You need internet to upload, download, and sync files. However, most cloud services let you mark files for offline access, which downloads them to your device so you can open and edit them without internet. Changes sync back to the cloud once you reconnect.

Can't Open a File

What does "There is no application set to open the document" mean?

It means your computer does not know which app to use for that file type. Either no app is installed that can handle it, or the file association was lost (sometimes after an app update or uninstall). Right-click the file, use Open With to pick an app, and set it as the default to fix it permanently.

Can I open a .exe file on Mac or Linux?

Not natively. .exe files are Windows executables. On Mac, you can use Parallels, VMware Fusion, or CrossOver to run some Windows programs. On Linux, Wine can run many Windows apps. But compatibility varies — not everything works, and it is usually better to find a native alternative for your platform.

Why does the wrong app keep opening my files?

Your default app for that file type is set to something you did not intend. On Mac, select the file, press Cmd + I, change the app under Open with, and click Change All. On Windows, right-click the file, choose Open with > Choose another app, check Always use this app, and click OK. On Linux, right-click, go to Properties > Open With, and set the correct default.

How can I tell if a file is actually corrupted?

Try opening it with a different app — if multiple apps fail, the file is likely corrupted. For archives, most extraction tools have a test or verify option. You can also compare the file size to what you expect — a 0 KB file or one much smaller than expected is probably a failed download. Re-downloading from the original source is the simplest fix.

Is it safe to change a file extension?

Changing the extension does not change the file's actual contents — it only changes which app tries to open it. If the extension is genuinely wrong (someone named a JPEG as .pdf by mistake), renaming it to the correct extension fixes the problem. But if the file really is a PDF and you rename it to .jpg, it still will not open as an image. Use the file command on Mac/Linux or try opening with a known-compatible app to figure out what the file actually is.

Biometrics Setup

Is biometric data stored in the cloud?

No. On every major platform, your fingerprint and face data is stored locally on a secure chip in your device (Secure Enclave on Apple devices, TPM on Windows, TEE on Android). The actual biometric image is never uploaded, shared with apps, or sent to the manufacturer.

What happens if my fingerprint stops working?

Try cleaning the sensor and your finger (moisture, lotions, and dirt interfere). If it consistently fails, delete the fingerprint and re-enroll it. After a restart, you always need to enter your password or PIN first before biometrics activate.

Can someone unlock my phone with a photo of my face?

On devices with IR-based face recognition (iPhone Face ID, Windows Hello with IR camera), no – they use depth sensing that can't be fooled by a photo. Android face unlock using a standard camera is less secure and may be vulnerable to photos on some devices. Fingerprint is generally the most reliable biometric method.

Do I still need a password if I use biometrics?

Yes. Biometrics supplement your password or PIN – they don't replace it. You'll need your password after restarts, failed biometric attempts, and periodic security checks. Keep your password accessible (ideally in a password manager).

My device doesn't have a fingerprint sensor or IR camera. Can I add one?

On Windows, you can buy a USB fingerprint reader that supports Windows Hello (usually $20-40). For Macs, Apple sells keyboards with Touch ID for desktop models, but MacBook sensors can't be added externally. Phones don't support external biometric hardware.

Essential Keyboard Shortcuts

Why do Mac and Windows use different modifier keys?

Mac uses Cmd (Command) as the primary modifier while Windows and Linux use Ctrl. This is a design decision from the original Macintosh in 1984. The Cmd key keeps shortcuts separate from terminal control sequences, where Ctrl has special meaning. In practice, most shortcuts are the same pattern, just swap Cmd for Ctrl.

Can I customize keyboard shortcuts?

Yes. On Mac, go to System Settings > Keyboard > Keyboard Shortcuts to remap system shortcuts, and many apps let you customize their shortcuts in preferences. On Windows, there is no single built-in shortcut editor for everything, but Microsoft PowerToys includes a Keyboard Manager that lets you remap keys and shortcuts. On Linux, check your desktop environment's settings (GNOME: Settings > Keyboard > Keyboard Shortcuts).

What is the equivalent of Ctrl+Alt+Delete on Mac?

The closest equivalent is Cmd + Option + Esc, which opens the Force Quit window where you can kill unresponsive apps. For a full restart of a frozen Mac, hold the power button for several seconds. There is no single shortcut that combines task management and system recovery the way Ctrl+Alt+Delete does on Windows.

Clipboard History and Managers

Does clipboard history save things after I restart?

On Windows, unpinned items are cleared on restart, but pinned items persist. With Maccy on Mac, your history persists across restarts by default (it stores history in a local database). Raycast also persists clipboard history across restarts.

Is clipboard history a security concern?

It can be. Clipboard history stores everything you copy, including passwords and sensitive text. Most clipboard managers (including Windows built-in and Maccy) do not store items copied from password managers by default, or they clear sensitive items after a short time. You can also manually clear your clipboard history when needed. Avoid clipboard sync across devices if you regularly copy sensitive information.

Can I search through my clipboard history?

Yes. On Windows, the Win + V panel has a search bar at the top. Maccy supports searching by typing right after opening the popup. Raycast has full-text search across your clipboard history. This is one of the biggest advantages of clipboard history – you can find that thing you copied three hours ago.

How much does my clipboard history store?

Windows keeps the last 25 items by default. Maccy defaults to 200 items (configurable up to 999). Raycast stores a large history with no hard limit in practice. Older items are dropped as new ones are added, unless you pin them.

Does clipboard history work with images and files?

On Windows, Win + V supports text, HTML, and images up to 4 MB per item. Maccy supports text, images, and file references. Raycast supports text, images, files, and rich content. Files themselves are not stored – just a reference to them, so if you delete the file, the clipboard entry will not work.

Parts of Your Screen

Why does everything have a different name on Mac vs Windows vs Linux?

Each operating system was designed by a different company (or community) with its own ideas about how a computer should work. Apple, Microsoft, and the GNOME project all chose their own names for similar concepts. A Mac's Dock and Windows' Taskbar do roughly the same job, for example, but they look different and have different names. This guide is here to help you translate between them.

Where did my taskbar or dock go?

It is probably set to auto-hide. Move your mouse to the edge of the screen where it normally appears (usually the bottom) and wait a moment. It should slide back into view. To stop it from hiding: on Mac, go to System Settings > Desktop & Dock and turn off Automatically hide and show the Dock. On Windows, right-click the taskbar, choose Taskbar settings, and turn off Automatically hide the taskbar. On GNOME with a visible dock, check your dock extension settings.

What is the difference between the desktop and the home screen?

On a computer, "desktop" means the background area behind all your windows. On a phone or tablet, people say "home screen" instead. They are essentially the same idea: the starting point where you see your icons and wallpaper. This guide uses "desktop" because it is the standard term on computers.

Can I rearrange or customize these elements?

Yes, to varying degrees. On Mac, you can move the Dock to the left, right, or bottom, and rearrange menu bar icons by holding Cmd and dragging them. On Windows, you can pin or unpin apps from the taskbar and choose which icons appear in the notification area. On GNOME, you can install extensions to change almost anything about the layout, including adding a permanent dock or moving the top bar.

I see a term in another guide I do not recognize. Should I come back here?

Yes, that is exactly what this article is for. Other guides on this site will link back here when they mention terms like Dock, Taskbar, Finder, or File Explorer so you can quickly look up what they mean.

Updating Your OS

Why do I need to update my operating system?

Updates fix security vulnerabilities that hackers actively exploit. They also fix bugs, improve performance, and add new features. Skipping updates leaves your device exposed to known threats that have already been patched.

Will updating delete my files?

No. Regular updates don't touch your personal files, apps, or settings. Major OS upgrades (like going from Windows 10 to 11, or a new macOS version) preserve your data too, but it's always smart to have a backup before a big upgrade.

How often should I update?

Install security updates as soon as they're available. For feature updates, within a week or two is fine. Don't let updates pile up for months.

What if my computer is very slow after an update?

This is normal for the first hour or so after a major update. Your system may be re-indexing files or finishing background tasks. If it persists after a restart, check for another pending update that may have been missed.

Can I undo an update?

On Windows, you can roll back recent updates in Settings > Windows Update > Update history > Uninstall updates. On macOS, you'd need a Time Machine backup to revert. On Linux, package managers can downgrade individual packages, but rolling back a full system update is more complex. In general, it's better to report a bug and wait for a fix than to undo an update.

Locked Out of Your Computer

Will resetting my password delete my files?

No, in most cases. Resetting your password through Apple Account, Recovery Mode, security questions, or Microsoft account recovery keeps your files intact. The only scenario where you lose data is if you have to erase and reinstall the operating system — and even then, only if you don't have a backup.

What if I don't remember my Apple Account (Apple ID) password?

Go to iforgot.apple.com from another device and follow the steps to reset your Apple Account password. You'll need access to a trusted phone number or another Apple device signed into the same account. Once your Apple Account password is reset, you can use it to unlock your Mac.

How do I avoid getting locked out in the future?

Use a password manager. It securely stores all your passwords so you only need to remember one. Set up your Apple Account or Microsoft account recovery options (trusted phone number, recovery email) so you always have a way back in. On Mac, make sure FileVault recovery key is saved somewhere safe. On Windows, create a password reset disk or set up security questions while you still have access.

What if my computer asks for a BitLocker recovery key?

BitLocker is Windows disk encryption. If Windows asks for a recovery key after an update or hardware change, check aka.ms/myrecoverykey while signed into your Microsoft account on another device. If it's a work device, your IT department has the recovery key. Do not try to bypass it — enter the correct key or contact IT.

Screen Resolution and Display Scaling

What's the difference between resolution and scaling?

Resolution is the total number of pixels your display shows (like 1920x1080 or 3840x2160). Scaling controls how big things look at that resolution. A 4K monitor at 150% scaling still uses all 3840x2160 pixels, but the operating system renders interface elements larger so they're comfortable to read. Lowering the resolution to make things bigger produces blurrier results than keeping native resolution and increasing scaling.

Why does my external monitor have blurry text but my laptop screen is sharp?

Your laptop likely has a HiDPI (Retina) display with high pixel density, while your external monitor has a lower pixel density. At standard DPI (around 100 PPI), individual pixels are visible up close, making text and edges look rougher. The fix is either to use a 4K or higher-resolution external monitor, or to accept the slight quality difference — it's a hardware limitation, not a settings problem.

Is fractional scaling (125%, 150%) bad?

On Windows, the preset fractional values (125%, 150%) work well for most apps. Custom values and some older apps may look slightly blurry because the OS has to do bitmap scaling. On Linux with GNOME Wayland, fractional scaling has improved significantly but can still cause minor rendering artifacts in some apps. On macOS, the system handles its own version of fractional scaling seamlessly through the "Larger Text" to "More Space" slider.

How do I make text bigger without changing everything else?

On Windows, go to Settings > Accessibility > Text size to increase just the text size without scaling icons and UI elements. On macOS, the scaling options affect everything uniformly. On mobile, use the Font size setting separately from Display size. In any browser, press Ctrl + Plus (or Cmd + Plus on Mac) to zoom just that page.

What scaling should I use for a 4K monitor?

For a 27-inch 4K monitor, 150% is the most common recommendation (and what Windows defaults to). At 32 inches, 125-150% works well. At 100%, everything is very small but you get maximum screen real estate. At 200%, you get Retina-quality sharpness but the same usable space as a 1080p monitor — only worth it if sharpness is your top priority.

Connecting Printers

Why does my printer keep going offline?

Wireless printers frequently lose connection due to Wi-Fi signal issues, power saving modes, or the router assigning a new IP address. Assign a static or reserved IP to your printer in your router's settings to prevent the IP from changing. Also check that the printer's power saving mode isn't disconnecting it from Wi-Fi.

Do I need to install drivers or does the computer handle it?

On Mac and ChromeOS, drivers are almost always handled automatically through AirPrint or IPP. On Windows, drivers usually install through Windows Update when you add the printer. On Linux, most common printers work with built-in CUPS drivers, but you may need to install additional driver packages for less common models.

Can I print from my phone to the same printer?

Yes. iPhones use AirPrint (works with most modern printers without setup). Android phones can print to most network printers through the built-in print service or the manufacturer's app. The printer just needs to be on the same Wi-Fi network as your phone.

My printer is connected but prints blank pages or gibberish. What's wrong?

This is usually a driver mismatch. Remove the printer and re-add it, letting the system auto-select the driver. If the problem continues, download the correct driver from the manufacturer's website for your exact model and OS version. Low ink can also cause blank pages, so check ink or toner levels.

How do I find my printer's IP address?

Most printers can print a network configuration page from their own display menu (look for Settings > Network or a dedicated info button). You can also check your router's admin page for a list of connected devices. The printer's IP is usually something like 192.168.1.xxx.

Screenshots and Screen Recording

Where do my screenshots save?

On Mac, screenshots save to the Desktop by default. On Windows, Win + Print Screen saves to Pictures\Screenshots, while the Snipping Tool copies to your clipboard. On Linux with GNOME, they go to Pictures/Screenshots. You can change the save location on Mac through the Cmd + Shift + 5 toolbar options.

Can I record just one window instead of the whole screen?

On Mac, press Cmd + Shift + 5 and select Record Selected Portion, then size the selection to fit the window. On Windows, Win + Alt + R (Game Bar) records the active window automatically. On Linux with GNOME, the built-in recorder lets you select a specific area before recording.

How do I record my screen with audio?

On Mac, open the toolbar with Cmd + Shift + 5, click Options, and select a microphone under the microphone section. This records your voice but not system audio by default. On Windows, Xbox Game Bar (Win + Alt + R) records system audio and optionally microphone audio – check Game Bar settings to toggle the mic. The Snipping Tool recorder does not capture audio. On Linux, the built-in GNOME recorder does not capture audio. Use OBS Studio if you need audio recording.

How do I take a screenshot of a dropdown menu or tooltip?

These disappear when you click away, so you need a timed capture. On Mac, press Cmd + Shift + 5, click Options, set a 5-second timer, then open your menu before the capture triggers. On Windows, open the Snipping Tool app, set a delay (3 or 5 seconds), start the snip, and quickly open the menu. On Linux with GNOME, the screenshot overlay may dismiss the menu, so use a third-party tool like Flameshot that supports delayed captures.

IPv4 vs IPv6

Will IPv4 stop working?

No, not anytime soon. IPv4 and IPv6 will coexist for years to come. The transition is gradual, and virtually all services still support IPv4. You won't wake up one day and find your internet broken because of IPv4.

Does IPv6 make my internet faster?

Not in a way you'd notice for normal use. IPv6 can reduce latency slightly because it eliminates the NAT translation step, but the difference is marginal for browsing, streaming, and most online activity. Where it can help is peer-to-peer connections (gaming, video calls) where NAT traversal sometimes adds delays or prevents direct connections.

Can I disable IPv6?

You can, but you probably shouldn't. Disabling IPv6 used to be common troubleshooting advice, but modern operating systems and networks handle it well. Disabling it can actually cause problems on networks that rely on it. Only disable IPv6 if you've identified a specific issue caused by it and you know what you're doing.

Is IPv6 more secure than IPv4?

IPv6 was designed with IPsec (encryption) as a core feature, but in practice, security depends on your network configuration, not the IP version. Both protocols are equally secure or insecure depending on how your network is set up. Don't choose one over the other for security reasons alone.

My ISP doesn't support IPv6. Is that a problem?

Not really. IPv4 with NAT works fine for virtually everything. You might miss out on slightly better peer-to-peer connectivity, but for browsing, streaming, gaming, and general use, IPv4 is perfectly adequate. IPv6 support will likely come to your ISP eventually as part of the industry-wide transition.

Understanding IP Addresses

Does my IP address change?

If you have a dynamic IP (most home connections), yes – it can change after a router reboot or when your ISP rotates addresses. It might stay the same for days or weeks, then change. This is normal and doesn't affect anything for typical use.

Can a website know my exact home address from my IP?

No. IP geolocation gives an approximate area – usually your city or region, sometimes just your ISP's service area. It's often wrong by miles. Only your ISP knows which account is tied to a specific IP address, and they only share that with law enforcement via legal process.

What's the difference between IPv4 and IPv6?

IPv4 addresses look like 192.168.1.1 (four groups of numbers). IPv6 addresses are much longer, like 2001:0db8:85a3:0000:0000:8a2e:0370:7334. IPv6 was created because the world ran out of IPv4 addresses. Most networks support both. As a regular user, you don't need to worry about which one you're using – it's handled automatically.

Should I hide my IP address with a VPN?

It depends on your threat model. For everyday browsing, your IP address doesn't reveal much beyond your general location. A VPN is useful if you want to prevent websites from logging your real IP, access geo-restricted content, or add privacy on public Wi-Fi. For most home use, it's a nice-to-have, not a necessity. See VPN Basics for more.

What does "192.168" mean?

Addresses starting with 192.168. are private IP addresses reserved for local networks. They only work inside your home network and can't be reached from the internet. Almost every home router uses this range to assign addresses to your devices. The 10.x.x.x and 172.16-31.x.x ranges are also private. If you see one of these, it's a local address, not your public one.

Reset Network Adapter

Will resetting my network adapter forget my saved Wi-Fi passwords?

On Windows, a full network reset (through Settings) will erase all saved Wi-Fi passwords – you'll need to re-enter them. On Mac, Wi-Fi passwords are stored in Keychain and usually survive a service removal. On Linux, removing a connection with nmcli connection delete removes its saved password too.

When should I do a full reset vs. just toggling the adapter?

Start with the toggle (off/on). If that doesn't fix it, try the quick terminal commands. Only do a full reset if you're dealing with persistent issues like the adapter not appearing at all, repeated "no internet" errors after connecting, or corruption after an OS update. A full reset is the sledgehammer – it works, but you'll spend a few minutes reconnecting everything.

My adapter shows "connected" but I have no internet. What's going on?

This usually means your computer connected to the router but can't reach the wider internet. Common causes: your router lost its upstream connection (restart it), your DNS is broken (try flushing DNS or changing to 1.1.1.1), or your network stack is corrupted (the command line resets in this guide fix that). Try pinging 1.1.1.1 from Terminal or Command Prompt – if that works but websites don't load, it's a DNS problem, not an adapter problem.

Is it safe to delete macOS network config files?

Yes, as long as you back them up first (move to Desktop, don't delete). macOS regenerates these files on restart with default settings. The worst that happens is you need to re-enter Wi-Fi passwords and reconfigure any custom network settings like static IPs or proxy configurations.

Change DNS Settings

Will changing my DNS server speed up my internet?

It can improve the time it takes to look up website addresses, which may make pages start loading slightly faster. However, it will not increase your overall download or upload speeds, as those are determined by your internet plan.

Is it safe to use a third-party DNS server?

Yes, reputable DNS providers like Cloudflare (1.1.1.1) and Google (8.8.8.8) are safe and often faster than your ISP's default DNS. Some also offer additional privacy protections and malware filtering.

Do I need to restart my computer after changing DNS?

Usually not. Changes take effect immediately for new connections. If you notice issues, try flushing your DNS cache or restarting your browser first. A full restart is rarely necessary.

Port Forwarding

Is port forwarding safe?

It's safe when done correctly, but it does increase your attack surface. You're intentionally poking a hole in your router's firewall, so the service behind that port needs to be secure and up to date. Only forward ports you actively need, and close them when you're done.

Why can't anyone connect to my server even after port forwarding?

The most common causes: the service isn't actually running, your device's local firewall is blocking the port (Windows Defender, for example), the internal IP address in the rule is wrong (check if it changed), or your ISP uses CGNAT (Carrier-Grade NAT), which means you don't have a real public IP address. If your public IP starts with 100.64.x.x or your router's WAN IP doesn't match what whatismyip.com shows, you're behind CGNAT and port forwarding won't work without contacting your ISP.

What's the difference between TCP and UDP?

TCP is reliable and ordered – it makes sure every packet arrives and in the right sequence. It's used for web browsing, file transfers, and SSH. UDP is faster but doesn't guarantee delivery – it's used for real-time applications like gaming, video streaming, and voice chat where speed matters more than perfection. When setting up port forwarding, use whatever protocol your service requires. When in doubt, forward both.

Do I need port forwarding if I use a VPN?

If everyone connecting to your service is on the same VPN network (like Tailscale or WireGuard), no – they can reach your service through the VPN tunnel without any port forwarding. But if you need public access (random Minecraft players joining your server, for instance), you still need port forwarding or a reverse tunnel service.

Does port forwarding affect my internet speed?

No. Port forwarding is just a routing rule – it tells your router where to send specific traffic. It doesn't change your bandwidth, add latency, or affect any other traffic on your network.

Hotspot and Tethering

How much data does hotspot use?

It depends entirely on what you're doing. Browsing and email use minimal data (a few MB per hour). Video calls use 1-2 GB per hour. Streaming HD video uses 3-5 GB per hour. OS updates can be several gigabytes. If you're on a limited data plan, avoid streaming and large downloads, and check your data usage in your phone's settings.

Is hotspot slower than regular Wi-Fi?

Usually yes. You're limited by your cellular connection speed, which varies with signal strength and network congestion. A good 5G connection can match or beat slow home Wi-Fi, but a weak LTE signal might feel painfully slow. USB tethering is typically faster and more stable than Wi-Fi hotspot because there's no wireless overhead.

Can my carrier tell I'm using hotspot?

Yes. Carriers can detect hotspot traffic and many plans treat it differently from regular phone data. Some plans include unlimited phone data but cap hotspot data at a lower amount or throttle hotspot speeds. Check your specific plan details.

Why does my hotspot keep disconnecting?

On iPhone, the hotspot turns off automatically if no device is connected for a few minutes to save battery. On Android, there's usually an Auto turn off setting you can disable. Also check that your laptop isn't switching to a different Wi-Fi network – Windows and Mac both auto-join saved networks, which can cause your device to jump off the hotspot.

Can I use hotspot for work video calls?

Yes, if your cellular signal is decent. Video calls need about 2-5 Mbps upload and download. Run a speed test first to check. Use USB tethering if possible for the most stable connection, and close other apps that might use bandwidth in the background.

Captive Portal Troubleshooting

What is a captive portal?

It's the login or terms-acceptance page that appears when you connect to public Wi-Fi at hotels, airports, coffee shops, and similar places. The Wi-Fi network intercepts your first web request and redirects you to this page before allowing internet access. Until you complete the portal, your device is connected to Wi-Fi but has no actual internet.

Why does the portal work in Safari but not Chrome?

Safari has tighter integration with the operating system's captive portal detection on Apple devices. Chrome (and other browsers) force HTTPS connections more aggressively, which prevents the portal from intercepting and redirecting your request. When you're stuck, always try Safari on Apple devices or Edge on Windows first.

The login page loaded but my internet still doesn't work after signing in.

Try opening a new browser tab and loading a fresh page. Some portals take a moment to register your device. If it still doesn't work, forget the network and reconnect – sometimes the portal needs to see a completely new connection. Also close and reopen your VPN if you use one, as it may need to re-establish its tunnel.

How do I avoid captive portal issues entirely?

You can't fully avoid them at places that use them, but you can reduce problems: temporarily disable your VPN and custom DNS before connecting, use Safari (Apple) or Edge (Windows) as your first browser, and keep http://neverssl.com bookmarked for quick access when the portal doesn't appear.

Is public Wi-Fi with a captive portal secure?

Not really. The portal just controls access – it doesn't encrypt your traffic. Other people on the same network can potentially see your unencrypted traffic. Use a VPN after you've signed in through the portal to protect your data. Stick to HTTPS websites (check for the lock icon in your browser) and avoid logging into sensitive accounts without a VPN active.

Flush DNS Cache

What does the DNS cache actually do?

Your computer keeps a local list of recently visited domain names and their IP addresses so it doesn't have to look them up every single time. This speeds things up, but if a record changes (like when a site moves servers), the stale entry can point you to the wrong place.

Will flushing DNS break anything?

No. The only effect is that your next visit to each website will take a fraction of a second longer while your computer fetches fresh DNS records. Everything gets re-cached automatically as you browse.

How often should I flush my DNS cache?

Only when you have a reason to. Common situations: you changed your DNS server, a website isn't loading that works for others, you're seeing an old version of a site after a domain migration, or you're doing DNS-related troubleshooting. There's no benefit to flushing on a schedule.

I flushed DNS but the site still won't load. What now?

Your browser has its own DNS cache separate from the OS. In Chrome, go to chrome://net-internals/#dns and click Clear host cache. You can also try clearing your browser cache or restarting the browser entirely. If the site still doesn't load, the issue is likely upstream (the site itself, your ISP, or your DNS provider).

VPN Basics

Does a VPN slow down my internet?

Yes, usually a little. Your traffic goes through an extra server, which adds latency. The effect depends on how far away the VPN server is and how loaded it is. For typical work VPN use (accessing internal tools, email), the slowdown is barely noticeable. If your VPN is making everything painfully slow, ask IT if they can enable split tunneling so only work traffic goes through the VPN.

What is split tunneling?

Split tunneling means only some of your traffic goes through the VPN (usually just traffic destined for your company's internal network), while the rest goes directly to the internet as normal. Without split tunneling, everything goes through the VPN – including YouTube, Spotify, and your personal browsing. IT controls this setting, not you, but it's worth asking about if your VPN makes everything slow.

Why can't I access printers or local devices when connected to VPN?

When the VPN is active, your device joins a different network (your company's). Local network devices like printers, NAS drives, and smart home gadgets are on your home network, which the VPN tunnel can't see. Split tunneling (if enabled) usually fixes this by keeping local traffic on your home network. Otherwise, disconnect from the VPN when you need local devices.

Do I need a VPN on public Wi-Fi?

For work resources, yes – that's exactly what a work VPN is for. For general browsing on public Wi-Fi, the risk is lower than people think because most websites already use HTTPS encryption. A personal VPN adds a layer of privacy from the Wi-Fi operator, but it's not strictly necessary for security on modern websites.

My VPN keeps disconnecting. What can I do?

Start with the basics: make sure your regular internet connection is stable (a flaky Wi-Fi connection will make the VPN flaky too). Check that your VPN client is up to date – older versions sometimes have compatibility issues with newer OS updates. If you're on Wi-Fi, try switching to a wired connection to rule out signal issues. If the VPN drops at regular intervals, it might be a session timeout setting on the server side that your IT team can adjust.

VPN says "connected" but I can't reach anything internal.

This usually means the VPN tunnel is up but DNS isn't resolving internal hostnames. Try accessing an internal resource by IP address instead of name. If that works, it's a DNS issue – your VPN client isn't setting the right DNS servers. Reconnecting the VPN or restarting the client usually fixes it. If it doesn't, let IT know – it's a server-side DNS configuration problem.

Network Speed Explained

Why is my upload speed so much slower than download?

Most home internet connections are asymmetric by design – ISPs allocate more bandwidth to downloads because that's what most household traffic is (streaming, browsing, downloads). Fiber connections often offer equal upload and download. If you need better upload for video calls or streaming, check if fiber is available in your area.

Is 100 Mbps fast enough?

For most households, yes. 100 Mbps comfortably handles multiple HD streams, video calls, gaming, and general browsing at the same time. You'd only need more if you regularly do large file transfers, have many simultaneous 4K streams, or have a house full of heavy users.

Why does my speed test show good results but everything still feels slow?

Speed isn't the only factor. High latency or jitter can make a fast connection feel sluggish, especially for video calls and interactive use. Also check if a specific device is slow (a Wi-Fi issue) versus everything being slow (an internet issue). Browser extensions, a full disk, or an overloaded device can make things feel slow even with a fast connection.

Does a faster plan fix lag in online games?

Usually not. Gaming uses very little bandwidth (3-5 Mbps). Lag in games is almost always a latency or jitter problem, not a speed problem. A wired connection, a closer game server, and a router that handles bufferbloat well (look for routers with SQM or QoS features) make a bigger difference than upgrading from 100 Mbps to gigabit.

What's the difference between Mbps and MBps?

Mbps (lowercase b) is megabits per second – how ISPs measure internet speed. MBps (uppercase B) is megabytes per second – how your computer shows file download speeds. There are 8 bits in a byte, so divide Mbps by 8 to get MBps. A 100 Mbps connection downloads at about 12.5 MBps.

Wi-Fi Troubleshooting

Why is my Wi-Fi slow on this device but fine on others?

The problem is almost certainly your device, not your router. Check for background downloads or updates, close unnecessary browser tabs, and make sure your Wi-Fi driver is current. On older laptops, the built-in Wi-Fi card may only support slower standards (802.11n vs 802.11ac/ax), which limits your speed regardless of your internet plan.

What does "No Internet, Secured" mean on Windows?

It means your device connected to the router and the connection is encrypted (that's the "secured" part), but the router can't reach the internet. This is usually an IP conflict or a DNS issue. Try forgetting the network and reconnecting, or run the Network reset from Settings. If every device on your network has the same problem, the issue is your router or ISP, not your computer.

Should I use 2.4 GHz or 5 GHz?

Use 5 GHz when you're close to the router – it's faster and less crowded. Use 2.4 GHz when you're far away or have walls between you and the router – it has better range but slower speeds and more interference from other devices. If your router supports it, a single SSID with band steering handles this automatically.

How do I know if something is interfering with my Wi-Fi?

Microwave ovens, baby monitors, cordless phones, and Bluetooth devices all use the 2.4 GHz band. If your Wi-Fi drops when someone uses the microwave, that's your answer. Switch to 5 GHz or move the router away from these devices. You can also check for competing networks on the same channel using your OS's Wi-Fi diagnostics tools.

I keep getting disconnected from Wi-Fi. What's different from slow Wi-Fi?

Disconnections are usually a signal problem (too far from the router, interference) or a power management issue. On Windows, open Device Manager, find your Wi-Fi adapter under Network adapters, right-click it, go to Properties > Power Management, and uncheck Allow the computer to turn off this device to save power. On Mac, check that your network is set to auto-join in System Settings > Network > Wi-Fi > Details.

Wi-Fi vs Internet: Why You Can Have One Without the Other

Why does my phone say "Connected, no internet" but my laptop works fine?

If other devices on the same network work, the issue is specific to your phone. Try forgetting the Wi-Fi network and reconnecting, or restart your phone. The phone may have cached a bad IP address or DNS setting. If it keeps happening, check that the date and time on your phone are correct — incorrect time can cause connection issues.

Can I have internet without Wi-Fi?

Yes. Wi-Fi is just one way to connect to the internet. You can also use an ethernet cable (plugged directly into the router), mobile data (cellular), or a wired USB tethering connection. Ethernet is actually faster and more reliable than Wi-Fi for devices that stay in one place.

Why do I have to restart my router so often?

Consumer routers are small, low-powered computers running continuously. Over time they can run low on memory, accumulate stale routing table entries, or lose sync with the ISP. A restart clears all of this. If you are restarting more than once a month, your router may be aging out and due for a replacement, or there could be an issue with your ISP connection that is worth investigating.

What is DNS and why does it affect my internet?

DNS (Domain Name System) is like a phone book for the internet. When you type google.com, your device asks a DNS server to look up the actual IP address of that website. If the DNS server is down or unreachable, your device cannot translate website names into addresses, so nothing loads — even though the internet connection itself is working. Switching to a reliable public DNS server like 1.1.1.1 or 8.8.8.8 often fixes this.

Is it my router's fault or my ISP's fault?

A quick way to tell: restart your router. If the problem comes back immediately, it is probably your ISP (the connection from your home to the ISP is down). If restarting fixes it, the router was the issue. You can also check your ISP's status page from your phone's mobile data, or plug a computer directly into the modem with an ethernet cable — if you get internet that way but not through the router, the router is the problem.

Securing Your Home Wi-Fi

How do I log into my router?

Open a browser and go to 192.168.1.1 or 192.168.0.1 (these are the most common router addresses). The default username and password are usually printed on a sticker on the bottom or back of the router. If you changed them and forgot, you can factory reset the router by holding the reset button for 10-15 seconds, but this erases all your settings.

Will changing my Wi-Fi password disconnect all my devices?

Yes. Every device will need to reconnect using the new password. This is annoying but also useful. If someone unauthorized had access, they're now locked out. Reconnect your own devices one at a time.

How often should I change my Wi-Fi password?

You don't need to change it regularly if it's strong and you're using WPA2/WPA3. Change it when you suspect unauthorized access, after giving it to someone who no longer needs it (like a contractor or temporary guest), or if a device on your network was compromised.

Can my neighbors see what I'm doing on my Wi-Fi?

If you're using WPA2 or WPA3 with a strong password, your traffic is encrypted between your device and the router. Neighbors can see that your network exists and roughly how much traffic it generates, but they can't read the actual content. Most websites also use HTTPS, which adds another layer of encryption regardless of your Wi-Fi security.

Is the Wi-Fi password the same as the router admin password?

No, they're separate. The Wi-Fi password is what you enter on devices to connect to the network. The router admin password is what you use to log into the router's settings page. Both should be strong and different from each other.

Passkeys Explained

Do passkeys replace two-factor authentication?

Yes. A passkey combines something you have (your device) with something you are (your biometric) or something you know (your PIN). That covers two factors in one step. You don't need a separate authenticator app or SMS code when using a passkey.

Can I still use my password after setting up a passkey?

Usually yes. Most services keep your password as a fallback when you first add a passkey. You can remove the password later on services that allow it (Google and Microsoft both offer this). Keeping the password temporarily is fine while you get comfortable with passkeys.

What happens if biometrics don't work -- like a wet finger?

You can always fall back to your device PIN or passcode. Passkeys don't require biometrics specifically – they require your device's screen lock method, which includes PIN, pattern, or password.

Are passkeys stored on the website's server?

No. The website only stores a public key, which is useless without your private key. Even if the website gets hacked and the public keys are leaked, attackers can't sign into your account. This is fundamentally different from passwords, where a breach exposes the actual credential.

Should I delete my passwords after setting up passkeys?

Not yet. Keep your passwords around until you're confident the passkey works everywhere you need it. Over time, as you add passkeys to more services and get comfortable, you can remove passwords from sites that support passkey-only sign-in.

QR Codes

Do I need a QR code scanner app?

No. Both iPhone and Android have built-in QR code scanning in the camera app. Third-party QR scanner apps are unnecessary and some are actually adware. Delete them if you have any installed.

Can a QR code install malware on my phone?

A QR code itself is just a link – it can't directly install anything. But it can send you to a website that tries to trick you into downloading malware or entering your credentials. The risk is the destination, not the QR code. Always check the URL before interacting with the page.

How do I know if a QR code is safe?

Check the URL your phone shows before tapping. Look for a legitimate domain, HTTPS, and a URL that makes sense for the context. If a QR code on a parking meter sends you to a random domain instead of the city's official payment site, don't proceed. When in doubt, navigate to the service directly instead of using the QR code.

Can QR codes steal my information just by scanning?

No. Scanning a QR code with your camera only reads the encoded data (usually a URL). It doesn't transmit any of your information. The risk comes after you tap the link and interact with the destination site – entering passwords, payment info, or downloading files.

What's the difference between static and dynamic QR codes?

A static QR code has the URL permanently encoded in the pattern – it always goes to the same place. A dynamic QR code redirects through a service that can change the destination URL at any time. Dynamic codes are useful for businesses but can be abused: a code that was safe yesterday could redirect somewhere malicious today. Prefer scanning codes from trusted, permanent sources.

Staying Safe on Public WiFi

Is hotel WiFi safe?

Not inherently. Hotel WiFi is a shared network, and even password-protected hotel networks share that password with every guest. The password prevents outsiders from joining but does not protect you from other guests on the same network. Use a VPN whenever you are on hotel WiFi, especially for work or anything involving credentials.

Does HTTPS protect me on public WiFi?

Partially. HTTPS encrypts the content of your connection to a specific website, so someone sniffing the network cannot read your passwords or form data on that site. But HTTPS does not hide which sites you visit (DNS queries are typically unencrypted), does not protect non-browser apps, and does not help if you land on a malicious site that mimics a real one. A VPN provides the comprehensive protection that HTTPS alone cannot.

Can someone hack my phone on public WiFi?

It is unlikely that someone will "hack into" your phone just by being on the same WiFi network — modern phones have decent security. The real risk is interception: seeing your unencrypted traffic, stealing session cookies, or tricking you into connecting to a fake network. A VPN and sticking to HTTPS sites eliminates nearly all of this risk.

Should I use a free VPN?

Be cautious with free VPNs. Some monetize by logging and selling your browsing data, which defeats the purpose entirely. Others inject ads or have slow speeds that make them impractical. If your employer provides a VPN, use that. For personal use, a reputable paid VPN service is worth the few dollars per month. See our VPN basics guide for recommendations.

Is mobile data safer than public WiFi?

Yes, significantly. Cellular data is encrypted between your device and the cell tower, and an attacker would need specialized equipment to intercept it — far harder than sniffing WiFi traffic with a laptop. If you have the option, using your phone's hotspot is almost always safer than connecting to public WiFi.

Suspicious Email Attachments

My email provider scans attachments -- am I safe?

Not completely. Gmail, Outlook, and other providers do scan for known malware, and they catch a lot. But scanning can't detect brand-new (zero-day) threats, and attackers design malware specifically to evade scanners. Email scanning is one layer of protection, not a guarantee.

Someone I know sent me a suspicious attachment. Is their account hacked?

Possibly. Contact them through a different channel (phone, text, in person) to ask if they actually sent it. If they didn't, their email account is likely compromised. They should change their password immediately and enable two-factor authentication.

Are PDF files safe to open?

Modern PDF readers handle most threats well, but PDFs can still contain malicious elements. Keep your PDF reader updated, and consider opening PDFs from unknown senders in your browser's built-in viewer (Chrome and Edge both have one) rather than Adobe Acrobat. Don't click on embedded links in PDFs without checking where they go.

What about files shared through Google Drive or OneDrive links?

Links to cloud-shared files are generally safer than direct attachments because the cloud provider scans them too. But a phishing email can still contain a link to a legitimate-looking but fake sign-in page. Before entering your password on any page you reached through an email link, check the URL in your browser's address bar.

Can a file infect my phone?

It's much harder to infect a phone through an attachment than a computer, especially on iPhone where apps are sandboxed. Android is slightly more vulnerable. That said, phishing documents that trick you into entering credentials work on any device. The social engineering threat is the same regardless of platform.

Gift Card and Prepaid Card Scams

Can the IRS or police really demand payment in gift cards?

No. Never. The IRS communicates through official mail, not phone calls, and they accept payment through their website, by check, or through approved payment plans. No government agency, court, or law enforcement organization accepts gift cards as payment. Anyone who says otherwise is lying.

Can I get my money back after a gift card scam?

It's difficult but not always impossible. If you contact the gift card company quickly — ideally within minutes — they may be able to freeze the remaining balance. The longer you wait, the less likely recovery becomes. Always file a report with the FTC regardless, as it helps track scam operations even if your specific funds can't be recovered.

Why do store employees sometimes ask about large gift card purchases?

Many retailers train their staff to recognize potential scam purchases — buying multiple high-value gift cards, especially while on the phone. If a cashier asks you about it, they're trying to help. Be honest with them. Some stores have even refused sales that looked suspicious, saving customers thousands of dollars.

What if someone I know online asks for gift card help?

This is a major red flag, especially if you've never met the person in real life. Romance scammers and online con artists specifically build trust over weeks or months before making financial requests. A legitimate person will understand if you say no. If they get angry, disappear, or increase the pressure, that confirms it's a scam.

Are digital gift cards safer than physical ones?

No. The scam works the same way whether you buy a physical card at a store or a digital code online. The scammer just needs the code number. There is no safe way to use gift cards as payment to someone demanding them.

Modern Malware Explained

Is my Mac safe from viruses?

Safer than Windows, but not immune. Macs have strong built-in protections, and most malware targets Windows because it has a much larger market share. But Mac malware exists, especially info stealers targeting saved passwords and cookies. Don't install software from untrustworthy sources, and you'll avoid most risks.

Can I get a virus just by visiting a website?

It's extremely rare with a modern, updated browser. "Drive-by downloads" used to be a real threat, but modern browsers have sandboxing and security features that make this very difficult. The real risk is clicking a download link on a malicious site and running whatever it gives you. Keep your browser updated and you're well protected against passive exploits.

Are free antivirus programs safe?

Windows Defender is free and trustworthy. Malwarebytes (free version) is good for on-demand scans. Be cautious with other free antivirus programs – some are essentially adware themselves, bundling toolbars and browser modifications. If a free antivirus is aggressively telling you to upgrade to the paid version with scary warnings, it may be exaggerating threats.

How is malware different from adware?

Adware shows you unwanted ads, redirects your searches, and slows your computer. It's annoying but usually not dangerous. Malware like info stealers, keyloggers, and RATs is designed to steal your data or control your computer. Adware is a nuisance; malware is a genuine security threat. Some software is both.

Should I pay for antivirus software?

For most home users, no. Windows Defender scores as well as paid options in independent tests. Paid antivirus suites add features like VPNs, password managers, and identity monitoring, but you can get those separately (and often better) from dedicated services. If you want one package that does everything, paid options aren't bad – but the free built-in protection plus common sense is enough for most people.

Deepfakes and AI Voice Scams Explained

Can someone really clone my voice from a short clip?

Yes. Current AI voice cloning tools can produce a convincing copy from as little as 3 seconds of audio. Longer samples produce better results, but even a short voicemail greeting or a social media clip is enough. This is why the call-back verification method is so important — you cannot reliably tell a clone from the real voice over a phone call.

Are deepfake video calls common?

They're less common than voice clones because they require more setup, but they are increasing. Most reported cases involve business fraud — impersonating a CEO or executive on a video call to authorize a wire transfer. For everyday scams targeting individuals, voice cloning is far more common because it's simpler and more effective.

Can my phone detect deepfake calls?

Not yet in any reliable way. Some companies are developing AI detection tools, but nothing widely available on consumer phones can reliably identify a cloned voice during a live call. The best defense remains behavioral: hang up and call back on a verified number.

Should I stop posting videos online?

You don't need to go silent on social media, but it's worth being thoughtful about it. Adjust your privacy settings so your content is visible only to people you know, and be aware that any public audio or video could potentially be used for cloning. The practical defense is still the same regardless: always verify urgent requests through a separate channel.

What if the scammer already knows personal details about me?

Scammers often combine deepfake technology with information gathered from social media, data breaches, or public records. A cloned voice plus knowledge of your family members' names, workplace, or recent activities makes the scam much more convincing. This is why a secret code word is valuable — it's something that can't be found online.

Adware Explained

Is adware the same as a virus?

No. Adware is annoying and invasive – it displays unwanted ads, redirects your searches, and slows your computer. But it typically doesn't destroy your files, steal your passwords, or cause serious damage. That said, adware can sometimes be bundled with more dangerous malware, so you should still remove it promptly.

Will a factory reset remove adware?

Yes, but it's usually overkill. Try the removal steps above first. A factory reset wipes everything, including your files and programs. If adware is persistent and nothing else works, a reset will definitely clear it, but make sure you back up your files first.

How do I avoid getting adware in the first place?

Always choose Custom or Advanced installation when installing free software and uncheck any bundled extras. Download software only from official sources. Be careful with browser extensions – stick to well-known ones with high ratings and many users. See the browser extensions guide for vetting extensions.

Can adware steal my personal information?

Basic adware just shows ads, but some aggressive variants track your browsing habits, search history, and even keystrokes. If you suspect your adware is more than just ads, run a full malware scan and change your important passwords from a clean device. See what to do if your account is compromised.

My browser keeps resetting to a weird search engine. Is that adware?

Almost certainly, yes. A changed default search engine or homepage that keeps coming back after you fix it is a classic sign of adware or a browser hijacker. Follow the removal steps for your OS above, paying special attention to browser extensions and startup items.

Password Managers

What if I forget my master password?

Most password managers use zero-knowledge encryption, which means they cannot recover your master password for you. If you forget it, your vault is locked permanently. This is why you should write down your master password and store it somewhere physically secure (a locked drawer, a safe deposit box) when you first set it up. Bitwarden and 1Password also offer recovery options like emergency access contacts and recovery keys — set those up early.

Are password managers safe? What if they get hacked?

Password managers are significantly safer than the alternative (reusing passwords or keeping them in a spreadsheet). Your vault is encrypted with AES-256 before it leaves your device, so even if the company's servers are breached, attackers get encrypted data they cannot read without your master password. Use a strong, unique master password and enable two-factor authentication on your password manager account itself. Bitwarden and KeePassXC are open source, so their security code is publicly audited.

Should I use my browser's built-in password saving?

Browser-based password saving (Chrome, Firefox, Safari) is better than nothing and fine for casual use. However, dedicated password managers offer stronger features: better password generation, secure sharing, cross-browser support, emergency access, breach monitoring, and secure notes. If you are already using browser-saved passwords, most managers can import them so you do not lose anything by switching.

Can I share passwords with my team at work?

Yes. 1Password, Bitwarden, and most other managers offer business and team plans with shared vaults, role-based access, and admin controls. Shared items stay encrypted end-to-end. This is far safer than sharing passwords through email, Slack, or shared documents. If your company does not have a team password manager yet, suggest it — it is one of the highest-impact security improvements an organization can make.

Recognizing and Avoiding Phishing

What should I do if I already clicked a phishing link?

Change your passwords immediately, starting with your email and banking accounts. Enable two-factor authentication where available. Run a malware scan on your device. If you entered financial information, contact your bank. Monitor your accounts for unusual activity over the next few weeks.

Can phishing happen through text messages?

Yes. This is called "smishing" (SMS phishing). Scammers send text messages with malicious links, often disguised as delivery notifications, bank alerts, or account verification requests. The same rules apply: do not click suspicious links, and go directly to the official website if you need to check something.

How can I tell if an email is actually from my bank or company?

Check the sender's full email address, not just the display name. Hover over any links to see the actual URL. Legitimate organizations will never ask for your password via email. When in doubt, open a new browser tab and navigate directly to the official website instead of clicking links in the email.

Social Engineering Attacks

What's the difference between phishing and social engineering?

Phishing is one type of social engineering. Social engineering is the broader category — it includes any attack that manipulates people rather than technology. Phishing specifically uses fraudulent messages (email, text, etc.) to trick you. Other social engineering attacks use phone calls, physical access, impersonation, or baiting.

Can social engineering happen to tech-savvy people?

Absolutely. Social engineering targets human psychology, not technical knowledge. Some of the most successful attacks have targeted IT professionals and security researchers. Being aware of the techniques helps, but nobody is immune — which is why verification procedures matter more than confidence.

What should I do if I think I gave information to a scammer?

Act immediately. Change any passwords you shared. If you gave financial details, contact your bank to freeze the account. If you installed remote access software, disconnect from the internet and run a malware scan (or have IT wipe the machine). Report the incident to your IT team and relevant authorities. See our compromised account response guide for a full checklist.

Why do companies do social engineering training?

Because technology alone can't stop these attacks. Firewalls and antivirus don't help when an employee hands over their credentials willingly. Regular training helps people recognize the patterns — urgency, authority, unusual requests — before they act on them. One informed employee can stop a breach.

Are social engineering attacks illegal?

Yes. Social engineering attacks that involve fraud, identity theft, unauthorized computer access, or theft are crimes in virtually every jurisdiction. However, prosecution can be difficult because attackers often operate from other countries. Prevention and awareness are more effective than relying on law enforcement after the fact.

Two-Factor Authentication (2FA)

What if I lose my phone?

This is why backup methods matter. Use your recovery codes to sign in, then set up 2FA on your new device. If you used Google Authenticator with cloud backup enabled or Authy with multi-device, your codes may transfer automatically. Otherwise, you will need recovery codes for each account. If you have no recovery codes and no backup method, you will need to go through the service's account recovery process, which can take days.

Is SMS-based 2FA safe?

It is significantly better than no 2FA, but it is the weakest option. SIM swapping attacks — where someone convinces your phone carrier to transfer your number — can intercept SMS codes. High-value targets (public figures, crypto holders, journalists) should avoid SMS-based 2FA. For most people, SMS 2FA still blocks the vast majority of attacks. Switch to an authenticator app when you can.

Do I need 2FA if I have a strong password?

Yes. A strong password protects you from guessing and brute force attacks, but not from phishing, data breaches, or keyloggers. If your password gets leaked in a breach (which happens regularly to major services), 2FA is the only thing stopping an attacker from using it. They are complementary protections, not alternatives.

What are recovery codes and where do I find them?

Recovery codes are one-time backup codes generated when you set up 2FA. They let you sign in when you cannot use your normal second factor. Find them in your account's security settings, usually near the 2FA setup page. Google: Security > 2-Step Verification > Backup codes. Microsoft: Security > Additional security options > Recovery code. Generate and save them before you need them.

Can I use the same authenticator app for all my accounts?

Yes. A single authenticator app (like Microsoft Authenticator or Authy) can hold codes for dozens of accounts across different services. Each account appears as a separate entry with its own rotating code. This is the recommended approach rather than using a different app per service.

What is a security key and do I need one?

A security key is a physical device (like a YubiKey) that plugs into USB or taps via NFC to verify your identity. It is the most secure form of 2FA because it is immune to phishing — the key cryptographically verifies you are on the real website, not a fake one. Most people are fine with an authenticator app, but security keys are worth considering if you handle sensitive data or want maximum protection.

What is the difference between a passkey and 2FA?

Traditional 2FA adds a second step after your password. A passkey replaces the password entirely — you sign in with just your fingerprint or face. Passkeys are technically more secure than most 2FA methods because they are phishing-resistant by design and there is no password to steal or leak.

Can I use passkeys and 2FA at the same time?

It depends on the service. Some services treat a passkey as your complete sign-in method (replacing both password and 2FA). Others let you use a passkey as a second factor alongside your password. Google, for example, lets you sign in with just a passkey, skipping the password and 2FA steps entirely.

What happens to my passkeys if I switch devices?

If your passkeys are stored in iCloud Keychain, they sync to your new Apple device automatically. On Android, they sync through your Google account. If you use a password manager like KeePassXC, 1Password, or Bitwarden, your passkeys are available anywhere the manager is installed. Windows Hello passkeys are device-specific unless you also save them in a cross-platform password manager.

BitLocker and FileVault Disk Encryption

What happens if I lose my recovery key?

If you forget your password and lose your recovery key, the encrypted data is gone. That is the entire point of encryption — without the key, nobody can access the drive, including you. Always store your recovery key in at least two places (cloud account and a physical or offline backup).

Does disk encryption slow down my computer?

On modern hardware, the performance impact is negligible. Apple Silicon Macs handle encryption in hardware with no measurable slowdown. Windows machines with AES-NI support (virtually all CPUs from the last decade) see less than 1-2% impact in normal use. You will not notice a difference.

Is my data encrypted by default?

On Apple Silicon Macs, hardware-level encryption is always active, but FileVault (which ties it to your password) may not be. On Windows 11 devices with a Microsoft account, TPM 2.0, and Secure Boot, device encryption is often enabled automatically. Check using the steps above to be sure.

Can I encrypt an external drive?

On Mac, right-click the drive in Finder and select Encrypt. On Windows Pro, right-click the drive in File Explorer and select Turn on BitLocker. Windows Home does not support BitLocker for external drives without third-party tools.

Does encryption protect me if my computer is hacked remotely?

No. Disk encryption protects data at rest, meaning when the computer is off or the drive is removed. If someone gains remote access while you are logged in, the drive is already unlocked and encryption does not help. You need other security measures (strong passwords, 2FA, firewall) for that.

Ransomware Explained

Should I pay the ransom?

No. The FBI and nearly every cybersecurity organization advises against paying. Studies show that only about half of victims who pay actually get their data back in usable condition, and paying marks you as a willing target for future attacks. It also directly funds criminal operations.

Can my phone get ransomware?

It's rare but possible, especially on Android. Stick to official app stores, don't sideload apps from random websites, and keep your phone updated. iPhone ransomware is extremely uncommon due to Apple's app restrictions.

Will antivirus stop ransomware?

Antivirus software can catch known ransomware variants, but new ones appear constantly. Antivirus is one layer of defense, not a guarantee. Backups are the only thing that truly makes you ransomware-proof.

How do I know if I have ransomware?

The signs are hard to miss: your files suddenly have strange extensions (like .encrypted or .locked), you can't open your documents, and there's a ransom note on your screen or in every folder. If your computer is just slow or acting odd, that's more likely a different type of malware.

Is ransomware only a business problem?

No. While businesses are targeted more often because they can pay more, individuals get hit too. Home users are often targeted through phishing emails and malicious downloads. The average individual ransom demand is lower, but losing your personal photos, documents, and files is devastating regardless of the dollar amount.

What to Do If Your Account Is Compromised

How do I know if I have been hacked?

Signs include: password suddenly stops working, login alerts from locations you do not recognize, messages in your sent folder you did not write, friends telling you they received strange messages from you, unexpected password reset emails, unfamiliar devices in your account's security settings, or unauthorized transactions. Check haveibeenpwned.com to see if your email has appeared in known data breaches.

What is Have I Been Pwned?

Have I Been Pwned is a free service created by security researcher Troy Hunt that lets you check if your email address or passwords have been exposed in data breaches. Enter your email at haveibeenpwned.com and it shows which breaches included your data. It also has a password checker (safe to use — it does not send your full password) and a notification service that emails you if your address appears in future breaches. Everyone should check it periodically.

Should I delete a compromised account?

Usually not right away. If you delete the account, an attacker could potentially recreate it with the same username or email and impersonate you. Instead, secure the account (new password, 2FA, clean up damage), then decide later whether you still want it. If you do decide to delete, make sure you have migrated any important data and updated any services that depend on that account first.

Can someone hack me again after I change my password?

Yes, if the original method of compromise is still active. If your password was stolen by malware on your device, the malware will capture your new password too — run a malware scan first. If you reused the same password elsewhere, change it everywhere. If the attacker set up email forwarding or connected apps, they can maintain access even after a password change. That is why the full checklist above is important, not just the password change.

Using AI Safely and Understanding Its Limitations

Is it safe to use ChatGPT and other AI tools?

Yes, for everyday tasks like writing drafts, brainstorming, and learning. The risk is not that AI tools are dangerous software — it's that people trust the output too much or share sensitive information. Use them as helpful assistants, not infallible experts.

Can AI steal my personal information?

AI chatbots don't actively steal information, but anything you type into them may be stored and potentially used for training future models. This is why you should never enter passwords, financial data, or confidential information. If it's something you wouldn't post publicly, don't put it in a chatbot.

How can I tell if something was written by AI?

There is no foolproof way. AI-generated text tends to be grammatically polished, somewhat generic, and confidently stated. AI detection tools exist but are unreliable — they frequently flag human-written text as AI and miss actual AI text. Focus less on detecting AI content and more on verifying whether information is accurate regardless of who or what wrote it.

Will AI replace my job?

AI is changing how many jobs work, but it's much better at assisting people than replacing them entirely. It handles routine tasks well but struggles with nuance, judgment, and real-world context. The people most at risk are those who ignore AI completely or those who trust it completely. Learning to use AI as a tool — while understanding its limits — is the practical middle ground.

Is AI getting better at being accurate?

Slowly, yes. Newer models hallucinate less often than older ones. But hallucination is a fundamental aspect of how current AI works, not a simple bug to fix. Even the best models still make things up. Verification will remain important for the foreseeable future.

Strong Passwords 101

How long should my password be?

At least 16 characters, but longer is better. A 4-word passphrase naturally hits 20+ characters. If a site has a maximum length (some still do), fill it.

Are password generators better than passphrases?

Password generators create strings like x7#mK9$pL2@qR which are strong but impossible to remember. They're great when paired with a password manager. If you need to actually memorize a password (like your master password), a passphrase is the better approach.

Should I change my passwords regularly?

Only if there's a reason to — like a breach notification or suspicious activity. The old advice to change passwords every 90 days has been dropped by most security guidelines (including NIST). Frequent forced changes lead to weaker passwords because people just increment a number at the end.

Is it safe to write passwords down?

A piece of paper in your wallet is honestly safer than reusing the same password everywhere. It protects against the most common threat (remote attackers trying leaked credentials) even if it doesn't protect against someone physically searching your desk. A password manager is the better solution, but a written list beats reuse.

What about security questions like "mother's maiden name"?

Treat them as extra passwords, not real answers. Your mother's maiden name, first pet, and high school are all findable on social media. Put random answers in your password manager instead. If the question is "What city were you born in?" the answer can be pineapple fortress.

Outlook Setup and Troubleshooting

What happened to classic Outlook?

Microsoft is phasing out classic Outlook in favor of the new Outlook, which is built on the same engine as Outlook on the web. On Windows, the new version is now the default for new Microsoft 365 installations, but you can still switch back to classic temporarily. On Mac, legacy Outlook is scheduled to lose support for new Exchange Online connections. Classic Outlook will continue receiving security updates for a transition period, but new features are only being added to the new version.

Can I use Outlook with a Gmail account?

Yes. The new Outlook supports Google accounts natively. When adding an account, enter your Gmail address and sign in through Google's authentication flow. Your Gmail inbox, contacts, and Google Calendar will sync into Outlook. Some Gmail-specific features like labels don't translate perfectly (they show as folders), but mail, calendar, and contacts work well.

Why are my emails stuck in the outbox?

This usually means Outlook can't connect to the mail server. Check your internet connection first. Then try closing and reopening Outlook. If the email is still stuck, open the outbox, double-click the stuck message, and try sending it again. Large attachments (over 20 MB for most providers) are a common cause. Compress the file or share it via OneDrive instead. If nothing works, remove your account from Settings > Accounts and add it back.

Can I still use classic Outlook if I prefer it?

For now, yes. On Windows, you can toggle back by clicking the switch labeled "New Outlook" in the top-right corner of the new Outlook window. On Mac, if you have the legacy version installed, you can still open it. However, Microsoft is gradually removing the toggle and pushing everyone to the new version, so it's worth getting comfortable with it now.

Why is my calendar not syncing?

First, make sure the calendar is toggled on in the sidebar. If it's a shared calendar, the owner may need to re-share it with your account. For Google Calendar in Outlook, sync can take a few minutes after initial setup. If nothing shows up after 10 minutes, remove and re-add the account. For Exchange or Microsoft 365 calendars, check with your IT admin to make sure calendar sync is enabled for your account.

Teams and Zoom Meeting Basics

Do I need to install Teams or Zoom to join a meeting?

No. Both support joining from a web browser. Click the meeting link and look for "Join from your browser" or a similar option. The browser version has most features but may lack virtual backgrounds or advanced settings.

Why can nobody hear me in the meeting?

First check that you are not muted (look for the line through the mic icon). Then click the arrow next to the mic button and make sure the correct microphone is selected. If that does not help, check your operating system's privacy settings to confirm the app has microphone permission. As a last resort, leave and rejoin the meeting.

Can I use Teams and Zoom at the same time?

Technically yes, but it is not recommended. Both apps will compete for your microphone and camera, which can cause audio and video to stop working in one or both. If you need to be in two meetings, mute your mic and camera in the one you are not actively participating in.

How do I know if I am being recorded?

Both Teams and Zoom display a visible recording indicator when someone starts recording. In Teams, a red dot and "Recording" banner appear at the top. In Zoom, a red "Recording" label appears in the top-left corner. You will also hear an audio notification in Zoom when recording starts.

Why does my virtual background look glitchy?

Virtual backgrounds work best with a solid, evenly lit wall behind you and a reasonably powerful computer. If your background flickers or cuts off parts of your face, try improving your lighting, sitting farther from the background, or using a simpler image. Older hardware may struggle with this feature entirely.

Email Client Setup

What's the difference between SSL/TLS and STARTTLS?

Both encrypt your email connection. SSL/TLS establishes an encrypted connection immediately on a dedicated port (like 993 for IMAP). STARTTLS starts on a regular port (like 587 for SMTP) and upgrades to encryption during the connection. Both are secure. The important thing is to never use "None" or unencrypted connections.

Do I need an app password?

Only if you have two-factor authentication (2FA) enabled on your email account and your email client doesn't support modern OAuth sign-in. Most modern clients (Apple Mail, new Outlook, Thunderbird) support OAuth and will open a browser sign-in window instead. If you're prompted for a password directly in the client, you'll need an app password.

Can I use the same email account in multiple clients?

Yes, as long as you're using IMAP. IMAP syncs everything to the server, so changes you make in one client appear everywhere. If you set up the account as POP3, messages download to one client and may be removed from the server, so your other clients won't see them.

Why does my email client show a different folder structure than webmail?

IMAP clients sometimes map folder names differently. "Sent Mail" in Gmail might appear as "[Gmail]/Sent Mail" in Thunderbird. You can usually fix this in the client's account settings by mapping the Sent, Drafts, Trash, and Archive folders to the correct server-side folders.

Should I use the built-in Mail app or a third-party client?

The built-in options (Apple Mail, new Outlook) work well for most people and integrate with the OS for notifications and calendar. Thunderbird is a solid free alternative that gives you more control over settings. Pick whichever you'll actually use consistently – the protocol and server settings are the same regardless of client.

Gmail Tips and Shortcuts

How do I undo a sent email?

Gmail has an undo send feature, but you need to set the delay. Go to Settings > See all settings > General and find Undo Send. Set the cancellation period to 5, 10, 20, or 30 seconds. After sending an email, a yellow "Undo" banner appears at the bottom-left. Click it within the delay window and the email won't be sent. 30 seconds is the most forgiving option.

Can I schedule emails to send later?

Yes. When composing an email, click the small arrow next to the Send button and select Schedule send. You can pick a suggested time or choose a custom date and time. Scheduled emails appear in the Scheduled folder in the left sidebar where you can cancel or reschedule them.

How do I create an email template in Gmail?

Enable templates first: go to Settings > See all settings > Advanced and set Templates to Enable, then save. To save a template, compose an email, click the three-dot menu in the compose window, go to Templates > Save draft as template > Save as new template. To use it later, open a new compose window, click the three-dot menu, and select your template from the list.

Do search operators work on mobile?

Yes, the same search operators work in the Gmail mobile app. Type them directly into the search bar. The phone keyboard makes it a bit clunky, but operators like from: and has:attachment work the same way.

Will enabling keyboard shortcuts break anything?

No. They only activate when you're not typing in a text field. If you're composing an email or writing in the search bar, the shortcut keys type normally. The only change is that single-key shortcuts work when you're viewing your inbox or reading a message.

Video Call Audio and Video Setup

Why can nobody hear me even though my mic is working in settings?

Your meeting app is probably using the wrong microphone. Click the arrow next to the mute button (Zoom) or go to device settings (Teams/Meet) and check which mic is selected. Bluetooth headphones, USB headsets, and built-in mics all show up separately, and the app may have defaulted to the wrong one.

Why does my audio sound robotic or choppy to others?

This is almost always a network issue, not a microphone issue. If your internet connection is slow or unstable, audio gets compressed or dropped. Try turning off your camera to save bandwidth, moving closer to your router, or switching from Wi-Fi to a wired ethernet connection.

Should I use a headset or my laptop's built-in mic and speakers?

A headset is better in almost every situation. It eliminates echo entirely, picks up your voice more clearly, and lets you hear others without blasting sound into the room. Even cheap wired earbuds are a big upgrade over laptop speakers and mic.

How do I test my setup if I do not have anyone to call?

Use the browser-based tests at thetest.com for instant mic, camera, and speaker checks. Zoom also has a built-in test at Settings > Audio > Test Mic/Speaker, and Teams has Settings > Devices > Make a test call that plays back a recording of your voice.

Why does my camera work in one app but not another?

Each app needs separate permission to access your camera. Check your system's privacy settings to make sure the specific app is allowed. Also, only one app can use the camera at a time, so if another app grabbed it first, the second app will show a blank or error.

Email Signatures

Should I use an image-only signature?

No. Image-only signatures get blocked by most email clients by default (recipients see a broken image icon or nothing at all). They also break on mobile, are inaccessible to screen readers, and cannot be copied or clicked. Use text for your contact info and only include an image for a logo alongside the text.

Can I have different signatures for different situations?

Yes. Gmail, Outlook, and Apple Mail all support multiple signatures. Create separate ones (like "Work" and "Personal" or "Internal" and "External") and choose which to use when composing. In Gmail and Outlook, you can set a default and switch to another from the compose window.

Why does my signature look different when other people receive it?

Email formatting is unreliable. Different email clients render HTML differently, and some strip out styles entirely. Keep your signature simple: use standard fonts (Arial, Helvetica, Verdana), avoid tables for layout when possible, and test by sending yourself an email and checking it in both Gmail and Outlook. Complex HTML signatures almost always break somewhere.

How long should my email signature be?

Four to six lines is the sweet spot. Include your name, title, company, phone number, and one or two relevant links (website, LinkedIn). Anything beyond that gets ignored. Skip inspirational quotes, legal disclaimers you were not told to include, and social media icons for platforms you do not actively use for work.

Why is my signature not showing up on replies?

Check your signature settings to make sure it is set to appear on replies and forwards, not just new messages. In Gmail, this is under Signature defaults in settings. In Outlook, it is in the Choose default signature section. Apple Mail applies signatures per account, so make sure you selected the right one.

Setting Up Email on Your Phone

What gets synced when I add an email account to my phone?

More than just email. Adding a Google account syncs your Gmail, Google Calendar, and Google Contacts. Adding an Exchange or Microsoft 365 account syncs your Outlook mail, calendar, and contacts. You can choose which services to sync during setup, and adjust later in your account settings.

Why does my company require the Outlook app instead of the built-in mail app?

Organizations using Microsoft 365 often set conditional access policies that only allow approved apps to access company data. The Outlook app supports these policies (like requiring a PIN, blocking screenshots, or remote-wiping company data without touching personal stuff). The built-in mail apps usually don't support these security controls.

What's the difference between IMAP and Exchange?

IMAP is a basic email protocol that syncs your inbox across devices. Exchange (and its modern successor, Exchange Online via Microsoft 365) syncs email plus calendar, contacts, and tasks, with features like shared mailboxes, meeting scheduling, and organizational directories. If you have a work account, it's almost certainly Exchange or Microsoft 365, not IMAP.

My email stopped syncing. What should I do?

Start simple: check your internet connection, then force-close and reopen your email app. If that doesn't help, go to your account settings and remove the account, then add it back. For work accounts, your password may have expired or your IT department may have changed a security policy. Check with IT if re-adding the account doesn't work.

Can I have multiple email accounts on my phone at once?

Yes. Both iPhone and Android support multiple email accounts from different providers. You can have a personal Gmail, a work Exchange account, and a custom domain IMAP account all active at the same time, even across different email apps.

Slack Troubleshooting

Why do my Slack notifications stop working after a while?

This is almost always caused by a system-level Focus mode, Do Not Disturb, or notification schedule. On Mac, check System Settings > Focus. On Windows, check Settings > System > Focus. Also check Slack's own notification schedule in Preferences > Notifications > Notification schedule, which can silently mute you outside set hours.

How do I fix Slack using too much memory?

Slack is an Electron app, so it uses more memory than you might expect. Close workspaces and channels you are not using, clear the cache via Help > Troubleshooting > Clear Cache and Restart, and restart the app regularly instead of leaving it running for days. If it is consistently above 2 GB, reinstalling can help reset accumulated bloat.

Can I use Slack in a browser instead of the desktop app?

Yes. Go to your workspace URL (like yourcompany.slack.com) in any modern browser. The web version has most of the same features, including huddles. You lose some notification reliability compared to the desktop app, but it uses less memory and does not require installation.

How do I check if Slack itself is down?

Visit status.slack.com in your browser. It shows real-time status for messaging, connections, and other Slack services. If there is an active incident, the issue is on Slack's end and you just need to wait.

How to Scan Documents

Is phone scanning good enough for official documents?

For most purposes, yes. Phone scans at default settings produce clear, legible PDFs that are accepted for insurance claims, tax filings, HR paperwork, and most legal documents. If a specific organization requires higher quality (like notarized documents or certain government filings), they'll usually specify. For everyday work documents, phone scanning is perfectly fine.

What is OCR and do I need it?

OCR (optical character recognition) converts the text in a scanned image into actual selectable, searchable text. Without OCR, a scanned PDF is just a picture of your document — you can't search it, select text, or copy from it. If you just need to email a signed form, you don't need OCR. If you're scanning documents you'll need to search through later, look for an app with OCR like Adobe Scan.

What resolution should I scan at?

Use 300 DPI for documents — it's the standard for readable, printable quality. Use 150 DPI if you need smaller file sizes and just need something legible on screen. Use 600 DPI for archival scans or when you need to zoom in on fine details. Most phone scanning apps handle this automatically and produce good results without manual adjustment.

Can I scan multiple pages into one PDF?

Yes. On iPhone (Notes or Files), keep scanning pages before tapping Save — they all combine into one PDF. On Android (Google Drive), tap the + icon after each page to add more before saving. Desktop scanning apps also support multi-page PDFs, especially with automatic document feeders.

What's the best free scanning app?

If you just scan occasionally, use what's already on your phone: Notes app on iPhone, Google Drive on Android. If you scan regularly and want better results, Adobe Scan and Microsoft Lens are both free and produce excellent scans with automatic edge detection and OCR. Adobe Scan is the better pure scanner; Microsoft Lens is better if you work in a Microsoft 365 environment and want to save directly to OneDrive.

Managing Email Storage

Why is my Gmail storage full when my inbox looks empty?

Gmail's 15 GB is shared with Google Drive and Google Photos. Even if your inbox is clean, a full Google Drive or years of photos can use up the space. Check one.google.com/storage to see the full breakdown. Also check your Gmail Trash and Spam folders – they count toward your quota until emptied.

Does archiving emails free up space?

No. Archiving only removes emails from your inbox view. They are still in your account and still count toward your storage limit. To free up space, you need to delete emails and then empty the Trash.

What happens when my mailbox is full?

New emails sent to you will bounce back to the sender with a "mailbox full" error. You also will not be able to send emails. In some cases, emails may queue on the sender's server and retry for a few days before bouncing. Fix it by deleting emails and emptying Trash to get under your limit.

How do I find emails with large attachments?

In Gmail, search for has:attachment size:5MB to find emails with attachments over 5 MB. In Outlook, search for hasattachment:yes size:>5MB. Sort results by size to tackle the biggest offenders first.

Should I pay for more storage or just clean up?

Clean up first. Most people have years of newsletters, notifications, and old attachments they will never look at again. A quick cleanup session usually frees up several gigabytes. If you are still running low after a thorough cleanup, paid plans are relatively affordable – Google One starts at a few dollars per month for 100 GB.

Calendar Sharing

Can I share my calendar with someone who uses a different platform?

Yes, but with limitations. Use an ICS link to let them subscribe. They'll see your events as read-only, and updates may take minutes to hours to appear on their end. For real-time, editable sharing, both people need to be on the same platform (both on Google Calendar, both on Outlook, etc.).

What's the difference between sharing and subscribing?

Sharing gives someone direct access to your calendar with specific permissions (view, edit, delegate). Subscribing uses an ICS link to create a read-only copy that updates periodically. Sharing is better for close collaboration. Subscribing is better for one-way visibility, like following a public events calendar.

Why isn't my subscribed calendar updating?

Subscribed ICS calendars refresh on a schedule, not in real time. Google Calendar and Outlook can take several hours to pull updates. In Apple Calendar, you can set the refresh frequency to as often as every 5 minutes (right-click the calendar > Get Info > Auto-refresh). If you need faster updates, check if the calendar provider offers a direct integration instead of ICS.

Can I share just one calendar and keep others private?

Yes, all three platforms let you share individual calendars. Your other calendars remain private. This is why it's useful to create separate calendars for different purposes (work, personal, side projects) – you can share each one independently with different people and permissions.

What does "free/busy" mean?

When you share with "free/busy" permissions, the other person sees blocks of time marked as busy or available but can't see event names, descriptions, or other details. This is useful when you want someone to know when you're available for meetings without exposing what's on your calendar.

Cloud Storage Management

Why is my disk full when I pay for cloud storage?

Cloud storage and local storage are different things. By default, most cloud services sync files to your computer so you can access them offline. This means those files take up space on your local drive and in the cloud. The fix is to enable "stream" or "on-demand" mode so files stay in the cloud and only download when you open them.

What happens if I delete a file from my cloud folder?

It gets deleted from the cloud and all your other devices too. Sync goes both ways. If you want to remove a file from your computer without deleting it from the cloud, use "Free up space" (OneDrive), switch to "Stream files" (Google Drive), or use "Online only" (Dropbox Smart Sync). Do not just delete the file from the folder.

Is it safe to use online-only mode? What if I lose internet?

Files in online-only mode require an internet connection to open. If you need certain files available offline (like when traveling), right-click them and choose "Always keep on this device" or "Available offline." Everything else can safely stay online-only. If you lose internet, you just will not be able to open those cloud-only files until you reconnect.

How do I fix a file that is stuck syncing?

First, check your internet connection. Then try pausing and resuming sync in the cloud app's settings (usually accessible from the menu bar or system tray icon). If a specific file is stuck, try renaming it or moving it out of the sync folder and back in. As a last resort, sign out of the cloud app and sign back in.

Can I use multiple cloud storage services at the same time?

Yes, and many people do. Just be careful not to sync the same files to multiple services, as this doubles (or triples) the local storage used and can create conflicts. Pick one service per purpose: for example, iCloud for photos and OneDrive for work documents.

Remote Desktop Setup

What's the difference between remote desktop and remote support tools?

Remote desktop gives you persistent access to a computer you own or manage – it's always available when the remote machine is on. Remote support tools (like Quick Assist, remote support sessions in TeamViewer) are for one-time sessions where someone temporarily shares their screen so you can help them. See Remote Support Tools for those.

Is remote desktop secure?

It depends on how you set it up. On a local network, it's generally fine. Over the internet, never expose RDP or VNC directly – both are frequent targets for attackers. Always use a VPN to access remote desktops over the internet (see VPN Basics), or use Chrome Remote Desktop which handles encryption and authentication through Google's infrastructure.

Why is my remote desktop connection laggy?

Remote desktop performance depends on network speed and latency between the two machines. On the same local network, it should feel smooth. Over the internet, high latency or low upload speed on either end causes lag. Reducing the display resolution or color quality in your remote desktop client settings can help. RDP (Windows) is generally the most bandwidth-efficient protocol; VNC tends to use more bandwidth.

Can I use remote desktop with two monitors?

Yes, most remote desktop clients support multi-monitor setups. In Windows RDP, click Show Options in the connection dialog, go to the Display tab, and check Use all my monitors for the remote session. Chrome Remote Desktop automatically adapts to the host's monitor layout. VNC clients vary – check your client's settings for multi-monitor support.

Do I need a fast internet connection for remote desktop?

For local network use, any modern Wi-Fi or Ethernet connection is fine. For internet access, you need decent upload speed on the host machine (the one being controlled) and decent download speed on your end. A minimum of 5 Mbps in each direction works for basic use, but 10+ Mbps makes the experience much smoother, especially at higher resolutions.

Understanding MDM (Mobile Device Management)

Can my employer read my personal texts or emails through MDM?

No. MDM manages device settings and policies, not your personal communications. It can see a list of installed apps but cannot read content inside personal email, messaging apps, or texts. If your employer is using separate monitoring software, that's distinct from MDM and should be disclosed to you.

Will I lose my personal files if IT does a remote wipe?

It depends on how your device is enrolled. On a personal device enrolled through BYOD (work profile on Android, user enrollment on iOS), IT can only wipe work data. On a company-owned device, a full wipe is possible and would erase everything. If you're unsure, ask IT which enrollment type your device uses.

Can I remove MDM from my device?

On a personal device, you can typically remove the MDM profile yourself, though you'll lose access to work apps and email. On a company-owned device, the MDM profile is usually locked and can't be removed without IT's involvement. Check your device management settings to see if a remove option is available.

Does MDM track my location?

Standard MDM configurations do not continuously track your location. Some MDM platforms have location-tracking capabilities, but enabling them requires deliberate configuration and most organizations only use it for locating lost devices. Your employer's IT policy should disclose if location tracking is active.

Does MDM slow down my device?

MDM itself has minimal impact on device performance. The management profiles are lightweight. If your device feels slow after enrollment, it's more likely due to additional security software (antivirus, endpoint protection) that IT deployed alongside MDM, not the MDM framework itself.

Remote Support Tools

Can IT access my computer after the session ends?

No. Quick Assist, Chrome Remote Desktop, TeamViewer, and AnyDesk all end completely when you disconnect. IT cannot reconnect without a new code or your explicit permission. The only exception is if your organization has always-on remote management software installed (like an MDM agent), which is separate from these tools and would have been set up by IT when you got the device.

Can IT see my personal files and passwords?

They can see whatever is visible on your screen during the session. They can open File Explorer or Finder and browse your files if they have control. Close personal windows and browser tabs before the session starts. They cannot see saved passwords in your browser (those are behind your browser's own authentication) unless you navigate to them during the session.

What if I don't trust the person asking to connect?

Only share your screen with IT staff you've verified through official channels. If you receive an unsolicited call, email, or pop-up claiming to be tech support and asking you to install remote access software, it is almost certainly a scam. Legitimate IT departments will contact you through known company channels and you'll usually be the one who initiated the support request.

Which remote support tool is best?

For Windows, Quick Assist is the simplest since it's already installed and doesn't require creating accounts. For cross-platform support, Chrome Remote Desktop works on everything with a browser. TeamViewer and AnyDesk are what many IT departments standardize on because they offer more management features. Use whatever your IT department recommends.

Do I need to install anything?

For Quick Assist on Windows and Screen Sharing on Mac, no — they're built in. Chrome Remote Desktop requires a browser extension and a small host app. TeamViewer and AnyDesk require downloading and installing their apps. Your IT person will walk you through it if something needs to be installed.

Onboarding Device Checklist

How long should device onboarding take?

For a straightforward setup with MDM automation, 30-60 minutes of hands-on time plus waiting for updates and profile installations. Without MDM (manual installs), expect 1-2 hours. Build in extra time for the employee orientation walkthrough. Batch-prepping devices before the hire date saves time on day one.

Should the employee set up their own device?

It depends on your org's security requirements. Some organizations pre-configure everything and hand over a ready-to-go device. Others use self-service enrollment (especially with MDM tools like Jamf Self Service or Intune Company Portal) where the employee follows guided steps. Either way, IT should verify the device is compliant before the employee starts working.

What about BYOD (bring your own device)?

BYOD adds complexity – you need to balance company security with employee privacy. Most orgs use MDM with a work profile or container that separates company data from personal data. The employee should understand exactly what IT can and can't see on their personal device before enrolling. Create a separate BYOD checklist that covers enrollment, container setup, and privacy boundaries.

Do I need to do all of this for every new hire?

The core security items (encryption, 2FA, endpoint protection) are non-negotiable. Everything else can be adapted based on role, department, and your org's infrastructure. MDM tools can automate most of the software installation and configuration, turning this checklist into more of a verification list. The goal is a consistent baseline so no device ships without the essentials.

How do I handle remote onboarding?

Ship the device pre-enrolled in MDM with zero-touch deployment (Apple Business Manager + Jamf, or Windows Autopilot + Intune). The employee opens the box, connects to Wi-Fi, signs in, and MDM pushes everything automatically. Schedule a video call to walk them through orientation and answer questions. Ship any peripherals (monitor, keyboard, headset) separately with a quick-start card.

Entra ID Enrollment (Azure AD Join)

What's the difference between "Azure AD" and "Entra ID"?

They're the same thing. Microsoft renamed Azure Active Directory to Microsoft Entra ID in 2023. You'll still see "Azure AD" in some older documentation, settings screens, and IT conversations, but functionally nothing changed.

Will enrolling my device give IT access to my personal files?

No. Entra ID enrollment and Intune device management report device health and compliance information (OS version, encryption status, installed managed apps). They do not give your organization access to personal files, photos, browsing history, or personal email.

Can I remove the Entra ID enrollment later?

Yes. On Windows, go to Settings > Accounts > Access work or school, click your work connection, and select Disconnect. On Mac, open System Settings > General > Device Management and remove the management profile. Be aware that disconnecting will remove access to work apps, email, and resources.

What if enrollment fails or my device shows as "not compliant"?

Check that your OS is up to date, encryption is enabled (FileVault on Mac, BitLocker on Windows), and you have a passcode set. These are the most common compliance requirements. If everything looks correct and it still fails, contact IT – there may be a conditional access policy or MFA issue on their end.

Do I need to be on the company network to enroll?

No. Enrollment works over any internet connection. You'll need to reach Microsoft's login servers and your organization's MDM endpoint, which are accessible from any network. After enrollment, some resources may require VPN or company network access, but the enrollment itself works anywhere.

How to Write a Good IT Support Ticket

Does it matter how I phrase the subject line?

Yes. A specific subject line helps IT triage and find your ticket later. "Outlook error sending large attachments" is useful. "HELP" or "Computer problem" is not. Think of it like an email subject — a short summary of the actual issue.

Should I include screenshots of everything?

Not everything, but include a screenshot of any error message, unexpected behavior, or anything that is easier to show than describe. One or two relevant screenshots are much more useful than a long written description of what the screen looks like.

What if I do not know my OS version or browser?

You can check your OS version by going to Settings > About on most devices. For your browser, type about:version or check the browser's About page in its menu. If you truly cannot find it, mention the device type (Mac, Windows, iPhone) and IT can look up the rest.

What if my problem is hard to describe?

Record a short screen recording showing the problem happening. Most operating systems have built-in screen recording — see our screenshots and screen recording guide. A 30-second video of the issue is often better than a page of text.

Should I try to fix it myself before submitting a ticket?

If you are comfortable trying basic steps like restarting or clearing your cache, go ahead and mention what you tried. But do not feel pressured to troubleshoot beyond your comfort level. It is better to submit a ticket with "I have not tried anything yet" than to accidentally make the problem worse. IT would rather help you from the start than undo a fix attempt that went sideways.

Jamf Basics for Mac Users

Can I uninstall Self Service?

You technically can, but it will likely be reinstalled automatically by Jamf on the next check-in. Self Service is how IT delivers software and updates to your Mac, so removing it may cause you to miss required installations. Leave it installed.

Does Jamf see everything I do on my Mac?

No. Jamf sees device inventory information: what apps are installed, OS version, storage, encryption status, and compliance state. It does not monitor your screen, read your files, track your keystrokes, or watch your browsing activity. It manages the device, it doesn't surveil you.

What if Self Service shows "No policies available"?

This usually means your Mac hasn't checked in recently, or there's a network issue preventing it from reaching the Jamf server. Make sure you're connected to your organization's network (or VPN if remote), then try opening Self Service again. If it persists, contact IT.

Why does my Mac keep asking me to update?

Jamf can enforce software update policies with deadlines. If you're seeing persistent update prompts, IT has likely set a required update with a due date. It's best to run the update when convenient rather than waiting for the deadline, since forced updates at inconvenient times are worse.

Is Jamf only for Macs?

Jamf primarily manages Apple devices – Mac, iPhone, and iPad. If your organization also manages Windows or Android devices, they likely use a different tool like Microsoft Intune for those platforms.

BYOD Setup (Personal Device for Work)

Will my employer be able to see my personal photos and messages?

No. On all platforms, BYOD enrollment gives IT access to device health information (OS version, encryption, compliance) and manages work apps and data only. Your personal photos, messages, browsing history, and app data remain private. The work profile (Android) and user enrollment (iOS) provide particularly strong separation.

What happens to my personal data if IT does a remote wipe?

On a properly configured BYOD enrollment, IT can only perform a selective wipe that removes work apps, work email, and corporate data. Your personal files, photos, apps, and settings remain untouched. A full device wipe is only possible on company-owned devices enrolled with full management.

Can I unenroll at any time?

Yes. You can remove the work enrollment from your personal device at any time. Be aware that unenrolling removes access to work email, apps, and resources. Work data on the device is deleted during unenrollment. Your personal data stays.

Does BYOD enrollment affect my phone's performance?

The management profile itself has negligible performance impact. On Android, the work profile does use some additional storage since work apps are installed separately. If your phone is low on storage, having duplicate apps (personal and work versions) can add up. You can pause the work profile when not needed to reduce background activity.

Should I back up my device before enrolling?

It's always a good idea to have a current backup, but enrolling shouldn't cause data loss. The enrollment process adds management capabilities – it doesn't modify or delete existing personal data. Having a backup is just general good practice.

Self-Service Software Catalogs

Do I have to use the self-service catalog or can I install apps myself?

On a managed device, IT may restrict what you can install outside the catalog. Even if you can download apps directly, using the catalog is preferred because IT has vetted those apps for security and compatibility, and they'll be automatically updated. Installing software outside the catalog may flag your device as non-compliant.

Is the software in the catalog free?

To you, yes. Your organization handles the licensing. You don't need to worry about license keys or subscriptions for software installed through the catalog.

Why can't I find [specific app] in the catalog?

It probably hasn't been approved and packaged by IT yet. Submit a request through your IT ticketing system. The app may not be available due to licensing costs, security concerns, or because there's an approved alternative already in the catalog.

Do self-service apps auto-update?

Usually, yes. IT can push updates through the same management system that installed the app. Some organizations let you choose when to update through the self-service portal, while others push updates automatically. Critical security patches are almost always automatic.

Offboarding Device Checklist

Should I delete the employee's account immediately?

No. Suspend or disable it first and keep it active for 30-90 days. You'll likely need access to their email for client handoffs, their files for project continuity, and their calendar for meeting context. After your retention period, convert the mailbox to a shared mailbox (Microsoft 365) or transfer data to another user (Google Workspace), then delete.

What if the employee won't return equipment?

Start with a polite reminder and a prepaid shipping label. If equipment isn't returned within your policy window (typically 14-30 days), escalate through HR. Some organizations deduct the cost from the final paycheck where legally permitted, but that varies by jurisdiction. Document everything.

How is involuntary offboarding different?

Speed. For involuntary departures (terminations, layoffs), coordinate with HR to deactivate accounts at the exact moment the employee is notified. Don't wait until end of day. Have the checklist pre-staged and execute account deactivation, session revocation, and VPN termination within minutes. Device recovery and cleanup follow as soon as possible.

Do I need to wipe personal devices used for work (BYOD)?

You can't wipe a personal device without the employee's consent in most cases. What you can do is remove the company MDM profile, which removes the work container, managed apps, and company data. The employee keeps their personal data. Make sure your BYOD policy covers this scenario clearly before it comes up.

How long should I keep the departed employee's data?

Follow your organization's data retention policy. Common practice is 90 days for email and files, longer if there are legal holds or compliance requirements (HIPAA, SOX, GDPR). After the retention period, export and archive anything required, then delete the account. When in doubt, check with legal.

Certificate and Profile Management

What happens if a certificate expires?

You'll likely lose the ability to connect to whatever service that certificate authenticated – corporate Wi-Fi, VPN, or internal websites. Most MDM systems automatically renew certificates before they expire. If you suddenly can't connect to a service that was working fine, an expired certificate is a likely cause. Contact IT to have it renewed.

Can I install configuration profiles myself?

On a managed device, profiles are typically pushed by IT through the MDM. On macOS, you can manually install .mobileconfig files by double-clicking them, but only do this if IT explicitly asks you to. Never install profiles from unknown sources – they can change device settings, route your traffic, or install certificates that compromise your security.

Why does my Wi-Fi keep asking me to "trust" a certificate?

This usually means your device is missing the root certificate for your organization's Wi-Fi authentication server. The prompt is your device saying it can't verify the network is legitimate. Don't just click trust every time – contact IT to get the proper root certificate installed, which will resolve the prompt permanently.

Are configuration profiles the same as apps?

No. Profiles are settings configurations, not software. A profile might configure your Wi-Fi password, set up a VPN connection, or install a certificate, but it doesn't install applications. Profiles are lightweight and don't take up noticeable storage space.

Can a configuration profile spy on me?

Standard corporate profiles configure settings like Wi-Fi, VPN, and email. They don't monitor your activity. However, some profiles can install root certificates that could theoretically allow network traffic inspection. On a company-owned device, this is sometimes used for web filtering. If you're concerned, check what profiles are installed and ask IT what each one does.

Environment Variables and PATH

What happens if I mess up my PATH?

Your terminal won't find basic commands like ls or git. Don't panic – just open a new terminal and fix your shell config file. You can always use the full path to an editor (like /usr/bin/nano ~/.zshrc) even if PATH is broken. On Windows, use the System Properties GUI to fix it.

What's the difference between user and system environment variables?

User variables only affect your account. System variables apply to every user on the computer. On Mac/Linux, ~/.zshrc or ~/.bashrc are user-level, while /etc/environment or /etc/profile are system-level. On Windows, the Environment Variables dialog shows both sections separately.

Do I need to restart my computer after changing PATH?

No. On Mac/Linux, run source ~/.zshrc (or source ~/.bashrc) to reload immediately, or just open a new terminal window. On Windows, open a new terminal window – existing windows keep the old values. No reboot required.

Should I prepend or append to PATH?

It matters. Directories listed first in PATH take priority. If you want your custom tool to override a system version, prepend it (export PATH="/my/path:$PATH"). If you want system defaults to take priority, append it (export PATH="$PATH:/my/path"). Appending is safer if you're not sure.

Can environment variables contain spaces?

Yes, but you need to quote the value. Use export MY_VAR="some value with spaces" on Mac/Linux, or set the value with quotes in the Environment Variables dialog on Windows. In PowerShell, $env:MY_VAR = "some value with spaces" works fine.

Terminal Aliases

Will my aliases override real commands?

Yes. If you alias rm to rm -i, the alias takes priority over the bare rm command. To run the original command without the alias, prefix it with a backslash: \rm file.txt. This bypasses the alias for that one invocation.

Why isn't my alias working after I added it?

You need to reload your shell config after editing it. Run source ~/.zshrc (Mac), source ~/.bashrc (Linux), or . $PROFILE (PowerShell). Or just close and reopen your terminal.

Can I share aliases between bash and zsh?

Yes. Put your aliases in a separate file like ~/.aliases and source it from both ~/.bashrc and ~/.zshrc with source ~/.aliases. The alias syntax is identical between bash and zsh.

Is there a limit to how many aliases I can have?

No practical limit. Power users often have dozens or even hundreds. If your list gets long, organizing them in a separate file keeps things tidy. Just make sure alias names don't conflict with commands you actually need.

How do I see what command an alias runs?

Run alias name (Mac/Linux) or Get-Alias name (PowerShell) to see the definition. On Mac/Linux you can also use type name or which name to see if something is an alias, function, or program.

Package Managers

Why use a package manager instead of downloading installers from websites?

Package managers handle updates automatically, manage dependencies (software your app needs), and let you install or remove software with one command. You also avoid hunting for download links and clicking through setup wizards. It's faster, cleaner, and easier to keep everything up to date.

Can I break my system by installing packages?

It's very unlikely with standard packages from official repositories. Package managers check for conflicts before installing. The main risk is adding unofficial or third-party repositories with untested software – stick to official sources and you'll be fine.

How do I know what packages are available?

Use the search command (brew search, winget search, apt search, etc.) or browse the package manager's website. Homebrew has formulae.brew.sh, winget packages are on winget.run, and Linux distros have their own package search sites.

Do I need to run updates manually?

Yes, for most package managers. Run your update command periodically (once a week is a good habit) to keep everything current. Some Linux distros offer automatic security updates, and you can configure unattended upgrades if you prefer.

Can I use multiple package managers on the same system?

Yes. On Windows, winget and Chocolatey coexist fine. On Linux, you might use apt for system packages and Flatpak for desktop apps. On macOS, Homebrew is typically all you need, but you can also use the Mac App Store alongside it. Just be aware that installing the same software from two different package managers can cause version conflicts.

Basic Terminal Commands

Will I break something by using the terminal?

Most commands are safe, but rm (delete) and sudo (admin) commands should be used carefully. Unlike dragging a file to the trash, rm deletes permanently with no undo. Double-check the path before running destructive commands.

What's the difference between Terminal, Command Prompt, PowerShell, and shell?

A "shell" is the program that reads your commands. Bash and zsh are shells on Mac/Linux, PowerShell is the modern shell on Windows. "Terminal" and "Command Prompt" are the apps that give you a window to type in. Think of the terminal as the window and the shell as the engine inside it.

Do I need to memorize all these commands?

No. Most people use the same 5-10 commands daily (cd, ls, mkdir, cp, mv, rm, cat). Bookmark this page or keep a cheat sheet handy until they become muscle memory. The Up Arrow and Tab keys do a lot of the heavy lifting.

How do I know which folder I'm in?

Run pwd (macOS, Linux, PowerShell). It prints the full path to your current location. If you're lost, cd ~ takes you home.

Can I undo a command?

There's no universal undo. For file operations, once a file is deleted with rm or del, it's gone. For other mistakes, Ctrl + C cancels a running command before it finishes. Get in the habit of double-checking before pressing Enter on destructive commands.

Screen Mirroring vs Extending

What's the difference between mirroring and extending?

Mirroring shows the exact same thing on both screens — useful for presentations or showing someone else what's on your screen. Extending gives you extra desktop space so you can have different windows on each screen. Most people want extend mode for everyday use and mirror mode for meetings or presentations.

Why can my Mac only connect one external monitor?

Base M1, M2, and M3 Mac chips are limited to a single external display by the hardware itself — it's not a software limitation. The cheapest workaround is a DisplayLink dock or adapter, which uses USB to drive additional monitors. The M4 base chip bumped this to 2 external displays. Pro, Max, and Ultra chips support 2 to 8 external displays depending on the tier.

Can I mirror one display and extend another at the same time?

On macOS, yes — you can mirror a subset of displays while extending others in System Settings > Displays by right-clicking specific display thumbnails. On Windows, the built-in settings only let you duplicate or extend all displays as a group, but your GPU's control panel (NVIDIA Control Panel or AMD Adrenalin) may offer more flexible configurations.

Does wireless display have input lag?

Yes. AirPlay, Miracast, and Chromecast all add noticeable latency — usually between 50-200ms depending on your network and the protocol. This is fine for presentations, video playback, and casual browsing, but not for gaming, drawing, or anything where instant response matters. For low-latency use, always use a wired connection.

How do I know which cable to use for mirroring or extending?

The cable doesn't determine whether you mirror or extend — that's a software setting. Any cable that carries video (HDMI, DisplayPort, USB-C with video support, Thunderbolt) works for both modes. Check your monitor's inputs and your computer's outputs, then use the matching cable or an adapter. See External Display Setup for cable details.

Camera Not Working

What if my laptop has a privacy shutter I forgot about?

It is more common than you think. Most modern laptops have a small physical slider next to the camera lens. When closed, the camera shows a completely black image (not an error message). Look for a small tab you can slide to the side. Some Lenovo and HP laptops use a keyboard shortcut instead — look for a key with a camera icon, often toggled with Fn.

Can I use my phone as a webcam?

Yes. On Mac, Continuity Camera is built in — just hold your iPhone near your Mac and it appears as a camera option in most apps (requires macOS Ventura or later and iOS 16+). On Windows, apps like Camo or the Link to Windows / Phone Link app with supported Samsung/Android devices can turn your phone into a webcam over USB or Wi-Fi.

Why is my camera image dark or grainy?

Low light is the most common cause. Built-in laptop cameras have tiny sensors and struggle in dim environments. Try facing a window or adding a desk lamp aimed at your face (not at the camera). If the image is grainy even in good light, check your app's video settings for a resolution or quality option — some apps default to lower quality. Cleaning the lens with a soft cloth also helps more often than you would expect.

Webcam Quality Tips

My webcam looks fine in the camera app but terrible in Zoom/Teams. Why?

Video call apps compress your video heavily to save bandwidth. Make sure HD mode is enabled in the app's settings (Zoom: Settings > Video > HD; Teams: enable it under video settings). Also check that your internet upload speed is at least 3-5 Mbps – the app will lower quality automatically if bandwidth is tight.

Is an external webcam worth buying?

If you do regular video calls for work, yes. Even a budget 1080p USB webcam (like the Logitech C920 or similar) is a significant upgrade over most built-in laptop cameras. The difference is mainly the larger sensor, which captures more light and produces a cleaner image. You will notice it most in dim rooms.

Can I use my phone as a webcam?

Yes, and your phone camera is almost certainly better than your laptop webcam. On Mac, Continuity Camera lets you use an iPhone wirelessly without extra software – just select your iPhone as the camera in any app. On Windows and other setups, apps like Camo or DroidCam connect your phone as a webcam over USB or Wi-Fi.

Why does my webcam look grainy or noisy?

Grain (visual noise) is almost always a low-light problem. Your camera increases its sensor sensitivity (ISO) in dark conditions, which adds noise. The fix is more light on your face, not a better camera. Even a high-end webcam will look grainy in a dark room.

Does my internet speed affect webcam quality?

Yes. Video call apps adjust your camera quality based on available bandwidth. If your upload speed is slow, the app sends lower resolution, more compressed video. You need at least 1.5 Mbps upload for decent 720p and 3-5 Mbps for 1080p. Check your speed and close other bandwidth-heavy apps during calls.

Common Printer Errors

My printer says "offline" but it is turned on and connected. What gives?

The "offline" status usually means the computer lost its connection to the printer, not that the printer itself is offline. For network printers, the printer's IP address may have changed (common with DHCP). Check the printer's current IP on its display or configuration page and update the port in your computer's printer settings. For USB printers, try a different cable or port.

How often should I restart the print spooler?

Only when you have stuck jobs that will not cancel normally. Restarting the spooler is a fix, not maintenance. If you find yourself doing it regularly, the underlying issue is usually a flaky driver or network connection that needs addressing.

Why do I keep getting paper jams?

Repeated jams are usually caused by one of three things: torn paper scraps left inside from a previous jam, paper that is wrinkled, damp, or the wrong weight for your printer, or worn-out pickup rollers (the rubber rollers that grab paper from the tray). Fan your paper stack before loading it, use the correct paper size and type, and check for scraps inside the printer.

Can I print if it says ink is low?

Usually yes. "Low ink" warnings are very conservative – printers often have 10-20% ink remaining when the warning first appears. Keep printing until you notice actual quality issues (fading, streaks, missing colors). Replacing cartridges at the first warning wastes ink and money.

The printer prints a test page fine but will not print from my apps. What is wrong?

If the test page works, the printer hardware and connection are fine. The problem is usually in the app's print settings – it may be sending to a different printer, using the wrong paper size, or the print dialog is set to "Print to PDF" instead of your actual printer. Check the printer selection in the app's print dialog (Cmd + P on Mac, Ctrl + P on Windows) and make sure your printer is selected.

Battery Health

What is a battery cycle count?

One cycle is a full discharge of the battery's total capacity — it does not have to happen all at once. If you use 50% one day and 50% the next, that counts as one cycle. Most laptop batteries are designed for 300 to 1000 cycles before they drop below 80% of original capacity. Apple rates MacBook batteries at 1000 cycles, for example.

When should I replace my battery?

Replace it when battery health drops below 80% and you notice significantly shorter battery life. If your OS shows a "Service Recommended" or "Consider replacing your battery" message, that is a clear sign. Some people continue using degraded batteries plugged in, but severely degraded batteries can swell and should be replaced promptly.

Should I keep my laptop plugged in all the time?

Keeping a laptop at 100% charge constantly puts extra stress on the battery and accelerates wear. Modern laptops with optimized or smart charging handle this better by capping the actual charge level. If your laptop supports it, enable optimized charging and do not worry too much. If it does not, try to unplug occasionally and let the battery discharge to around 40-50% before charging again.

Does battery calibration actually help?

No. Battery calibration — fully draining then fully charging — was useful for older nickel-based batteries but does not meaningfully help modern lithium-ion batteries. In fact, deep discharges can slightly increase wear. The battery gauge may occasionally show an inaccurate percentage, but a restart usually fixes that without needing a full discharge cycle.

Why is my battery draining so fast?

The most common causes are high screen brightness, background apps consuming power, and an active Bluetooth or Wi-Fi connection you do not need. Open your task manager or activity monitor to check for apps using significant energy. A degraded battery also drains faster because it holds less total charge — check your battery health to rule that out.

External Display Setup

Why isn't my external monitor detected?

Start with the cable — try a different cable or port. If you are using an adapter (like USB-C to HDMI), make sure it supports video output. Restart your computer with the monitor connected. On Mac, hold Option in Display settings and click Detect Displays. On Windows, click Detect in Display settings. If nothing works, test the monitor with another computer to rule out a hardware issue with the display itself.

What cable do I need for my external monitor?

It depends on your ports. USB-C/Thunderbolt is the most common on modern laptops and carries video, data, and power over one cable. HDMI is the most universal and works for most monitors and TVs. DisplayPort is common on desktop monitors and supports higher refresh rates. If your laptop only has USB-C and your monitor only has HDMI, use a USB-C to HDMI adapter or cable. For 4K at 60Hz or higher, make sure your cable and adapter support the required bandwidth (HDMI 2.0+ or DisplayPort 1.2+).

Why does text look blurry on my external monitor?

This is almost always a scaling issue. If your monitor runs at a non-native resolution, everything looks soft. Set the resolution to the monitor's native resolution (the one labeled "Recommended" on Windows or "Default for display" on Mac). If the native resolution makes things too small, use display scaling (125% or 150% on Windows, scaled options on Mac) instead of lowering the resolution — scaling keeps text sharp while making UI elements larger.

E-Waste Recycling and Disposal

Can I just throw old cables in the trash?

Technically, simple cables without batteries are less hazardous than other electronics, but they still contain copper and plastics that should be recycled. Best Buy and Staples accept cables for free. Most people have a drawer full of old cables — bring the whole drawer next time you are near a drop-off location.

Is my data really safe after a factory reset?

For modern phones and computers with encrypted storage (most devices made after 2016), a factory reset effectively makes your data unrecoverable for all practical purposes. For older devices or if you need extra assurance, use dedicated data-wiping software that overwrites the entire drive. For the highest security (business or government), have the drive physically shredded by a certified recycler.

Do I get paid for recycling electronics?

Trade-in programs from Apple, Samsung, Microsoft, and Best Buy offer credit toward new purchases for devices with remaining value. A recent-model phone in good condition can be worth hundreds. Even older devices sometimes have modest value. Devices with no trade-in value are accepted for free recycling, so you never have to pay to get rid of them through these programs.

What happens to my devices after I recycle them?

Certified recyclers sort devices into components. Working devices may be refurbished and resold. Non-working ones are disassembled — metals, plastics, glass, and circuit boards are separated and sent to specialized processors. Precious metals like gold, silver, and palladium are recovered from circuit boards. Responsible recyclers handle this domestically or through verified international partners.

Are there any electronics I cannot recycle through these programs?

Most consumer electronics are accepted. Large appliances (refrigerators, washers) typically need separate handling through your municipal waste service or the retailer you purchased from. CRT monitors and TVs are accepted by some programs but not all — check with your local e-waste facility. Medical devices may have additional handling requirements.

No Sound

Sound works in some apps but not others. What's going on?

Individual apps can have their own volume controls and output device selection. Check the app's audio or preferences settings first. On Windows, also check the Volume mixer (Settings > System > Sound > Volume mixer) where each app has its own volume slider. On Linux, use pavucontrol's Playback tab to see per-app routing.

My Bluetooth headphones are connected but no sound comes through them.

The headphones are probably connected as a "phone audio" (HFP) profile instead of "media audio" (A2DP). On Mac, go to System Settings > Sound > Output and select the headphones explicitly. On Windows, check the output device near the volume slider in the taskbar. On Linux, check pavucontrol's Configuration tab and switch the Bluetooth device's profile to A2DP Sink or High Fidelity Playback. See the Bluetooth pairing guide for more.

Why did my sound stop working after an update?

Updates sometimes install new audio drivers that conflict with your hardware. On Windows, open Device Manager, right-click your audio device under Sound, video and game controllers, go to Properties > Driver > Roll Back Driver. On Mac, restarting usually resolves post-update audio issues. On Linux, restarting PipeWire (systemctl --user restart pipewire pipewire-pulse) often fixes it.

My headphones work but my laptop speakers don't.

On most laptops, plugging in headphones disables the speakers. If speakers don't come back after unplugging headphones, the headphone jack sensor may be stuck. Try plugging headphones in and out a few times. On Mac, restarting often fixes this. On Windows, check Device Manager for the audio device and try updating or reinstalling the driver. Also blow out the headphone jack gently – lint can trick the sensor.

How do I get sound to come through my monitor's speakers via HDMI?

Your monitor or TV needs to appear as a separate output device. On Mac, go to System Settings > Sound > Output and select the display. On Windows, go to Settings > System > Sound and pick the display from the output list. If it doesn't appear, check the cable and try a different port. Not all HDMI cables or ports carry audio – make sure you're using an HDMI cable that supports audio (most do, but some older DVI-to-HDMI adapters don't).

Keyboard or Mouse Not Working

Why does my wireless keyboard or mouse keep disconnecting?

Intermittent disconnects are almost always a battery or interference issue. Replace or charge the batteries first. If the problem continues, check if other Bluetooth or wireless devices are causing interference — USB 3.0 devices and 2.4 GHz Wi-Fi routers near the receiver can disrupt wireless signals. Moving the receiver closer to the device with a USB extension cable can help.

What is Sticky Keys and how did it get turned on?

Sticky Keys is an accessibility feature that lets you press modifier keys (Shift, Ctrl, Alt) one at a time instead of holding them together. On Windows, pressing Shift five times in a row triggers a prompt to enable it, which is easy to do accidentally during gaming or fast typing. On Mac, pressing Shift five times does the same. Turn it off in your accessibility settings if you enabled it by mistake.

My keyboard types the wrong characters — what is going on?

Your keyboard language or layout is probably set to something other than what you expect. On Windows, press Win + Space to switch input languages. On Mac, check System Settings > Keyboard > Input Sources. On Linux, check Settings > Keyboard > Input Sources. If you only have one layout configured and characters are still wrong, the issue might be a hardware problem with the keyboard itself.

Should I use a USB hub for my keyboard and mouse?

USB hubs work fine for most keyboards and mice, but they can cause issues. Unpowered hubs may not supply enough power for multiple devices, and wireless receivers can get interference from other USB devices in the hub. If you are having problems, try plugging your keyboard and mouse (or their receivers) directly into your computer's USB ports instead.

How to Clean Your Devices Safely

Can I use alcohol wipes on my laptop screen?

It depends on the screen. Isopropyl alcohol is safe for glass screens without coatings, but most modern laptops have oleophobic (anti-fingerprint) or anti-reflective coatings that alcohol degrades over time. Stick with distilled water or a dedicated screen cleaner unless you know your screen has no coating. Phone screens are generally more resilient to alcohol, but distilled water is still the safest choice.

Is compressed air really necessary?

For keyboards and vents, yes. Nothing else reaches debris lodged between keys or packed into ventilation channels. A small USB-powered air blower is a reusable alternative to disposable cans if you clean regularly.

How do I clean a laptop keyboard without removing the keys?

Tilt the laptop at various angles and use compressed air in short bursts to dislodge debris. Then wipe the keycap surfaces with a lightly dampened microfiber cloth. For grime around the key edges, wrap the cloth around something thin and flat (like a credit card edge) and slide it between the keys. Never try to pry laptop keys off unless you have a replacement mechanism ready.

Will cleaning my device make it faster?

Cleaning vents and fans can genuinely improve performance by reducing thermal throttling — a computer that runs cooler does not need to slow itself down. Cleaning a keyboard or screen will not make anything faster, but it will make using the device more pleasant.

How do I clean a screen that already has scratches?

Cleaning will not fix scratches. For minor surface scratches on phones, a screen protector applied on top can hide them visually. For deeper scratches on any screen, replacement is the only real fix. Prevention (a microfiber cloth instead of paper towels, a screen protector on phones) is the best strategy.

Headphone Audio Issues

Why do my Bluetooth headphones connect but no sound comes through?

Most Bluetooth audio devices support two profiles: A2DP (stereo media audio) and HFP/HSP (phone call audio). If the device connects with only the phone call profile, you get a connection but no media audio. Check your sound output settings and make sure the stereo or media profile is selected, not hands-free or phone.

Can a headphone jack wear out?

Yes. Physical headphone jacks can accumulate lint, lose spring tension, or develop intermittent contacts over time. If wired headphones work on other devices but not yours, try blowing out the jack with compressed air. On laptops, lint is the most common culprit.

Why does only one ear work on my headphones?

If balance settings are centered and it is still one-sided, the issue is usually a damaged cable (for wired) or a dead driver in one earbud (for wireless). For wired headphones, wiggle the cable near the plug – if sound cuts in and out, the cable has an internal break. For AirPods or earbuds, try cleaning the mesh with a dry brush and resetting them.

My headphones work for music but not for calls. Why?

Calls use a different audio profile (HFP/HSP) than music (A2DP). Your headphones might connect for media but fail to register as a call device. Check your calling app's audio settings and make sure the headphones are selected as both the output and input device for calls.

Do I need to install drivers for USB headphones?

On Mac and Linux, USB headphones are almost always plug-and-play. On Windows, most USB headphones use generic drivers that install automatically, but some gaming headsets need manufacturer software for surround sound or EQ features. Check the manufacturer's website if the headphones are detected but features are missing.

Audio Echo and Feedback in Calls

I hear my own voice echoed back. Is the problem on my end?

No. If you hear your own voice, the problem is on the other person's end. Their microphone is picking up your voice from their speakers and sending it back to you. Ask them to use headphones or lower their speaker volume. You cannot fix this from your side.

What is a feedback loop and how is it different from echo?

Echo is a delayed repeat of audio – you hear your voice a moment later. A feedback loop is a loud, escalating screech or howl that happens when a mic and speaker are too close together and the sound cycles between them continuously, getting louder each time. Feedback loops are fixed by muting the mic, moving it away from the speaker, or lowering the volume. They are common in conference rooms with speaker phones.

Does noise cancellation in Zoom/Teams actually help with echo?

The noise suppression features in call apps are primarily designed to filter background noise (typing, fans, dogs barking), not echo. Echo cancellation is a separate technology that these apps also include, but it works differently. If the echo cancellation is failing (your speaker is too loud or your mic is too sensitive), noise suppression alone will not fix it. Headphones are always more effective.

Why does echo happen in conference rooms but not when I use my laptop alone?

Conference room setups have speakers and microphones that are farther apart and in open spaces, making it harder for the built-in echo cancellation to work. The speakerphone mic picks up audio from the room speakers across a larger distance with more room reflections. Dedicated conference room systems (Poly, Jabra, etc.) have advanced echo cancellation tuned for this, but cheap setups struggle. If the room system is causing echo, lower its speaker volume as the first fix.

Can two people in the same room both join a call without causing echo?

Yes, but only if at least one of them is muted or both are using headphones. If both have their speakers and mics on, the mics will pick up each other's speakers and create echo for everyone else on the call. The simplest solution is for everyone in the same room to join from one device, or for each person to wear headphones.

USB Device Not Recognized

Why does my USB device work on one port but not another?

USB ports are not all equal. Front panel ports on desktops often have weaker power delivery than rear ports. Some ports are USB 2.0 and others are USB 3.0 — a device might need the higher power available on USB 3.0 ports. It is also possible that one specific port has a hardware fault or a disabled controller in the BIOS.

Is a powered USB hub necessary?

If you are connecting devices that draw significant power (external hard drives, audio interfaces, bus-powered docking stations), yes. A standard USB port provides 500mA (USB 2.0) or 900mA (USB 3.0). Daisy-chaining multiple devices through an unpowered hub splits that limited power among all connected devices, which often causes detection failures.

Will I lose data if I unplug a USB drive without ejecting?

Possibly. When you copy files to a USB drive, the operating system may cache writes and not flush them to the drive immediately. Pulling the drive without ejecting can result in corrupted files or a corrupted file system. Always eject or safely remove the drive first — it takes two seconds and prevents data loss.

What does "USB device descriptor failed" mean?

This error means the operating system tried to communicate with the USB device but could not read its identification data. It is usually a power issue, a bad cable, or a failing USB controller on the device itself. Try a different cable and port first. If the error persists across multiple computers, the device may be faulty.

Laptop or Desktop Overheating

What CPU temperature is too high?

It depends on the processor, but as a general rule: below 80 degrees C under load is fine, 80-95 degrees C is warm but usually within spec for laptops, and above 95-100 degrees C is where most CPUs start thermal throttling. At idle, anything above 60 degrees C suggests something is wrong (a stuck process, blocked vents, or dried thermal paste).

Is thermal throttling bad for my computer?

Thermal throttling is a safety feature, not damage. When the CPU gets too hot, it slows itself down to generate less heat. Your computer will feel slower while throttling, but the hardware is being protected. The problem is whatever is causing the excessive heat in the first place, not the throttling itself.

How often should I clean the dust out of my computer?

For most environments, once or twice a year is enough. If you have pets, live in a dusty area, or keep your desktop on the floor, clean every three to four months. Laptops accumulate dust faster than desktops because of their smaller vents and tighter internal spacing.

Can a laptop cooling pad really help?

Yes, but the effect varies. A good cooling pad with active fans can lower temperatures by 5-10 degrees C, which can be the difference between throttling and not throttling. A passive stand that just elevates the laptop helps too, but less dramatically. Either way, the improvement comes from getting more air under the laptop and away from the vents.

Should I repaste my CPU?

If your computer is more than 3-4 years old and runs significantly hotter than it used to despite cleaning the fans and vents, replacing the thermal paste is worth doing. The paste between the CPU and heat sink dries out over time and loses its ability to transfer heat efficiently. Desktop CPUs are easy to repaste yourself. Laptops usually require disassembly — consider a repair shop if you are not comfortable with that.

Bluetooth Pairing and Troubleshooting

Why won't my Bluetooth device pair?

The most common reasons are: the device isn't actually in pairing mode (just being powered on is not enough), there's a stale pairing that needs to be removed first, or the device is still connected to another computer or phone. Remove the device from all previously paired devices, put it in pairing mode fresh, and try again.

Can I connect multiple Bluetooth devices at the same time?

Yes. Most computers can connect several Bluetooth devices simultaneously — a mouse, keyboard, and headphones at once is common. However, connecting two Bluetooth audio output devices at the same time doesn't work well on most systems because the Bluetooth radio has to split bandwidth, which causes audio quality and latency issues.

Why does Bluetooth audio quality drop during calls or when using the microphone?

Bluetooth headphones use different codecs depending on whether they're in listening mode or call mode. When only playing audio, they use a high-quality codec (AAC, aptX, or SBC at high bitrate). When the microphone activates for a call, many devices switch to the HFP/HSP profile, which drops to a much lower quality mono codec. This is a Bluetooth protocol limitation, not a bug. Using a separate wired or USB microphone while keeping Bluetooth for audio output avoids this.

Microphone Not Working

Why does my microphone work in some apps but not others?

Most operating systems grant microphone access per app. If your mic works in one app but not another, the app that is failing almost certainly does not have permission. Check your OS privacy settings and make sure the specific app is allowed.

Can I use my phone as a microphone for my computer?

Yes. Apps like Camo (iOS/Android) or WO Mic (Android) let you use your phone as a USB or wireless microphone on your computer. You install a companion app on the computer, connect your phone, and it shows up as an input device. Quality is surprisingly good for calls.

Why is there echo or feedback when I use my microphone?

Echo usually means your mic is picking up audio from your speakers. Use headphones to eliminate it. If you are already using headphones, check that your app does not have "Listen to this device" or monitoring turned on, which plays your mic input back through your speakers. On Mac, also check that the input and output are not both set to the same Bluetooth device with a codec that causes delay.

Transferring Data and Setting Up a New Computer

Should I use migration or start fresh?

If your old computer was running fine and you want to get back to work fast, migrate. If your old machine was slow, cluttered with old apps, or having issues, start fresh. A fresh start takes more time upfront but gives you a cleaner system.

Will Migration Assistant transfer my applications?

On Mac, yes — Migration Assistant copies most applications along with your user data. On Windows, apps from the Microsoft Store reinstall automatically through Windows Backup, but traditional desktop applications need to be downloaded and installed again on the new PC.

How long does a migration take?

It depends on how much data you have and the connection type. A Thunderbolt cable transfer on Mac can finish in under an hour for typical setups. Wi-Fi transfers and large libraries (photos, music) can take several hours. Plan to do it overnight if you have more than 500 GB.

Can I transfer data between Mac and Windows?

Mac Migration Assistant can pull documents, email, contacts, calendars, and bookmarks from a Windows PC. Going the other direction (Mac to Windows) requires manual file transfer — copy files to an external drive or cloud storage, then move them to the new PC.

What should I do with my old computer?

Back up anything you still need, then sign out of all accounts (Apple ID, Microsoft account, Google, etc.). If you are selling or giving it away, factory reset it. On Mac, use System Settings > General > Transfer or Reset > Erase All Content and Settings. On Windows, use Settings > System > Recovery > Reset this PC and choose Remove everything.

Back Up Sticky Notes and OneNote Without OneDrive

Can I access Sticky Notes data without Windows?

Yes. The plum.sqlite file is a standard SQLite database. You can open it on any operating system using free tools like DB Browser for SQLite. Your notes are stored in the Note table. This is also the only practical way to export notes as plain text.

What's the difference between .one and .onepkg files?

A .one file is a single section (or page when exported individually). A .onepkg file is a complete notebook package that includes all sections, section groups, and pages in one file. Use .onepkg when you want a full backup of an entire notebook. Use .one when you just need to move one section somewhere.

I only have the OneNote UWP app and can't find the Export option. What do I do?

The OneNote for Windows 10 (UWP) app doesn't have proper export functionality. Install the desktop version of OneNote — it's included with Microsoft 365, or available as a free standalone download from Microsoft. Sign in with the same account, and your cloud-synced notebooks will appear. Then use File > Export from there.

Will my Sticky Notes sync back from the cloud and overwrite my restored backup?

They can. If you sign into a Microsoft account in Sticky Notes, cloud sync can overwrite the local plum.sqlite. To safely restore from a backup, keep Sticky Notes signed out while you replace the database file. If you need cloud sync later, sign in after verifying your restored notes look correct.

How do I back up OneNote notebooks that are stored in SharePoint or a shared OneDrive?

The same export process works. Open the shared notebook in the desktop OneNote app, then use File > Export > Notebook > OneNote Package. The export pulls from whatever is currently synced to your local cache, regardless of where the notebook is hosted.

Backup Your Computer

How big should my backup drive be?

At least twice the size of the data you want to back up. If your computer has a 500 GB drive that is half full, a 500 GB external drive works, but a 1 TB drive gives you more room for versioned backups and future growth. Time Machine and File History both keep multiple versions of files, which takes extra space.

Is cloud backup enough on its own?

Cloud backup is great for protecting against theft, fire, or hardware failure. But it can be slow to restore large amounts of data, and if your account gets compromised, your cloud files could be affected too. A local backup on an external drive gives you fast restores. Using both (cloud plus local) follows the 3-2-1 rule and gives you the best protection.

What happens if my backup drive fails?

You lose the backup, not your original files. Replace the drive and start a new backup. This is exactly why the 3-2-1 rule recommends multiple copies on different storage. If you only have one backup and it fails, you are back to having zero protection.

Will backing up slow down my computer?

The first backup takes time because it copies everything. After that, backups are incremental (only new and changed files), which is fast and runs quietly in the background. You should not notice any slowdown during normal use.

How do I restore files from a backup?

On Mac, open Time Machine from the menu bar and browse to the date you want, then click Restore on the file you need. On Windows, open File History and click Restore personal files to browse versions. For cloud backups, sign in to the service's website and download what you need. Each method lets you restore individual files or everything at once.

Export and Import Browser Data When Switching Browsers

Will importing overwrite my existing bookmarks in the new browser?

No. Imported bookmarks are usually added to a folder like "Imported from Chrome" alongside your existing bookmarks. Nothing gets overwritten or deleted.

Can I transfer my extensions to a new browser?

Not directly. Extensions need to be reinstalled from the new browser's extension store. Chrome, Edge, and Brave share the same extension ecosystem (Chromium), so most extensions are available across all three. Firefox has its own extension store with many of the same popular options.

What if my old browser is not listed as an import source?

Export your bookmarks as an HTML file from the old browser, then import that HTML file in the new browser. For passwords, export as CSV and import through the new browser's password manager settings.

Is it safe to export my passwords as a CSV file?

The file itself is not encrypted — anyone who opens it can see every password. Only export when you are actively importing into another browser or password manager. Delete the CSV file immediately after. Do not email it or store it in a shared folder.

Do I need to uninstall my old browser?

No. You can keep multiple browsers installed and use them for different purposes. But if you have fully switched, uninstalling the old browser frees up some disk space and avoids confusion.

Switching Between Google Workspace and Microsoft 365

Will I lose any emails during the migration?

No, as long as you keep the old account active until the migration is complete. IMAP sync copies messages — it does not move or delete them from the source. Google Takeout exports are also non-destructive.

Do Google Docs convert properly to Word format?

Simple documents convert well. Complex formatting — especially multi-column layouts, heavily styled tables, and Google-specific features like smart chips — may look different in Word. Always review important documents after conversion.

Can I keep my old email address?

If you own the domain, yes. Update your MX records to point to the new provider and your existing address works on the new platform. If you are on a free Gmail or Outlook.com address, you cannot move that address — but you can set up forwarding.

How long does a full migration take?

For an individual with a few GB of email and files, a few hours. For an organization with hundreds of mailboxes, IT typically runs the migration over a weekend using admin tools. Calendar and contact imports are fast — usually under a minute per account.

Should I delete my old account after migrating?

Not immediately. Keep it active for at least a month to catch forwarded emails and verify nothing was missed. If it is a paid account, you can downgrade to a free tier. Make sure shared documents and links have been updated before closing it.

How to Update, Clean Install, or Roll Back GPU Drivers

When should I update my GPU drivers?

Update when you are about to play a new game (day-one driver updates often include specific optimizations), when you experience crashes or visual glitches, or when you see a performance improvement listed in the release notes. If your setup is running fine and you are not playing new titles, there is no urgency to update.

Can a driver update make performance worse?

Yes. New drivers occasionally introduce regressions for specific games or hardware configurations. This is why the rollback option exists. If a new driver causes problems, roll back to the previous version and wait for a hotfix.

Do I need DDU every time I update my drivers?

No. DDU is for clean installs when something is wrong — corrupted drivers, switching GPU brands, or persistent issues that a normal update does not fix. For routine updates through NVIDIA App or AMD Software, a standard installation is fine.

What happens if I ignore GPU driver updates?

Your games will still work, but you may miss performance improvements, bug fixes, and optimizations for newer titles. Very old drivers can also cause compatibility issues with new games that require recent driver features.

Do Mac users need to worry about GPU drivers?

Not really. macOS handles GPU drivers through system updates. You cannot install or manage GPU drivers separately. Just keep your Mac updated through System Settings > General > Software Update.

Monitor Refresh Rate and Display Calibration

Why is my 144 Hz monitor showing 60 Hz?

Almost always a cable issue. HDMI cables included with monitors often only support 60 Hz at higher resolutions. Switch to a DisplayPort cable or a higher-spec HDMI cable, then set the refresh rate in your display settings. Also confirm the refresh rate is set correctly in your OS — it does not change automatically when you plug in a new cable.

Does refresh rate matter if my game only runs at 60 FPS?

Yes, but less than you might think. A 144 Hz monitor still makes the desktop, mouse cursor, and scrolling smoother. In games at 60 FPS, you will not get the full benefit of 144 Hz, but you also will not see tearing if you enable V-Sync or VRR. The real benefit comes when your GPU can push FPS close to your refresh rate.

Should I use G-Sync/FreeSync or V-Sync?

G-Sync and FreeSync are better in every way. They prevent screen tearing like V-Sync does, but without the input lag penalty. If your monitor supports one of these, turn it on and turn V-Sync off in games. Only fall back to V-Sync if your monitor does not support variable refresh rate.

Do I need a hardware calibrator for my monitor?

For gaming: no. The built-in calibration tools in each OS get you close enough. For photo editing, video production, or print design where color accuracy matters professionally, yes — a hardware calibrator (Datacolor SpyderX, Calibrite ColorChecker) is worth the investment because no software-only method can measure your actual panel output.

What is the difference between G-Sync, G-Sync Compatible, and FreeSync?

G-Sync is NVIDIA's proprietary standard with a dedicated hardware module in the monitor. G-Sync Compatible means NVIDIA has validated a FreeSync monitor to work with G-Sync through the NVIDIA drivers — it uses the same Adaptive Sync technology as FreeSync. FreeSync is AMD's open standard based on VESA Adaptive Sync. In practice, G-Sync Compatible and FreeSync work the same way. Full G-Sync monitors cost more but have a wider VRR range.

Understanding and Improving Game FPS and Settings

What FPS should I aim for?

60 FPS is the standard target for a smooth experience. For competitive games (shooters, fighting games), aim for your monitor's refresh rate — 120 FPS for 120 Hz, 144 for 144 Hz. For story-driven games, a stable 30-60 is perfectly playable.

Does lowering resolution always look bad?

Not with modern upscaling. DLSS, FSR, and XeSS on Quality mode render at a lower internal resolution but the output often looks nearly identical to native. Without upscaling, dropping resolution is more noticeable, but going from 4K to 1440p on a 4K monitor is usually acceptable. Going from 1080p to 720p is a bigger visual hit.

Why is my FPS fine in some areas but drops in others?

Games have areas with different rendering demands. Cities, particle effects, large battles, and dense vegetation are harder to render than empty corridors. If your FPS drops in specific scenarios, that is normal. Cap your frame rate for consistency or lower settings that affect those scenarios (shadows, draw distance, effects).

Should I use fullscreen or windowed mode?

Fullscreen (exclusive) generally gives the best performance because the GPU dedicates resources to the game. Borderless windowed is more convenient for alt-tabbing but may cost a few FPS. If you are chasing every frame, use exclusive fullscreen.

Can I improve FPS without lowering settings?

Close background apps (especially browsers with many tabs), make sure your GPU drivers are up to date (see our GPU drivers guide), and check that your power plan is set to High performance (Windows). For laptops, plug in the charger — battery mode limits GPU performance. These tweaks will not double your FPS, but they can add 5-15%.

Game Controller Setup and Configuration

Why does my game show Xbox buttons when I am using a PlayStation controller?

Most PC games default to Xbox button prompts because XInput is the standard Windows controller API. Some games detect your actual controller and switch to PlayStation prompts — check the game's settings for a "controller type" or "button prompt" option. In Steam, you can also configure controller settings per game through the Steam Input overlay.

What is the difference between XInput and DirectInput?

XInput is the modern controller standard on Windows, designed for Xbox-style controllers with a fixed layout. DirectInput is the older standard that supports more buttons and axes (great for flight sticks and racing wheels) but requires manual button mapping in most games. If a game does not detect your controller, it likely only supports XInput — use Steam Input or DS4Windows to translate.

Can I use a controller and keyboard/mouse at the same time?

Yes, most games support switching between controller and keyboard/mouse seamlessly. Some games even let you use both simultaneously — for example, aiming with a mouse and moving with a controller analog stick. This depends on the game's input handling.

My controller connects via Bluetooth but has input lag. What can I do?

Bluetooth adds some latency compared to USB. For competitive gaming, use a USB cable or the Xbox Wireless Adapter (for Xbox controllers). If you must use Bluetooth, make sure no other Bluetooth devices are actively streaming audio on the same adapter, as this competes for bandwidth. Some controllers like the DualSense have a lower latency Bluetooth implementation than others.

Do I need Steam to use a controller on PC?

No. Xbox controllers work natively on Windows without Steam. PlayStation and Nintendo controllers also work over USB and Bluetooth without Steam, though Steam's controller configuration support makes setup easier and adds features like button remapping and gyro support. For PlayStation controllers in non-Steam games, DS4Windows is the most popular alternative.

HDR Display Setup and Configuration

Why does my desktop look washed out after enabling HDR?

This is the single most common HDR complaint on Windows. When HDR is on, SDR content (your desktop, browser, most apps) uses a smaller portion of the display's brightness range, making everything look faded. Fix this by adjusting the SDR content brightness slider in Settings > System > Display > HDR. Slide it up until your desktop looks normal. macOS does not have this problem because it handles the SDR-to-HDR mapping automatically.

Is HDR400 worth turning on?

Barely. HDR400 monitors have low peak brightness and no local dimming, so the difference from SDR is minimal. You might notice slightly more color in HDR games and movies, but you might also get the washed-out desktop problem with no real visual payoff. Try it and decide — if SDR content looks worse and HDR content does not look noticeably better, leave it off.

Do I need a special cable for HDR?

HDR itself does not require a special cable — even HDMI 2.0 supports HDR signals. But if you want HDR at high refresh rates (4K 120Hz or above), you need HDMI 2.1 or DisplayPort 1.4+. The cable needs enough bandwidth for both the resolution and HDR data. Check your monitor's manual for which ports support HDR at your desired resolution and refresh rate.

Why does HDR look different in every game?

Each game implements HDR differently. Some auto-detect your display's capabilities, others require you to manually set peak brightness and paper white levels in the game's settings. If a game looks too dark or too bright in HDR, look for HDR-specific settings in the game's display or graphics options and set the peak brightness to match your monitor's actual spec.

Can I use HDR and a high refresh rate at the same time?

Yes, but it depends on your cable and port. HDMI 2.0 maxes out at 4K 60Hz with HDR. For 4K 120Hz with HDR, you need HDMI 2.1 or DisplayPort 1.4+. Check your monitor's specs to see which ports support both HDR and your target refresh rate — some monitors only support high refresh HDR on specific inputs.

Game Crashes, Freezes, and Stuttering

Why does my game crash to desktop with no error message?

Usually a GPU driver issue or the game running out of VRAM. Update your drivers first, then check VRAM usage during gameplay. On Windows, Event Viewer (Windows Logs > Application) often has the real error even when the game doesn't show one.

Is stuttering different from low FPS?

Yes. Low FPS means consistently slow performance – you need to lower settings or upgrade hardware. Stuttering means the frame rate jumps around unpredictably (60fps then suddenly 15fps then back to 60fps). Stuttering is usually caused by shader compilation, thermal throttling, background processes, or a full RAM/VRAM situation. Shader cache clearing and driver updates are the most common fixes.

Should I use DirectX 11, DirectX 12, or Vulkan?

It depends on the game and your GPU. DX12 and Vulkan are newer and can be more efficient, but they're also less stable in some games. If a game crashes on DX12, switch to DX11. If it crashes on Vulkan, try DX12 or DX11. There's no universal best choice – try what works.

How do I know if my GPU is overheating during games?

On Windows, use Task Manager (Performance > GPU) for a quick temp reading, or install HWiNFO for detailed monitoring. On Mac, check Activity Monitor. On Linux, use nvidia-smi (NVIDIA) or sensors (AMD/Intel). If your GPU consistently hits 90C+ during gameplay, that's too hot – see the overheating guide.

Can bad RAM cause game crashes?

Yes. Faulty or failing RAM causes random crashes, blue screens, and freezes that seem to have no pattern. On Windows, run Windows Memory Diagnostic (search for it in Start) to check. On Linux, boot into memtest86+. If your RAM is fine but you just don't have enough (under 16 GB for modern games), you'll see crashes when the game tries to load more data than fits in memory.

Controller Stick Drift and Dead Zones

How do I know if my stick drift is bad enough to need fixing?

Use the controller test on TheTest.com. If the analog stick dot moves on its own when you are not touching it, you have drift. If the movement is tiny (just a pixel or two), a small dead zone adjustment will fix it. If the dot drifts significantly or the stick does not return to center, you need cleaning or replacement.

Will increasing the dead zone make my controller feel worse?

It depends on how much you increase it. A small dead zone increase (from 0.05 to 0.10) is barely noticeable in most games. Going above 0.20 starts to feel sluggish because you need to push the stick farther before the game responds. Find the smallest dead zone that eliminates the drift.

Is stick drift covered under warranty?

It depends on the manufacturer and your region. Nintendo offers free Joy-Con repairs for drift in many countries after their class-action settlement. Sony and Microsoft handle drift claims on a case-by-case basis — contact their support with your warranty information. Third-party controllers vary by manufacturer.

Do hall effect sticks really never drift?

Hall effect sticks use magnets and sensors with no physical contact, so they do not suffer from the potentiometer wear that causes traditional drift. They can last essentially forever under normal use. The trade-off is a slightly higher cost, and they are not available as drop-in replacements for all controller models yet, though options are expanding quickly.

Can I fix Joy-Con drift without replacing anything?

Sometimes. The compressed air and contact cleaner methods work on Joy-Cons the same as on other controllers. Nintendo also offers free repairs in many regions. If cleaning does not work and you want a permanent fix, GuliKit makes hall effect replacement sticks specifically for Joy-Cons.

Steam Launcher Troubleshooting

Will clearing the download cache delete my games?

No. Clearing the download cache only removes temporary download data and logs you out. All installed games, save files, and settings stay intact. You'll just need to log back in.

Why does Steam say a game is running when it's not?

A game process is stuck in the background. On Windows, open Task Manager (Ctrl + Shift + Esc) and look for the game's process under Processes or Details – end it. On Mac, use Cmd + Option + Esc (Force Quit). On Linux, run killall <game-process-name> or use htop to find and kill it.

How do I completely reinstall Steam without losing my games?

Before reinstalling, note where your steamapps folder is located (default is C:\Program Files (x86)\Steam\steamapps on Windows). Uninstall Steam, download a fresh installer from store.steampowered.com, and install it to the same location. Steam will detect the existing steamapps folder and your games will appear in your Library after verifying.

Can I run two Steam accounts at the same time?

Not with the official client – Steam only supports one logged-in account at a time. Family Sharing is the intended way to let someone else play your games, though it has limitations (only one person can play from a shared library at a time).

Why are my Steam downloads so slow even with fast internet?

Steam throttles downloads during peak hours or sale events. Try changing your download region (Steam > Settings > Downloads > Download Region) to a less congested server. Also check that Limit download speed isn't enabled in the same settings page, and make sure no other apps are hogging your bandwidth.

Understanding GPU Specifications

How much VRAM do I actually need?

For 1080p gaming: 8 GB. For 1440p: 8-12 GB. For 4K: 12 GB+. For AI/ML: as much as you can afford (16 GB minimum for anything useful). These are current recommendations that will shift upward over time as games and models get bigger.

Is NVIDIA or AMD better?

Neither is universally better. NVIDIA has stronger ray tracing, DLSS (AI upscaling), and the CUDA ecosystem that most AI/ML software is built on. AMD offers more VRAM per dollar and strong rasterization performance. For pure gaming on a budget, AMD often provides better value. For AI/ML or creative work that relies on CUDA, NVIDIA is the safer choice.

Can I compare specs between NVIDIA and AMD directly?

Not meaningfully. CUDA cores and Stream Processors are different architectures, so the numbers aren't comparable. A card with 3000 Stream Processors isn't "worse" than one with 5000 CUDA cores – they're just different. Always compare using benchmarks in the specific games or apps you care about.

What's the difference between a laptop GPU and a desktop GPU with the same name?

Laptop GPUs run at much lower power limits (TGP) to fit inside a thin chassis with limited cooling. An RTX 4070 laptop variant might perform 30-40% slower than the desktop version. Manufacturers don't always make this difference obvious. Check the TGP rating and benchmark comparisons specific to the laptop variant.

Do I need ray tracing?

Not for most people. Ray tracing makes lighting and reflections look more realistic in supported games, but it significantly reduces frame rates. If you're choosing between a card with ray tracing but less VRAM and one without ray tracing but more VRAM, take the VRAM. You can always turn ray tracing off, but you can't add more VRAM.

Localhost, Ports, and Dev Servers

Why do dev servers use such high port numbers?

Ports below 1024 are reserved for system services and typically require administrator privileges to use. Dev tools pick higher numbers (like 3000 or 5173) to avoid conflicts and permission issues.

Can two servers use the same port?

No. Only one process can listen on a given port at a time. If you try to start a second server on the same port, you'll get a "port already in use" error. Either stop the first server or use a different port.

Is localhost accessible from the internet?

No. Localhost is a loopback address that only points to your own machine. Nobody on the internet can reach your dev server unless you explicitly expose it through port forwarding or a tunneling service.

Why does my dev server show a different port than expected?

Most dev servers auto-increment the port if their default is already taken. If you expected port 3000 but got 3001, another process is likely using 3000. Check with lsof -i :3000 (Mac/Linux) or Get-NetTCPConnection -LocalPort 3000 (Windows).

What's the difference between stopping and killing a process?

A regular stop (like kill <PID> or Ctrl + C in the terminal) sends a graceful shutdown signal, letting the process clean up. Force killing (kill -9 or taskkill /F) terminates it immediately. Try the graceful approach first, and only force kill if the process is stuck.

Git Basics

What's the difference between Git and GitHub?

Git is the version control tool that runs on your computer. GitHub is a website that hosts Git repositories online and adds collaboration features like pull requests, issues, and project boards. GitLab and Bitbucket are alternatives to GitHub. You can use Git without GitHub, but most projects use both.

I made a commit with the wrong message. How do I fix it?

If you haven't pushed yet, run git commit --amend -m "New message". This replaces the message on your most recent commit. If you already pushed, it's better to just leave it – amending pushed commits causes problems for anyone who already pulled your changes.

What happens if two people edit the same file?

Git handles this automatically most of the time by merging changes from different parts of the file. If two people edit the same lines, you get a merge conflict. Git marks the conflicting sections in the file and you manually choose which version to keep (or combine them), then commit the resolution.

Should I commit often or wait until a feature is done?

Commit often. Small, focused commits are easier to understand, review, and undo if something goes wrong. A good rule of thumb: commit whenever you've completed a small, logical piece of work – even if the feature isn't finished yet.

What's the difference between `git switch` and `git checkout`?

They do the same thing for branch switching. git switch was introduced to make Git easier to learn – git checkout was overloaded and did too many different things (switch branches, restore files, create branches). Use git switch for branches and git restore for undoing file changes. git checkout still works and isn't going away.

Docker Basics

What's the difference between a container and a virtual machine?

Both provide isolated environments, but containers share the host OS kernel, making them much lighter and faster to start (seconds vs minutes). A VM runs a full separate operating system. Containers use less RAM and disk space, but VMs provide stronger isolation. For development, containers are almost always the better choice.

Will Docker slow down my computer?

Docker Desktop uses some RAM and CPU even when idle (it runs a lightweight VM on Mac and Windows). If you're on a machine with 8GB or less RAM, you may notice it. You can quit Docker Desktop when you're not using it. On Linux, Docker Engine has minimal overhead since it runs natively.

What's the difference between `docker-compose` and `docker compose`?

They do the same thing. docker-compose (with a hyphen) was the original standalone tool. docker compose (with a space) is the newer version built into the Docker CLI as a plugin. The newer docker compose is now the standard and comes pre-installed with Docker Desktop and recent Docker Engine packages.

How do I get inside a running container?

Use docker exec -it <container_id> /bin/bash (or /bin/sh if bash isn't available). This gives you a terminal session inside the container. Type exit to leave. Useful for debugging or inspecting what's happening inside.

Do I need Docker for every project?

No. Docker is most useful when a project has complex dependencies, needs a database, or you're working with a team and want everyone on the same setup. For simple scripts, learning exercises, or projects with minimal dependencies, Docker adds unnecessary complexity.

HTTPS for Local Development

Do I really need HTTPS for local development?

For most work, no. Browsers treat plain http://localhost as a secure context, so APIs like geolocation and camera still work. You need actual HTTPS when using a custom local hostname (like myapp.local), testing service workers with non-localhost origins, accessing your dev server from another device, or working with secure cookies.

What's wrong with self-signed certificates?

They work for encryption, but browsers don't trust them. You'll see a "Your connection is not private" warning every time, and some features (like service workers) may not work at all. mkcert solves this by creating a local CA that your OS and browsers trust.

Will mkcert certificates work on my phone?

Not automatically. mkcert only installs the CA on the machine where you ran mkcert -install. To trust it on a phone, you need to transfer the CA certificate (find it with mkcert -CAROOT) to the device and manually install it. On iOS, you also need to enable full trust in Settings > General > About > Certificate Trust Settings.

Do I need to regenerate certificates when they expire?

mkcert certificates are valid for about 2 years by default. If they expire, just run the mkcert command again to generate new ones. You don't need to run mkcert -install again – the CA is still trusted.

I'm getting "Your connection is not private" on localhost. What do I do?

If you're using plain http://localhost without any HTTPS setup, this usually means something is redirecting you to HTTPS. Check for HSTS headers in your app or browser. If you set up HTTPS with self-signed certificates, switch to mkcert instead. If you're already using mkcert, make sure you ran mkcert -install and restarted your browser. See our guide on connection not private errors for more details.

SSH Key Setup

What's the difference between ed25519 and RSA keys?

Ed25519 is the modern recommendation – it's faster, produces shorter keys, and is considered highly secure. RSA (with 4096 bits) is the older standard and still works everywhere. Use ed25519 unless you're connecting to a very old server that doesn't support it.

I already have an SSH key. Do I need a new one?

No. Check for existing keys by looking in ~/.ssh/ for files like id_ed25519 or id_rsa. If you already have a key pair, you can use it. Just add the public key (.pub file) to whatever service you want to connect to.

What happens if I lose my private key?

You lose access to anything authenticated with that key. Generate a new key pair and add the new public key to GitHub, servers, etc. This is why it's important to set up keys on each device separately rather than copying private keys between machines.

Should I use a passphrase?

Yes. A passphrase encrypts your private key file, so even if someone copies it off your computer, they can't use it without the passphrase. The SSH agent remembers it for you during your session, so you only type it once after logging in.

Can I use the same key for GitHub and a server?

Yes. Your public key can be added to as many services and servers as you want. The private key stays on your machine and handles authentication with all of them. That said, using separate keys for personal and work contexts is a good practice for security and organization.

VS Code Setup

Is VS Code the same as Visual Studio?

No. Visual Studio is a full IDE primarily for .NET and C++ development on Windows. VS Code is a lightweight, cross-platform code editor. They share a name and a company, but they're different products.

Do I need to pay for VS Code?

No. VS Code is completely free and open source. Some extensions like GitHub Copilot require a separate paid subscription, but the editor itself and most extensions are free.

Should I use VS Code or a JetBrains IDE?

VS Code is lighter, faster to start, and more flexible through extensions. JetBrains IDEs (WebStorm, PyCharm, IntelliJ) have deeper built-in support for specific languages and frameworks. If you work in one language ecosystem, JetBrains might feel more polished out of the box. If you switch between languages or prefer a lighter tool, VS Code is the better choice.

How do I reset VS Code to default settings?

Open settings (Cmd + , on Mac, Ctrl + , on Windows/Linux), click the Open Settings (JSON) icon in the top right, and delete everything between the curly braces. To also reset extensions, open the Command Palette and search for Extensions: Disable All Installed Extensions, then re-enable the ones you want.

Why is VS Code using a lot of memory?

Usually it's extensions. Open the Command Palette (Cmd + Shift + P / Ctrl + Shift + P) and run Developer: Show Running Extensions to see which ones are using the most resources. Disable or uninstall ones you don't actively use.

Setting Up a Local Dev Environment

Why use version managers instead of installing Node or Python directly?

Different projects often need different versions. If you install Node 18 system-wide and a project needs Node 20, you're stuck. Version managers like nvm and pyenv let you switch between versions per project with a single command. They also keep your system installation clean.

Do I need WSL2 on Windows?

Not necessarily, but it's highly recommended for web development. Many tools, tutorials, and documentation assume a Unix-like environment (Mac or Linux). WSL2 gives you that inside Windows without dual-booting. If you're doing .NET or Windows-specific development, native Windows tools are fine.

I installed something but the terminal says "command not found." What now?

The tool's binary isn't in your PATH. Check Environment Variables and PATH for how to fix it. Common causes: you need to open a new terminal window, the installer printed PATH instructions you missed, or you need to add the install directory to your shell config file.

Should I install everything with Homebrew/winget/apt?

Package managers are great for most tools, but language runtimes (Node, Python, Ruby) are better managed by their own version managers (nvm, pyenv, rbenv). Package managers install a single system-wide version, which causes conflicts when different projects need different versions.

How do I know if my environment is set up correctly?

Run the verify commands at the end of each section. Each tool should print a version number. If any command fails, check that the tool is installed and its directory is in your PATH.

Screen Time and Digital Wellbeing

Can my kid bypass Screen Time or Digital Wellbeing limits?

On iPhone, Screen Time limits are enforced with a passcode. Without it, the child can tap "Ignore Limit" and keep using the app. Always set a Screen Time passcode that is different from the device unlock code. On Android, built-in app timers have no passcode and can be removed by the user. For real enforcement on Android, use Google Family Link, which requires parent approval to change.

Do Screen Time limits apply to phone calls and texting?

By default, Phone and Messages are in the "Always Allowed" list on iPhone and are not restricted during Downtime. You can remove them from Always Allowed if you want, but most parents keep communication apps available. On Android, Family Link lets you set a device bedtime that locks the entire device, but phone calls can still be made to emergency numbers.

Why does my Screen Time show more hours than I actually used my phone?

Screen Time counts any time the display is on and an app is in the foreground. This includes time when music is playing with the screen on, navigation apps showing directions, or a recipe displayed in the kitchen. It also counts across all devices signed into the same Apple ID. If you want per-device stats, tap the device name at the top of the Screen Time report.

Will app limits reset if I restart my phone?

Yes, limits are tied to the calendar day and reset at midnight regardless of restarts. Restarting your phone does not give you extra time or bypass limits. The timer picks up where it left off.

Can I set different limits for weekdays and weekends?

Yes on both platforms. On iPhone, when setting Downtime you can choose Customize Days and set different schedules for each day. App Limits apply daily but you can adjust them by day. On Android, Focus mode schedules can be set per day, and Family Link daily limits can be customized for each day of the week.

Phone Storage Management

What is "System Data" or "Other" on my iPhone and why is it so large?

System Data includes caches, logs, Siri voices, system files, and temporary data that iOS manages. It can grow to several gigabytes over time. There is no single button to clear it. Restarting your phone helps a little, and the most reliable fix for an excessively large System Data category is to back up and restore your phone.

Will clearing an app's cache delete my account or data?

No. Clearing the cache only removes temporary files like downloaded images, preloaded content, and other data the app can re-download. Your account, messages, saved items, and preferences stay intact. Clearing cache is always safe. Clearing storage (or data) is different – that resets the app as if you just installed it.

How much space should I keep free on my phone?

Try to keep at least 2-3 GB free for your phone to run smoothly. Both iOS and Android need free space for system updates, app updates, and temporary files. If your phone is consistently within 1 GB of full, you will notice slowdowns, failed updates, and apps crashing.

Why do my photos keep filling up my phone even though I use iCloud/Google Photos?

If you have cloud photo backup enabled but did not turn on storage optimization, your phone keeps the full-resolution originals locally while also uploading them to the cloud. On iPhone, enable Optimize iPhone Storage in iCloud Photos settings. On Android, use the Free up space option in Google Photos to remove local copies of backed-up media.

Is it safe to delete the "Recently Deleted" album?

Yes. The Recently Deleted album is just a safety net that keeps deleted photos for 30 days before permanently removing them. If you have already reviewed the photos and do not need them back, clearing it is a quick way to reclaim space.