Computer Self-help Resources
FAQs, documentation & advice
Health & Medical | Computer Basics | Internet | Security | Microsoft Windows
Other Operating Systems | Software | Website Design
About these Resources | Requesting Help | Site Linking Guidelines
Phone calls from a “technical support” person saying that you have a problem with your computer are all scams. Just hang up.
There are many varieties of scams, all designed to steal from you.
Health & Medical
Computer Basics
Terminology | Networks | Connection Issues | Technologies | Maintenance
Terminology & Tips
Networks
Connection Issues
Technologies
Maintenance
Internet
The “Cloud” | Search & Verify | Internet at Risk | Legislation
The “Cloud”
Search & Verify
The Internet at Risk
Legislation
Security
Strategies | Staying Safe Online | Passwords | Identity Theft & Spam | Privacy
Strategies
Staying Safe Online
Passwords & Management
- Passwords: protecting your electronic signature
- Password managers
- The LastPass security breach
- Multifactor authentication
Identity Theft, Phishing, Vishing & Spam
- Identity theft — obtaining information by deceit
- Computer & “tech support” scams
- Vishing: scamming by phone
- Phishing: scamming by email
- Spam: unsolicited email & mailing lists
Protecting Your Privacy
- Your privacy at risk
- The surveillance economy
- Data breaches reveal personal data
- Encryption: protecting your data
- Artificial Intelligence
- Restoring your privacy
Microsoft Windows
Windows Basics | Current Versions | Upgrading Windows | Recovery | Legacy Windows
Windows Basics
- Windows: an overview
- Windows basics — general concepts & terminology
- Troubleshooting Microsoft services
Current (Supported) Versions
- Windows 11 (no official end of support)
- Windows 10 (October 14, 2025)
Upgrading Windows
Windows Recovery
Legacy (Unsupported) Windows
Support has expired for these versions and they are unsafe to use.
- Windows 8.1
Legacy
- Windows 7
Legacy
- Windows Vista
Legacy
- Windows XP
Legacy
Other Operating Systems
Alternatives to Windows | Recovery | Running Multiple OSs | Legacy Windows
Alternatives to Windows
- Linux — distributions, desktops & documentation
- macOS: information, software & troubleshooting
- Chromebooks
- ArcaOS
- eComStation
- IBM OS/2
Legacy
Recovery
Running Multiple Operating Systems (Advanced)
Running more than one operating system on a single computer:
Software
Recommended | Security Software | Email Issues | Browser Issues
Recommended Software
- Recommended software: useful & reliable programs
- Internet | PDF | Graphics | VLC Player
- Office Suites | Editors | Utilities
- Updating: dealing with obsolescence
- Artificial Intelligence
- Web browsers
- Browser extensions
- Browser plugins are vulnerable
Legacy
- Email software
- Video conferencing software: virtual online meetings
- Shareware & freeware: definitions & sources
- Able2Extract Professional 12 review
Legacy
Security Software
- Security software: evaluations & solutions
- ZoneAlarm Security
- Malware: detection & removal
- Ransomware: holding your digital life for ransom
- Vulnerabilities in Internet software
- Firewalls: your first line of defense
- Windows vulnerabilities
- Mobile security — vulnerabilities in mobile devices
Email Issues
- Email troubleshooting
- Safer email
- Email newsletters
- Correctly using To, CC & BCC
- Spam: unsolicited emails and mailing lists
- Phishing: email scams
Web Browser Issues
Website Design
Building a Website | Design Issues | The Power of CSS
Building a Website
- Web Design Primer
- HTML5: Improved web technologies
- Web design tools
- Illustrating websites: effective graphics & stock photos
- Cut 'n paste HTML editing
Design Issues
The power of CSS
These are two identical pages except that CSS is disabled in the second example:
- Alice with CSS
- Alice without CSS (the display issues are intentional)