Jeff installed Bluestacks on his Windows 7 PC, and then he updated to Windows 10. Bluestacks is a program that lets you run Android apps on Windows. Jeff has an Android app called MovieHD and all of a sudden it's saying he has no connection, and to "please try again." Leo says Bluestacks is far from perfect — it won't run all Android apps. The app may have worked at one time, but Leo says that doesn't mean it will continue to work.
Clyde wants to know if he can just get rid of his administrator account to prevent malware from getting installed, or should he just hide it? Leo says he can create a hidden administrator account. His computer will just need admin access to install software. That's just as secure.
Jim called to ask about how he can reinstall Windows 10 on a computer that's been given him if the person who bought it owned the software. Leo says that was the old way of thinking. The new way of thinking is that Windows 10 is licensed to the computer, and not the owner. So if he was given a Windows machine that runs Windows 10, and needs to format and reinstall Windows, it will activate.
Kim got a computer recently from a friend and she can't log into her account. It keeps asking for the previous owner. Leo says that the best thing to do is format the hard drive and start over. That way she can set it up for her preferences and make her account the primary account. Windows 10 has great reset options, and she won't even need a Windows key anymore. She should just make sure to back up her data and files first. Then hit the Windows Key and type "recovery." She'll get the choice of several options. Then she can run the recovery and it'll reinstall Windows.
Travis is having trouble getting the Windows update that will fix the Meltdown/Spectre exploit. Leo says he should make sure to update his antivirus first, because the fix will break the AVS and crash the machine, forcing a reinstall of the OS. He may also need to do a BIOS update. In fact, the entire machine may need to be updated to prevent the Windows OS update from breaking the machine.
Frank is frustrated because his Windows 10 screen is unreadable. It's frustrating because the white background and the blue letters make it difficult to read. Leo says that in the Accessibility settings of Windows 10 there is a high contrast mode which he can turn on and off by holding down the left "Shift," "Alt," and "Print Screen" keys. He can also choose to turn it on permanently in the settings.
Jason has an old HP Pavilion and he's upgraded it to Windows 10. Recently, it hasn't been able to start up. Leo suspects that the hard drive has started to die. Luckily, hard drives are pretty cheap. Then, to get his data back, he can get an external hard drive enclosure and move the data off it right away. The benefit is, the computer will run a lot faster, especially if he gets an SSD.
Scott has a Windows 7 laptop and he's tired of dealing with all its problems. As a result, he got a MacBook Air for Christmas. How does he transfer all his data from the Windows laptop to the MacBook? The Migration wizard didn't really work for him.
Leo says to bypass all of that and just move it over manually. It's the best way to do it. He should just plug in an external drive, formatted for Windows. Then drag and drop his "My Photos" folder over. Then he can connect it to his Mac, open Apple Photos, and import them.
John is having problems with two Windows laptops (one 8.1 and one Windows 10). They will connect to the hotspots, but they won't connect to the internet. Leo says that's called "captive portal" and it requires logging in to gain access. It could also be a security update that is preventing it. It could be closing down a port that he needs to access the internet. He could try reinstalling the network driver.
2018 brought about the news that every processor built in the last ten years have a flaw in them that could give hackers access to sensitive data. Initially believed to affect just Intel processors, the latest is that this affects every single processor made, regardless of platform.
The flaws utilizes a technique called "processor speculation," which enables the processor to speculate what the user will do next in order to accelerate performance. But the feature also gives hackers access to sensitive L2 cache data like passwords. It's especially true for networks.