Dave asked: In Outlook Express, I was entering an email address and entered it incorrectly. I stopped and re-entered it correctly, but now, when I address an email to the same person, I see suggestions for both email addresses (the right one and the wrong one). How can I remove that incorrect suggestion?
Our first (perhaps too snarky) inclination was to suggest to David that he simply stop using Outlook Express because Microsoft stopped supporting it or supplying it as an application several years ago. But the fact is that this is a problem in just about every email system. Every modern email editor seems to offer suggestions for email addresses based on previous email addresses that you’ve typed. This is a useful technology until the email application gets the idea that you want to send email to a faulty email address, and then continues to provide that address as a suggestion. Both Outlook Express and the more recent Microsoft Mail allow you to delete an auto-suggest item as it appears in the list by simply pressing the delete key, but it’s not that simple: The problem is that both applications don’t record your changes to the auto-suggest list until you actually send the email. You can’t just delete the name and then cancel sending the email. We did find suggested steps to solve the problem online.
To remove an auto-suggested email address, start to compose an email message. Start entering the recipient email address, and choose the email address you don’t want to keep by moving up and down through the list of suggestions. Press the delete key to delete the email address you don’t want. (Here’s the important part!) Once you have deleted the errant email address, enter a real email address and send the email (send it to yourself, if you like). Without this final step, the application won’t record your auto-suggestion delete. Yes, it seems anti-intuitive, but you must actually send an email to record the change to the auto-suggest list.
Lock your mobile device
I see people all the time using their mobile phones and never entering a code to unlock them before they use them. It seems a lot simpler to just start using the device, but it seems like it would be more secure to have an unlock code. Should I bother using the device’s lock feature?
Unequivocally, we suggest that anyone using a portable technology take advantage of any built-in locking mechanism to help prevent information theft. It seems like it would take some unnatural act to extract the device from your hands, but in fact, people lose or leave their devices daily. With that in mind, Ken used to use his iPad without a lock code, and of course, left it on a plane. Amazingly, the airline found and returned his iPad quickly but not before Ken frantically changed every password for every service he used, knowing that anyone who picked up his iPad would have access to all sorts of private information. You may not think the information on your phone or tablet is sensitive, but think about all of your contact information. Your associates, friends and family members deserve their privacy.
All modern portable devices offer at least some sort of locking mechanism. If you’re using iOS on an iPhone or iPad, you can select either a simple 4-digit code or a more complex code of any length. We suggest that you consider using the more complex code — the problem with the simple code is that thieves can tell by looking at the screen prompts that you use a 4-digit code, and believe it or not, the grease on your fingers often makes it perfectly clear what the four digits are. Using a more complex code means that a thief has no information about the length of the code. Yes, it may take a while to get used to entering a code each time you use the device, but it’s worth it if the device is lost or stolen. It’s also worth looking into using the Find My Phone app in iPhones/iPads, or similar features on other devices, which allow you to track the location of your device. Using iOS, you can also use this feature to wipe your device should it be stolen, effectively removing all the content from your device before anyone can access it.
Doug Behl and Ken Getz spent years answering questions in private and are minimizing the questions by pre-emptively publishing the answers. Hear Doug and Ken’s tech tips on KNCO radio weekdays at around 8:21a.m. and 5:38 p.m.Submit your own technical questions to firstname.lastname@example.org.