(405) 919-9901

Computer forensics 101

I recently had the opportunity to perform some basic computer forensic analysis for some clients who wanted to know if their computers had been used for “illicit” purposes.  One client, the owner of a popular hairdressing salon, needed to know if her...

When good computers go bad

There you are, dumbfounded, staring at the infamous Windows Blue Screen of Death (BSOD).  You know the screen: the one with the Microsoft-blue background, and the cryptic message followed by indecipherable strings of numbers and letters.  You’re stuck.  Your...

Small office/home office network security, Part 5

All well built modern computer networks, whether in the small home office or gigantic corporation, have at their hearts two essential components: a router to direct network traffic, and a firewall to restrict unwanted contact with the outside world. A router does what...

Small Office Network Security, Part 4

In securing the computers of the small or home office, it is important to consider the physical security of the machines themselves, as there are many threats that do not come from the Internet, but, rather, come from someone having physical access. If there is any...

Small Office Network Security, Part 3

Continuing our examination of the security needs of the small office, let’s look at configuring the existing security options that are built into the operating system (OS) and programs that you use. Whether you use a Microsoft Windows operating system, Apple OS...