(405) 919-9901

Batten down the hatches with encryption, Part Two

The best way to protect computerized information from the bad guys is to use encryption. Whether it’s financial and medical information stored on your computer or private data sent across the Internet in an email, encryption transforms your personal information...

Batten down the hatches with encryption, Part One

I was in merry old London, England a few weeks ago, attending the InfoSecurity Europe conference. About 12,000 people from all around the globe showed up for the 3-day affair and, as you might suspect, the overall concern of those at the conference was information...

Online TV comes of age

Video on the Internet used to be a real drag. Poor quality, herky-jerky playback and lousy audio made online video occasionally interesting, but not anything that I ever felt like devoting much time to. Plus, I’ve never been a big fan of watching TV or DVDs on my...

Why ruin a good computer?

Would you deliberately, as the saying goes, “run your car into the ground?” Would you drive it for 150,000 miles without changing the oil, let the tires go totally bald, never change the engine coolant, never change the transmission fluid, never fix the brakes, or...

Y2K and Conficker: lessons learned?

The Bible tells us that “A prudent man foreseeth the evil, and hideth himself: but the simple pass on, and are punished (Proverbs 27:12, KJV).” Put another way, a wise person sees the trouble coming and prepares for it. Those that ignore the coming trouble will reap...