Since 2005, I have written the weekly column titled ‘COMPUTER SENSE’ that appears in the Business section of the Sunday Norman Transcript newspaper. I hope you find it to be helpful, informative and entertaining. Please email your opinions about the column to the Norman Transcript editor at editor@normantranscript.com, and the Publisher at publisher@normantranscript.com. They need your ideas and feedback. Be sure to include your name and location in your email.
Oh, for a World Wide Web of Trust
My state-wide teaching tour continues next Monday, March 26, 2012, 6:30 p.m. at the Bethany Library in Bethany, OK. My class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class is free,...
Passcode-protect your computer, Part 2
My state-wide teaching tour continues next Monday, March 12, 2012, 6:30 p.m. at the Edmond Library in Edmond, OK. My class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class is free,...
Passcode-protect your computer
My state-wide teaching tour continues next Monday, March 5, 2012, 6:30 p.m. at the Del City Library in Del City, OK. My class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class is free,...
Give fake answers to security questions
My state-wide teaching tour continues next Monday, February 27, 2012, 6:30 p.m. at the Choctaw Library in Choctaw, OK. Last week's class at the Mustang Library was rescheduled due to my being under the weather; I'll be there Thursday, March 1, at 6:30 p.m. The class,...
Don’t use weak passcodes
My state-wide teaching tour continues next Tuesday, February 21, 2012, 6:30 p.m. at the Mustang Public Library in Mustang, OK. The class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The...
Antivirus is not enough
My state-wide teaching tour continues next Monday, February 13, 2012, 6:30 p.m. at the Belle Isle Library in Oklahoma City. The class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class...
Computer updates: first step to security
Next Tuesday, February 7, 2012, 6:30 p.m. at the Moore Public Library, I begin a teaching tour of public libraries around the state. The class I teach is called, “Fight the Internet Bad Guys and Win!” It is a highly updated and refined version of the class I have...
What’s the best Internet security software for 2012?
Picking the right security software to protect your computer from the dangers of the Internet can be a challenging task. It's a bit like shopping for a lawyer or doctor: you never really know if they're any good until you win or lose your case in court, or learn that...
Ccleaner: free, easy computer cleanup, Part 2
We began looking last week at the nifty program called Ccleaner, where I covered the program’s “Cleaner” function. This week, let’s look at the Registry and Drive Wiper functions. First, an understanding of the Windows registry is in order. The Windows registry is a...
Ccleaner: free, easy computer cleanup, Part 1
Like most computer repair guys, I have a software toolkit of sorts, comprised of my favorite programs. One of my favorites, which I have used for years, is called Ccleaner. Ccleaner used to be called Crap Cleaner, but the program’s authors decided to change the name...
Can you live without your computer?
Is there life after computing? What happens when a computer dies? Will its information be resurrected some day in a different form, or does it simply vanish forever? Can you live without your computer? Most individuals could live without their computers, but life...
Smartphones and iPads: new hacking frontiers
Wow, that’s a nice, new phone you have. But, wait; is it merely a phone, or is it actually a pocket computer that just happens to also make phone calls? How about that fancy, high-dollar iPad you have; or, Kindle Fire, or Toshiba Thrive or Samsung Galaxy tablet you’re...
To Wi-Fi, or not to Wi-Fi, Part 4
Open, unsecured, “free” wireless Wi-Fi networks are not, I repeat, not safe to use. If you’ve read my previous three columns, you know why. If you haven’t read them, they are on my website. Without the proper measures in place, unsecured networks should not be used...
To Wi-Fi, or not to Wi-Fi, Part 3
Reading my two previous columns, you learned how to set up a secure wireless (Wi-Fi) network at your home or place of business. You also learned how dangerous it can be to use free, “open,” unsecured wireless networks, such as those found at restaurants, schools and...
To Wi-Fi, or not to Wi-Fi, Part 2
Last week, we looked at Wi-Fi, AKA, “Wireless Fidelity.” We learned that it is synonymous with wireless networking, and I showed you how to set up a secure, encrypted wireless network of your own. Secure wireless networks are great, but what about when you want to use...
To Wi-Fi, or not to Wi-Fi, Part 1
Quick, tell me what “Wi-Fi” stands for. Yes, yes, I know it’s goofy computer shorthand for wireless networking, but, what does it mean? You have five seconds and there’s a prize involved. “Wi-Fi” is short for “wireless fidelity,” a term coined sometime around 1999,...
Computers are not an investment, they’re an expense
Over the years, the back rooms of my house have turned into a sort of computer salvage yard and recycling center. Numerous shelves are stacked with all sorts of bits and pieces salvaged from otherwise dead machines. If you need a replacement thingamabob for your...
Sharing large files is easy with the right tools
A customer recently complained that his email program was crashing every time he tried to send photos taken with his digital camera to friends and relatives. After a bit of investigation, I discovered the problem. He was, on the surface, doing everything right....
Internet truth, Internet hoax
Like Star Trek’s Mr. Spock, an eyebrow was raised today when I read the subject line of an important-looking email. It said, ”VERY URGENT - PLEASE READ - NOT A JOKE.” “Oh boy, here we go again,” I thought, but I read the email, anyway. It warned against opening any...
Too many passwords? Think again
Remember the hapless chap from last week’s column whose password was “Bob?” After switching to a “real” password (which should never be an actual “word,” anyway) and doing some essential repairs, the bad guys stopped invading his computer. Bob has been happier ever...