(405) 919-9901

Since 2005, I have written the weekly column titled ‘COMPUTER SENSE’ that appears in the Business section of the Sunday Norman Transcript newspaper. I hope you find it to be helpful, informative and entertaining. Please email your opinions about the column to the Norman Transcript editor at editor@normantranscript.com, and the Publisher at publisher@normantranscript.com. They need your ideas and feedback. Be sure to include your name and location in your email.

Oh, for a World Wide Web of Trust

My state-wide teaching tour continues next Monday, March 26, 2012, 6:30 p.m. at the Bethany Library in Bethany, OK. My class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class is free,...

read more

Passcode-protect your computer, Part 2

My state-wide teaching tour continues next Monday, March 12, 2012, 6:30 p.m. at the Edmond Library in Edmond, OK. My class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class is free,...

read more

Passcode-protect your computer

My state-wide teaching tour continues next Monday, March 5, 2012, 6:30 p.m. at the Del City Library in Del City, OK. My class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class is free,...

read more

Give fake answers to security questions

My state-wide teaching tour continues next Monday, February 27, 2012, 6:30 p.m. at the Choctaw Library in Choctaw, OK. Last week's class at the Mustang Library was rescheduled due to my being under the weather; I'll be there Thursday, March 1, at 6:30 p.m. The class,...

read more

Don’t use weak passcodes

My state-wide teaching tour continues next Tuesday, February 21, 2012, 6:30 p.m. at the Mustang Public Library in Mustang, OK. The class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The...

read more

Antivirus is not enough

My state-wide teaching tour continues next Monday, February 13, 2012, 6:30 p.m. at the Belle Isle Library in Oklahoma City. The class, “Fight the Internet Bad Guys and Win!” will teach you how to defeat the Internet bad guys who want to mess with your life. The class...

read more

Computer updates: first step to security

Next Tuesday, February 7, 2012, 6:30 p.m. at the Moore Public Library, I begin a teaching tour of public libraries around the state. The class I teach is called, “Fight the Internet Bad Guys and Win!” It is a highly updated and refined version of the class I have...

read more

What’s the best Internet security software for 2012?

Picking the right security software to protect your computer from the dangers of the Internet can be a challenging task. It's a bit like shopping for a lawyer or doctor: you never really know if they're any good until you win or lose your case in court, or learn that...

read more

Ccleaner: free, easy computer cleanup, Part 2

We began looking last week at the nifty program called Ccleaner, where I covered the program’s “Cleaner” function. This week, let’s look at the Registry and Drive Wiper functions. First, an understanding of the Windows registry is in order. The Windows registry is a...

read more

Ccleaner: free, easy computer cleanup, Part 1

Like most computer repair guys, I have a software toolkit of sorts, comprised of my favorite programs. One of my favorites, which I have used for years, is called Ccleaner. Ccleaner used to be called Crap Cleaner, but the program’s authors decided to change the name...

read more

Can you live without your computer?

Is there life after computing? What happens when a computer dies? Will its information be resurrected some day in a different form, or does it simply vanish forever? Can you live without your computer? Most individuals could live without their computers, but life...

read more

Smartphones and iPads: new hacking frontiers

Wow, that’s a nice, new phone you have. But, wait; is it merely a phone, or is it actually a pocket computer that just happens to also make phone calls? How about that fancy, high-dollar iPad you have; or, Kindle Fire, or Toshiba Thrive or Samsung Galaxy tablet you’re...

read more

To Wi-Fi, or not to Wi-Fi, Part 4

Open, unsecured, “free” wireless Wi-Fi networks are not, I repeat, not safe to use. If you’ve read my previous three columns, you know why. If you haven’t read them, they are on my website. Without the proper measures in place, unsecured networks should not be used...

read more

To Wi-Fi, or not to Wi-Fi, Part 3

Reading my two previous columns, you learned how to set up a secure wireless (Wi-Fi) network at your home or place of business. You also learned how dangerous it can be to use free, “open,” unsecured wireless networks, such as those found at restaurants, schools and...

read more

To Wi-Fi, or not to Wi-Fi, Part 2

Last week, we looked at Wi-Fi, AKA, “Wireless Fidelity.” We learned that it is synonymous with wireless networking, and I showed you how to set up a secure, encrypted wireless network of your own. Secure wireless networks are great, but what about when you want to use...

read more

To Wi-Fi, or not to Wi-Fi, Part 1

Quick, tell me what “Wi-Fi” stands for. Yes, yes, I know it’s goofy computer shorthand for wireless networking, but, what does it mean? You have five seconds and there’s a prize involved. “Wi-Fi” is short for “wireless fidelity,” a term coined sometime around 1999,...

read more

Computers are not an investment, they’re an expense

Over the years, the back rooms of my house have turned into a sort of computer salvage yard and recycling center. Numerous shelves are stacked with all sorts of bits and pieces salvaged from otherwise dead machines. If you need a replacement thingamabob for your...

read more

Sharing large files is easy with the right tools

A customer recently complained that his email program was crashing every time he tried to send photos taken with his digital camera to friends and relatives. After a bit of investigation, I discovered the problem. He was, on the surface, doing everything right....

read more

Internet truth, Internet hoax

Like Star Trek’s Mr. Spock, an eyebrow was raised today when I read the subject line of an important-looking email. It said, ”VERY URGENT - PLEASE READ - NOT A JOKE.” “Oh boy, here we go again,” I thought, but I read the email, anyway. It warned against opening any...

read more

Too many passwords? Think again

Remember the hapless chap from last week’s column whose password was “Bob?” After switching to a “real” password (which should never be an actual “word,” anyway) and doing some essential repairs, the bad guys stopped invading his computer. Bob has been happier ever...

read more