(405) 919-9901

Since 2005, I have written the weekly column titled ‘COMPUTER SENSE’ that appears in the Business section of the Sunday Norman Transcript newspaper. I hope you find it to be helpful, informative and entertaining. Please email your opinions about the column to the Norman Transcript editor at editor@normantranscript.com, and the Publisher at publisher@normantranscript.com. They need your ideas and feedback. Be sure to include your name and location in your email.

Clean up with foundational cyber hygiene, Part 3

by Dave Moore, 11/08/2020 Critical Security Control #3, as proposed by the Center for Internet Security (CIS), is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This nerdy, wordy tome is written mainly for...

read more

Clean up with foundational cyber hygiene, Part 2

by Dave Moore, 11/01/2020 Continuing last week’s discussion of “Foundational cyber hygiene,” let’s look at the first five “Critical Security Controls” proposed by the Center for Internet Security (CIS). A good understanding of these controls is important to your...

read more

Clean up with foundational cyber hygiene

by Dave Moore, 10/25/20 “Critical Security Controls,” a phrase coined by the Center for Internet Security (CIS), is a high-tech, nerdy way of saying, “super-important things you really, really, really, really need to do.” They’re not kidding around, either; you really...

read more

How to detect email scams

by Dave Moore, 10/18/2020 Email anti-spam filters are often pretty bad at protecting email users. They let bad email through and block good messages with such regularity that I don't really include them as part of my overall Internet safety strategy. The spam filters...

read more

Happy Cyber Security Awareness Month

by Dave Moore, 10/11/2020 Although not an official part of the holiday season, having October as National Cyber Security Awareness Month (NCSAM) is a good thing. If people can have an awareness of cyber security and stay safe, maybe the good guys can win the war for...

read more

Ccleaner: free, easy computer cleanup, Part 2

by Dave Moore, 10/04/2020 We began looking last week at the nifty program called Ccleaner, where I covered the program’s “Cleaner” function. This week, let’s look at the Registry and Drive Wiper functions. First, an understanding of the Windows registry is in order....

read more

Ccleaner: free, easy computer cleanup, Part 1

by Dave Moore, 09/27/2020 Like most computer repair guys, I have a software toolkit of sorts, comprised of my favorite programs. One of my favorites, which I have used for years, is called Ccleaner. Ccleaner used to be called Crap Cleaner, but the program’s authors...

read more

The Great Equifax Hack of 2017: but wait, there’s more

by Dave Moore, 09/20/2020 Memories seem short when it comes to Internet security calamities. Remember the Great Equifax Hack of 2017, where negligence by data megabroker Equifax led to the preventable theft of 145 million credit bureau accounts? I sure do. Equifax...

read more

Hackers exploit weak networks, harming schools

by Dave Moore, 09/13/2020 As if dealing with the current Covid-19 crisis wasn't enough, school districts are finding out just how lame their Internet defenses have been all along, as criminal hackers ramp up attacks that even the most basic of defenses should stop....

read more

From the beginning, fix the computer basics first

by Dave Moore, 08/30/2020 One of the most common complaints that I hear from computer users goes something like this: “Dave, I can’t get my Internet.” Upon arrival at their home or office, I usually discover that there’s more going on than not being able to “get the...

read more

Are you obeying E-records rules?

by Dave Moore, 08/23/2020 All American businesses, regardless of size, that could ever be involved in federal court litigation or agency inquiries have been required to store and be able to retrieve electronic records, according to rules that took effect in December,...

read more

No, Microsoft did not call you

by Dave Moore, 08-02-2020 Allow me to repeat that: Microsoft did not call you. Seriously, Microsoft did not, and will not, call you; I’m positive it was not them. Many folks reading this will be puzzled, thinking, “Why, of course Microsoft didn’t call me; I never said...

read more

Social engineering: the con artist’s craft

by Dave Moore, 07/26/2020 Imagine you bought a new automobile, a new Chevy Malibu, for example. One day, a stranger appears at your front door with an unusual request. "Hello, I'm Bob, with the Chevrolet Repair Department," says the friendly fellow wearing the...

read more

Stop! Don’t install that ridiculous software!

by Dave Moore, 07/19/2020 It’s called “crapware,” or, in more polite circles, “junkware.” Some varieties are called “bloatware,” but the root definition is always the same: useless, ridiculous, unnecessary and annoying software that somehow gets into your computer....

read more

Alice and Bob, Identity Theft, and the FTC

by Dave Moore, 07/12/2020 The following is the background introduction from a complaint I recently filed with the Federal Trade Commission on behalf of two of my clients. The complaint is against a number of credit card companies and investment firms for failure to...

read more

Batten down the hatches with encryption, Part Two

by Dave Moore, 07/05/2020 The best way to protect computerized information from the bad guys is to use encryption. Whether it's financial and medical information stored on your computer or private data sent across the Internet in an email, encryption transforms your...

read more

Batten down the hatches with encryption, Part One

by Dave Moore, 06/28/2020 I once had the pleasure of visiting merry old London, England, attending the InfoSecurity Europe conference. About 12,000 people from all around the globe showed up for the 3-day affair and, as you might suspect, the overall concern of those...

read more

Forget Microsoft Word and Excel; get LibreOffice

by Dave Moore, 06/21/2020 Ah, the mighty word processor: perhaps the most used computer program ever. I'm using one right now to write this column. When I learned years ago how to copy, cut and paste words, sentences, paragraphs, and even entire documents, my epiphany...

read more

What’s your computer disaster plan?

by Dave Moore, 06/14/2020 If your computer broke down today, what would you do? Do you have a contingency plan you can implement in that event? Would you be out of business? What if your cell phone stopped working? Do you have another way to communicate with the world...

read more