A Defensive Computing Checklist    by Michael Horowitz
NOTE: I gave a presentation on Defensive Computing at the HOPE conference in July 2022
HOME | Full Site Index | Domain Names | VPNs | iOS | Android | About | Rules of the Road | DC Presentation |

ABOUT THIS WEBSITE

No website like this can ever be complete, nor would anyone want it to be complete as that list would never end. I tried to limit this to the most important issues, still its long (25,000 words the last time I counted).

There is a bit of "Ball Four" here. Back in the 1970s, Jim Bouton's book told the inside story about what it was like to be a major league baseball player and about the players themselves. He offered a new perspective on baseball. People need a new perspective on computing. Much of the advice offered to the public is flatly wrong. Even when people mean well, they are often mis-informed or merely parroting back an accepted principal. Perhaps the most famous advice that turned out to be wrong, was the suggestion to periodically change your passwords. Ugh. Then too, advice from techies is often right for other techies, but wrong for the general public.

This site will never be popular. Screaming THINGS ARE BAD! THINGS ARE BAD! gets attention. Offering people dull and boring errands to protect themselves gets none.

And that brings me to the mainstream media, which is frequently wrong both by commission and by omission. Far too many articles are written by Art History majors covering tech this year, after covering some other beat previously and before they move on to yet another area. Very few large media stories (I'm looking at you WaPo and NY Times) are written by actual nerds. They don't even seem to be reviewed by qualified techies. Case in point from July 2019: A report came out about web browser extensions that spy on you. This triggered long articles in the Washington Post and Ars Technica. Neither article suggested using a Chromebook, where Guest mode does not allow any extensions. I could go on and on and on . . .

As to the site itself, I am well aware that the home page much too long. The site was not intended, in the beginning, to be this big. I am, slowly, moving topics into their own pages and off the home page.

The Domain Rules page is not a checklist, but instead offers an explanation of the rules for domain names. People that know the rules should be resistant to many assorted scams. The VPN page is also much more than a checklist, but it does not offer a starting-from-ground zero explanation of a VPN.

All the credit/blame for this site falls on me, Michael Horowitz. If I left out anything important, or something is not clear, let me know at defensivecomputing -at- michaelhorowitz dot com. Also, if you find any of this too advanced or too mired in buzzwords, let me know.

Why trust me? I am a retired techie (About Me) with nothing to sell. I have been interested in Defensive Computing for a very long time. I blogged about it for a year at CNET and 9 years at ComputerWorld. If you do a Google search for "Defensive Computing", I am all over the first page of results.

This site is as clean as clean gets. There are no ads. There are no trackers. It does not set any cookies. None of the links here are affiliate links, I do not profit from this site in any way. No need to believe me. You can test for setting cookies at cookieserve.com. Here is a screen shot of the clean bill of health. You can also test at Blacklight a website privacy inspector from The Markup. You can click here to run a live test of this site. For reference, here is a screen shot of a Blacklight scan from Sept. 23, 2020. If you see any ads here, something (your computer, browser or router) has been hacked.

This Page
Last Updated

August 3, 2022
Total Site
Page Views

 362,216
Site Page
Views Today

  66
Previous
Website View

4.6 minutes ago
Website by
Michael Horowitz
@defensivecomput
top
Copyright 2019 - 2022