You can email me directly at CareyParker@AmericaOutLoud.com

"Parker does an awesome job of bringing computer safety to average users and making it relevant. He's able to make advanced security concepts fun and interesting while not compromising on knowledge." Tip Top Security

Carey Parker was born and raised in Indiana, an only child who loved to tear apart his electronic toys and reassemble them in interesting ways. He began programming computers in middle school when personal computers were just starting to become popular. For years, these twin interests percolated until he attended Purdue University and he learned you could get paid to do this stuff – it was called Electrical Engineering! After obtaining a bachelor’s and a master’s degree in EE, Carey launched his career in telecommunications software development at Bell Northern Research (aka the “Big Nerd Ranch”). Over the next 20 years, Carey wrote software for multiple companies, large and small, and lived in various cities across the southern United States. In recent years, particularly after the Edward Snowden revelations in 2013, he became deeply concerned about computer security and privacy. In 2014, he combined his passion for computers, cybersecurity and fantasy novels with the long-time desire to write the book: Firewalls Don’t Stop Dragons.

Don’t Get Caught with Your Drawbridge Down... Stay Informed!

🎧 Rise of the Machines: Should We Fear Artificial Intelligence?

Will the robots rise up and take over? Or will Artificial Intelligence usher in a Utopian future? These concepts may have seemed like science...

🎧 Equifax Breach, Here’s What You Need to Do

Equifax, one of the three major credit bureaus, was hacked - over 143 million U.S. accounts may have been leaked, making them much more...

🎧 If You Aren’t Backing Up, Your Data is on Borrowed Time

Do you have backup copies of all your family photos and home videos? What about your tax documents and other financial data? Maybe you...

🎧 Your Privacy Rights Are Under Assault at the U.S. Border

There are bills before Congress to use drones along our border for mass surveillance and provisions to capturing all manner of biometric data when...

🎧 How to Live in the Era of Fake News

Jeffrey Ritter, author of “Achieving Digital Trust”, is back to help us understand the phenomenon of “fake news” and to explain why it’s not...
Hackers Crack Safes, Teslas, Car Washes and Voting Machines

🎧 Hackers Crack Safes, Teslas, Car Washes and Voting Machines

Chris Romeo regales us with tales of safe-cracking robots, demonic car washes, possessed Teslas, and hacking of voting machines! Where did this all happen?...
Why I Killed my Company to Save my Customers, pt 2

🎧 Why I Killed my Company to Save my Customers, pt 2

In this final segment, we address the classic conundrum: law enforcement believes that your servers hold key information that would prevent a devastating terror...
Why I Killed my Company to Save my Customers

🎧 Why I Killed my Company to Save my Customers

Ladar Levison is the CEO and Founder of Lavabit - a secure email service whose most famous customer was Edward Snowden. In part one...
Achieving Trust in the Digital Age 2

🎧 Achieving Trust in the Digital Age

Is trust just an emotion or is it more than that? In this week’s episode, I speak at length with Jeffrey Ritter: a lawyer,...
How To Hack An Election

🎧 How To Hack An Election

What could be more crucial to a democracy than a voting system we can trust? Today I speak with Barbara Simons, President of VerifiedVoting.org,...
Creating and Remembering Killer Passwords 1

🎧 Creating and Remembering Killer Passwords

Passwords are the bane of our modern existence. Why the hell haven’t we figured out a better way to prove who we are? Today...
NotPetya Malware Strikes, Everything You Need to Know

🎧 NotPetya Malware Strikes, Everything You Need to Know

Lawrence Abrams is the creator and CEO of Bleeping Computer, and he and I delve into the latest malware sweeping the globe called NotPetya...

THE SHOW

Carey Parker 3

Just how secure is your computer right now?

My guess is that you probably don’t really know. Computers and the Internet have revolutionized the modern world, but if you’re like most people, you have no clue how these things work or what the real threats are.

Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges and castle guards can be effective, you’d go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it’s about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we should all be doing to protect our computers and safeguard our data – just like wearing a seat belt, installing smoke alarms, and putting on sunscreen.

THE BOOK

Carey Parker 1

I’ve structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains well over 100 tips that are guaranteed to make you and your family safer! Topics include: choosing and managing passwords, securely browsing the web and communicating with others, shopping and banking online, creating automated backups, locking down social media accounts, using your smart phone and tablet safely, and even some tips for safeguarding your kids online. And if you want to go the extra mile, this book also explains some of the more interesting and important aspects of security such as encryption, password cracking, home networking, the Internet, VPN’s, and more – all in an easy-going style that’s fun to read!

“This is a great book for anyone with a computer. While nobody really likes to think about computer security, you ignore this book at your peril. Carey is a real expert on the subject and writes in a fun style that makes the topic approachable and most importantly ACTIONABLE.”

– Alan Forbes, author of “The Joy of PHP”