Tuesday, October 23, 2018

Don’t Get Caught with Your Drawbridge Down... Stay Informed!

Carey Parker was born and raised in Indiana, an only child who loved to tear apart his electronic toys and reassemble them in interesting ways. He began programming computers in middle school when personal computers were just starting to become popular. For years, these twin interests percolated until he attended Purdue University and he learned you could get paid to do this stuff – it was called Electrical Engineering! After obtaining a bachelor’s and a master’s degree in EE, Carey launched his career in telecommunications software development at Bell Northern Research (aka the “Big Nerd Ranch”). Over the next 20 years, Carey wrote software for multiple companies, large and small, and lived in various cities across the southern United States.

In recent years, particularly after the Edward Snowden revelations in 2013, he became deeply concerned about computer security and privacy. In 2014, he combined his passion for computers, cybersecurity and fantasy novels with the long-time desire to write the book: Firewalls Don’t Stop Dragons.

"Parker does an awesome job of bringing computer safety to average users and making it relevant. He's able to make advanced security concepts fun and interesting while not compromising on knowledge." Tip Top Security

You can email me directly at CareyParker@AmericaOutLoud.com

ON PODCAST

Carey Parker 3

Just how secure is your computer right now?

My guess is that you probably don’t really know. Computers and the Internet have revolutionized the modern world, but if you’re like most people, you have no clue how these things work or what the real threats are.

Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges and castle guards can be effective, you’d go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it’s about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we should all be doing to protect our computers and safeguard our data – just like wearing a seat belt, installing smoke alarms, and putting on sunscreen.

GET THE BOOK

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don’t really know. Computers and the Internet have revolutionized the modern world, but if you’re like most people, you have no clue how these things work and don’t know the real threats.

Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you’d go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it’s about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data―just like wearing a seat belt, installing smoke alarms, and putting on sunscreen.

Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer.

🎧 Big Companies Behaving Badly: The Facebook Breach Explained

Between 50 and 90 million Facebook users’ accounts were exposed, appearing to give hackers full access as if they were logged in as you....

🎧 Now Is the Time to Freeze Your Credit

One of the best ways to avoid identity fraud is to freeze your credit reports. Thanks to a new law that just went into...

🎧 Prying Yourself From Google’s Clutches

Did you know that Google owns Android, Waze, YouTube, Pixel phones and Chromebooks? Did you know that almost 90% of Google’s revenue comes from...

🎧 The Tale of Ma Bell and Big Brother

AT&T is operating top secret Internet monitoring facilities for the NSA in the heart of 8 major US cities according to a blockbuster report...

🎧 It’s Time to Fix Our Election Systems (Again)

The 2018 DEFCON Vote Hacking Village showed once again that our voting machines are way too easy to hack. Even though election system manufacturers...

🎧 Facebook’s Virtual Private Network is Not Private

Facebook’s “Protect” Virtual Private Network is anything but “private”. Facebook has been using this VPN to monitor all of your web surfing, adding even...

🎧 Hacking Your Network Using 1970s Technology

Security researchers have demonstrated that a modern all-in-one printer machine can be compromised using technology from the 1970s: the venerable fax machine. If you...

🎧 How a Wall of Lava Lamps is Helping Secure the Internet

What do you get when you cross cryptography with a wall of lava lamps? Believe it or not, a much more secure Internet. Cloudflare’s...

🎧 Anti-Sex Trafficking Law Does More Harm Than Good

How can you go wrong trying to stop sex trafficking? FOSTA, that’s how. The Fight Online Sex Trafficking Act (FOSTA) tried to fix something...

🎧 When Plugins Go Rogue

A small company has recently bought up a bunch of mobile phone add-ons and browser plugins, and apparently decided to start snooping on its...

🎧 Your Public Data May Raise Your Insurance Rates

There’s a data gold rush going on in the United States and without regulation, it’s turning into a Wild West of data mining. Modern...

🎧 Supreme Court Scores One for Location Privacy

Where were you on the night of June 22nd? Your cellular provider knows. And until that date just a few weeks ago, if law...