Just found out my book release is delayed 4 to 6 weeks.
That’s all I have to say.
Just found out my book release is delayed 4 to 6 weeks.
That’s all I have to say.
A hacker called Komodo has infiltrated a Montreal pharmaceutical company. He steals nothing, and causes no damage. Instead, he plants encrypted files for the company’s network security professional, Thomas Faraday.
Halfway around the world, somewhere in the Zagros Mountains, a secret religious league with time travel technology has excavated an ancient Persian stela containing a coded message. When the league recruits Thomas for a mission back in time to the mighty Persian Empire of 473 BC, Thomas discovers the league is hiding a sinister plot.
Now, with time running out, trapped in an ancient nation at war, Thomas must decipher both the Komodo files and the Persian stela if he and his fellow time travelers ever hope to return to the twenty-first century. As if this is not challenging enough, their journey is hampered by betrayal.
Someone among them does not want Thomas Faraday to succeed.
Get a free excerpt
I would like to give back by using my profession to create 15 to 20 short tutorials on how to secure a home computer for the average user. These free tutorials will be introduced one at a time on my book blog in the form of text along with short, easy to follow videos.
To make these tutorials the best they can be I would like your input. Let me know what security issues concern you the most with your computer and on line activities. Your comments will influence my tutorials. You could post your concerns here or contact me through email or messenger.
At this time, my tutorial will only be for Windows users however, the advice on good internet habits will benefit all platforms.
The tutorial will be completely free with no strings attached. You don’t even need to sign up. Just keep visiting my blog as they will be available beginning January or February 2018. If you want to be notified however, you could sign-up on my blog where I will announce each new release. It’s up to you.
Why am I doing this you may ask? It’s quite simple actually. In my line of work I meet new people every day. I’m often approached with horror stories of ones who have been victimised by cyber criminals using techniques that are not so difficult to notice and avoid. I sometimes tell them to take my class but I know most people don’t have the time or resources to invest in a formal course that has high prerequisites.
I end up giving a two minute speech on what to do but I know they end up leaving just as empty as when they approached me with their experience. I came to the conclusion that this is unfair and probably why so many people become cyber-victims. What I want to do is send them to my blog with easy to follow step by step tutorials that will help the average home user have a fighting chance.
Phishing is the attempt to illegally obtain sensitive information such as username, password, and credit card information by pretending to be a trustworthy entity through your email or on the Internet.
Many of us might have received an email saying our account has been temporarily frozen. All we need to do is log into our account and prove our identity by adding our credit card information, as if logging in was not proof enough. If we follow through, we not only have our username and password stolen but they now also have our credit card information.
So how do we protect ourselves?
The number one rule is never reply to the inquiry. Call your company (entity) involved and inform yourself through the proper channels whether there has been a problem. If you’re going on line to visit, let’s say your bank, make sure the URL is accurate and you are protected with the certificate indicated by the “s” that follows the “http,” also have the lock closed to indicate you’re on a secure connection.
Please note that this alone is not a guarantee that it’s the real website of your entity. So what can you do?
Try this fun and simple trick.
In the user box, randomly hit any key on your keyboard and then do the same in the password box. If you are brought to the next step and usually they will ask for your credit card information, you know you are on a phishing site.
For example, when I hit the keyboard the following resulted.
Now let’s be honest, what are the odds that someone really has this username and password?
Final step is to report the site.
For more information see this interesting and simple to understand Reader’s Digest article, 10 ways to protect yourself online.
If I can convince you that God exists through archaeological evidence and as a result you decide to become a Christian. Can you claim to have faith in God?
The purpose of the ULRA, (United League of Restored Axiom) is to convert the world to Christianity through the uncovering of Biblical Relics through time travel. Will they succeed or is it all in vain?
Follow Thomas Faraday as he joins the ULRA and discovers why good intentions are not always enough.
In the novel, The Hunt for Komodo Cracker, Thomas Faraday thought himself safe from hackers behind a DMZ, (Demilitarized Zone) that he implemented himself. Normally this defence strategy would certainly be hard to penetrate. Many network administrators use this to strengthen their network environment.
Here is a quick and simple definition of what a DMZ does according to Thomas Faraday. He explains his own DMZ this way, “The DMZ is well monitored with honeypots, fake web servers designed to attract hackers and if possible trace them to their source. It also had firewalls with a minimum amount of open ports to allow internet users access to the company’s web page which doubled as an email server. It blocked all access to the inside LAN network area where all the company employees had their workstations. This LAN area is where the main servers were located. It’s next to impossible for anyone without the proper access codes to breech the DMZ from the internet and end up in the LAN side undetected.”
If a DMZ is such a strong defence could you implement one for home use? When you buy a home router it almost always comes with a DMZ option integrated. But don’t let this fool you. Almost all home routers featuring a DMZ will allow you to have a computer made visible on the internet but if this computer gets compromised, the intruder will also have access to any other computers, tablets, or anything else connected to your home network, ouch!
But don’t despair; you can make a secure DMZ for your home or small office for free if you have a second router available. They’re available for less than one hundred dollars if you need to buy one.
This is a diagram of a simple home DMZ
Here is how you do it.
Configure router 1 to use 192.168.1.x where x equals your router’s IP address. This is the router directly connected to your ISP provider.
Connect your computer into one of the ports of router 1. This is the computer that will be accessed from the internet.
Now plug router 2 into one of the ports of router 1. Configure router 2 to use 192.168.2.x where x equals your router’s IP address like you did on router 1.
You can now connect all of your computers and other devices into router 2.
Not all routers are configured the same way so you will need the user’s manual for instruction on how to assign an IP address. If you don’t have the user’s manual you can most likely download it from the router’s website.
One last note, you will probably have WIFI capability on both your routers. If so make sure to secure it with a strong pass phrase and use at the very least WPA or WPA2 for the DMZ and WPA2 for your home network. Also give each router a non-descriptive name to conceal that you have a DMZ.
That’s it. Now you have a simple yet effective home DMZ.
Soon I will blog about a free network intrusion detection system to protect yourself from hackers.
If you have any questions, please sign up to be part of my email list and write DMZ in the subject line.
Which ancient world empire cared more for its citizens, Egypt, Assyria, Babylon, Persia or Rome?
The mighty Medo Persian World Empire, 539-331 BC.
Read all about it here
Thomas Faraday in the science fiction novel, The hunt for Komodo Cracker is sent back in time to the Persian Empire of 473 BC. Getting there was easy, coming back home to the twenty-first century however, is not so easy.