Purpose:

Teaching you how to protect your data and helping make "free" WiFi safe again
Made in the USA



What We Offer:

We provide articles, tutorials, other supporting material, and software that will teach or help those who don't have the technical knowledge of how they can defend and secure their Microsoft Windows, Linux and variants, and MacOS computer from attackers, people often mistakenly call hackers.

Please Support Our Effort:

We have self-funded this research for over a decade, and prototype development in the last few years, and now we ask for any and all support you might be able to provide.


PRODUCTS

DSBCSecuritySuite.com Free & Paid Products

Latest changes: TBD

COMING SOON: The DSBC Security Suite. The application set that provides security tools missing from most if not all current operating systems, initially for Microsoft Windows, with Linux and other variants, including MacOS, targeted for future releases for most if not all Security Suite features...

Introduction & Articles Blog Free Access

Latest changes: March 27, 2024

Various articles with specific topics that need discussion, sometimes overlapping with discussions under Our History material. These provide more detail you might be interested in, such as an outside a government security clearance survey of the US National Security Infrastructure, that might have no validation to it at all...

Tips & Tutorials Blog Free Access

Latest changes: March 27, 2024

Material targeted towards specific information that will help you use and defend your system in a more effective way. These are lessons researched and experienced by our Founder and each is optional to read or use, but hopefully you can find some benefit. Some of these relate to how you use your cellphone hotspot, your home router and WiFi, your mobile hotspot, and anything else that could help you be more secure with your computer use...

Application Lists (Coming Soon) Free Access

Latest changes: TBD

Lists of different types of security applications you might want installed on your system. No specific applications will be recommended because they could become targeted applications by attackers. You should choose applications based on paid, free, or other factors you decide are important to your needs. Our process does not require any particular application or application set though our own applications are in development...


ABOUT US

Teaching you how to protect your data and helping make "free" WiFi safe again
Made in the USA



Our Mission:

We provide articles, tutorials, other supporting material, and software that will teach or help those who don't have the technical knowledge of how they can defend and secure their Microsoft Windows, Linux and variants, and MacOS computer from attackers, people often mistakenly call hackers. Many free resources are provided and licenses for our software(Coming Soon) will be available as well. Some of these applications will be available for platforms other than Windows in part or whole at some point in the future.


Definitions:

Some terms you should know and differences in how we use them in our presentations...

hacker noun - From: https://www.merriam-webster.com/dictionary/hacker

Pronunciation: hack·​er | \ ˈha-kər \

Definition of hacker:

1 : one that hacks
2 : a person who is inexperienced or unskilled at a particular activity,
ie. a tennis hacker
3 : an expert at programming and solving problems with a computer
4 : a person who illegally gains access to and sometimes tampers with
information in a computer system



attacker - From: https://www.pcmag.com/encyclopedia/term/attacker

Pronunciation: at-tack-er

Definition of attacker:

A person or other entity such as a computer program that attempts to cause harm to an information system; for example, by unauthorized access or denial of service. Human attackers are also called "crackers" and "hackers." See cyberattack.



Our definition and use: Steven Levy described in his book, Hackers, what this traditional and iconic term, hacker meant. In this day and age, a large group of evil folks have taken over the term, and better terms to describe what they do are script-kiddies or attackers. We will use attacker on this website and in other presentation material, as it appropriately describes what they do, as well as our Founder learned this definition from one of two primary instructors presenting material for one of the Certified Ethical Hacker(CEH) training websites.



The NSA or The-NSA - Self-defined: We use this term to differentiate the good guys(The National Security Agency) from bad guys who do or appear to have similar abilities.

Pronunciation: the-n-s-a

Definition of The NSA:

The entity in the United States government tasked with identifying people doing bad things by parsing through cell phone calls and Internet usage, who are also the last line of defense against foreign actors who wish harm upon our country. In other words, the good guys, who we fully support.



No Such Attackers (NSAs) - Self-defined: We created this term for educational purposes to explain some of the "unexplainable" cyber and computer problems we've experienced.

Pronunciation: no-such-at-tack-er

Definition of No Such Attacker(s)(NSA/s):

A person or other entity that appears to be able to do impossible assaults upon one or several computer systems, possibly even yours. When an assault occurs and can't be explained, NSAs could be at cause and allows differentiating from The NSA. These are the bad guys. But this gouping can also be used to describe certain people within The-NSA group who illegally access and use government programs and facilities for retaliatory personal gain against former employees who have lawfully reported illegal activities of above mentioned certain people.




Please read more for background information and details of our unique Windows data security process. This material was created to help those who don't have the technical knowledge needed to help themselves with Microsoft Windows computer data security. And we're not here to make fun of any particular government organization, but the material is simply intended as a learning and teaching mechanism that provides a concrete mental image of what attackers do and how they operate. NSAs(No Such Attackers) and The-NSA provide the best educational examples and representation of bad and good people respectively, for this mechanism...

 

 





Highlights Of Our Material

Over A Decade Of Research Put Into This Solution

Research for this began in 2011 and has been used in many of the places most people fear to tread. Its been a decade in the making for a problem that's been around since the creation of the Windows Operating System...



True Microsoft Windows Operating System Data Security

This is NOT an "update your virus checker and you'll be fine" solution. This is real, because a lot of attackers thought they were taking advantage of someone who was actually paying extreme attention to what was going on...



Available Worldwide - Self-Help Learning Material And Software

This is a solution that uses Microsoft Windows to secure Microsoft Windows itself, but with trade-offs. Meaning NO export restrictions by the government. No, this solution is not a joke! Windows has been sold and exported to almost every country in the world...


OUR HISTORY

About Our Founder & Attacks History Blog Free Access - Incidents that helped evolve our solution

Latest changes: March 16, 2024

This provides the background information for our Founder and some of the modis-operandi you might like to know about...

Somewhat detailed accounts of numerous incidents that allowed our Founder to analyze the different assault types attackers use, and create this material which has been well vetted and hopefully will help you defend from as many attackers as possible...


LATEST NEWS

News Blog Free Access

Latest changes: March 27, 2024

Latest news and updates on our development and other progress...





SUPPORT US

After over a decade of self funding this research, we ask for your help. If you feel this solution might be beneficial to you, your family, your friends, or others in general, PLEASE support us as much as you can. We've made a lot of progress and are close to full product deployment. And now feel the time is right to move towards making it avaialable for as many people as possible. But we need your help in order to make it into an easily supportable product. Thank you!

GoFundMe Logo
Kickstarter Logo
PayPal Logo
Patreon Logo





CONTACT

Round Rock, TX, USA Corporate HQ

  • +1 512 850 7668
  • contact -At- DataSecurityBootCamp -Dot- com

Top