ABOUT US
Teaching you how to protect your data and helping make "free" WiFi safe again
Made in the USA
Our Mission:
We provide articles, tutorials, other supporting material, and software that will teach or help those who don't have the technical knowledge of how they can defend and secure their Microsoft Windows, Linux and variants, and MacOS computer from attackers, people often mistakenly call hackers. Many free resources are provided and licenses for our software(Coming Soon) will be available as well. Some of these applications will be available for platforms other than Windows in part or whole at some point in the future.
Definitions:
Some terms you should know and differences in how we use them in our presentations...
—
hacker noun - From: https://www.merriam-webster.com/dictionary/hacker
Pronunciation: hack·er | \ ˈha-kər \
Definition of hacker:
1 : one that hacks
2 : a person who is inexperienced or unskilled at a particular activity,
ie. a tennis hacker
3 : an expert at programming and solving problems with a computer
4 : a person who illegally gains access to and sometimes tampers with
information in a computer system
—
attacker - From: https://www.pcmag.com/encyclopedia/term/attacker
Pronunciation: at-tack-er
Definition of attacker:
A person or other entity such as a computer program that attempts to cause harm to an information system; for example, by unauthorized access or denial of service. Human attackers are also called "crackers" and "hackers." See cyberattack.
—
Our definition and use: Steven Levy described in his book,
Hackers, what this traditional
and iconic term,
hacker meant. In this day and age, a large group of evil folks have taken over the term, and better terms to describe what they do are script-kiddies or attackers. We will use
attacker on this website and in other presentation material, as it appropriately describes what they do, as well as our Founder learned this definition from one of two primary instructors presenting material for one of the Certified Ethical Hacker(CEH) training websites.
—
The NSA or
The-NSA - Self-defined: We use this term to differentiate the good guys(The National Security Agency) from bad guys who do or appear to have similar abilities.
Pronunciation: the-n-s-a
Definition of The NSA:
The entity in the United States government tasked with identifying people doing bad things by parsing through cell phone calls and Internet usage, who are also the last line of defense against foreign actors who wish harm upon our country. In other words, the good guys, who we fully support.
—
No Such Attackers (NSAs) - Self-defined: We created this term for educational purposes to explain some of the "unexplainable" cyber and computer problems we've experienced.
Pronunciation: no-such-at-tack-er
Definition of No Such Attacker(s)(NSA/s):
A person or other entity that appears to be able to do impossible assaults upon one or several computer systems, possibly even yours. When an assault occurs and can't be explained, NSAs could be at cause and allows differentiating from The NSA. These are the bad guys. But this gouping can also be used to describe certain people within The-NSA group who illegally access and use government programs and facilities for retaliatory personal gain against former employees who have lawfully reported illegal activities of above mentioned certain people.
Please read more for background information and details of our unique Windows data security process. This material was created to help those who don't have the technical knowledge needed to help themselves with Microsoft Windows computer data security. And we're not here to make fun of any particular government organization, but the material is simply intended as a learning and teaching mechanism that provides a concrete mental image of what attackers do and how they operate. NSAs(No Such Attackers) and The-NSA provide the best educational examples and representation of bad and good people respectively, for this mechanism...