Introduction
Summary: Introduction to the Articles and other Writings.
------------------------------------------------------------------------------------------
Welcome
Hello. Thank you for visiting my website. If you're here reading this, then you too have an interest in protecting your data and financial information. I hope you're able to find at least one article that is useful to you. Eventually, the software in development will be made available and many of the assaults described on this site will be preventable. But I need your help. Please do read the rest on this page, but especially read the Crowdfunding sectipon as I seek your help so I can help you. Thank you!
About Me
I am a 30+ year computer professional, having been doing infrastructure development and automation for various computing environments for 20+ years. A self-taught skill I still try to promote when I seek developer roles is my refactor and reverse-engineering skill I use to improve computer and associated environments. This skill has been invaluable in reverse-engineering how Microsoft Windows 10 has been put together, and how to secure it from the users' point of view. This is an ongoing activity as Microsoft makes undesireable changes so it very much has been a game of Whack-a-mole. But its not impossible it turns out, with my skillset I say humbly.
The Written Content
The material is based on my own experiences. The beginning Attacks History is based on negative experiences I believe many people everyday experience. The difference being I've kept notes of who, what happened, the fallout, and how to prevent the situation. A lot of content to document, so you'll notice there are many placeholders on the website. As time permits, I'll get to each of them to give you an idea of what assaults you can look for and hopefully prevent before losing any finanaces or data.
Additionally, some of the article topics might seen a bit out of place or "odd". Until I've been able to almost completely document my experiences, you won't understand the big picture of everything. Experiences of my whistle-blower situation in a government role and then being used as a test subject after performing network software tools work for a major cellphone company are also scattered through the writings. This material is important because it provided a platform of material and experiences to analyze which is now the basis of my legitimate data security material. If I hadn't become an unwilling test subject by the cellphone company, I would never have discovered a number of deprecated Microsoft tools, Windows configurations that Microsoft depends on to catalog data on your system, and other content that truly creates a data security methodology and defense strategy that works really well.
Crowdfunding
If you can assist, please do help. If you can spread the word about this project, please do so. If you can get together with friends and family to make lots of little donations, please do so. If you can afford larger donations, please do so as well. All donations will be much appreciated. but please only make donations through legitimate donation mechanisms I list below so proper taxes can be paid. And please only donate what you yourself can afford.
Thank you very much for your interest in my project! I look forward to helping as many people as possible worldwide, so we can reduce or eliminate the $400 Billion plus in annual data, identity, and financial losses(last U.S. losses I've seen) by many people who should never have to go through it.
You can visit the links below or visit THIS for a current list of Crowdfunding links.
SpotFund.com: Please visit THIS to donate with Spotfund.com. Please also share this link with friends and associates.
Other Crowdfunding TBD
If you're an investor, investment organization, or related, please reach out to us directly through our Contact methods listed, for our Pitch-Deck. Thank you!
References:
- None