It is time to take back control

New Credit Card Fraud Operating in the Wild

Just when you thought it was safe to go back into the water. Oh, wait. Wrong movie! Do you have a credit card? Do you have a cell phone? Of course you do! And if a bad actor gains access to both of these, they have found an effortless way to gain full control over...

Personal Data Tracking Report: Google Worst, Apple Best

As reported in the August 25, 2022 edition of AppleInsider (https://appleinsider.com/articles/22/08/25/google-tracks-39-types-of-personal-data-apple-tracks-12), of the five major Big Tech firms, Google tracks more personal data than any other, and Apple tracks the...

Hikvision Camera Security Alert

I normally don't post any of the daily cybersecurity alerts that post my desk. If I did, I would quickly fill up my 4TB local storage! But this is significant enough to warrant attention. Hikvision is a highly popular camera manufacturer that is found around the...

Be a Book Reviewer for the Next Practical Paranoia Books!

Want to be a book reviewer while quickly and easily securing your cybersecurity and privacy? Complete the 60-second application: <https://docs.google.com/forms/d/e/1FAIpQLSccuqYe0ak5AELTwr71RR6Vwp7yq6ON2uU_l-yL26naBKar0w/viewform?vc=0&c=0&w=1&flr=0>...

TPM 2.0 and Win 11- Part 2

In what has to be one of the most out of character moves ever, Microsoft recently released a registry hack to install Win 11 on a system that does not meet the minimum hardware requirements set by Microsoft. Why would they do that? It’s a good question that I do not know the answer to, but if allowed to speculate, I have a hypothesis or 2. To get there, let’s go back the beginning of the Win 11 adventure.

Q: How to Configure VPN for IoT Devices?

A: VPN was initially designed to be used by computers. As such, there are software and network drivers to install and configure. The problem with IoT devices (Internet of Things, such as wireless thermostats, webcams, remote doorbells, wireless garage door openers, etc.) is that with almost no exceptions, developers have not included an option to add 3rd-party software and drivers. So by themselves, IoT devices cannot be secured.

Q: Is It Still Safe to Use Tor?

A: Get 100 consultants in a room, end up with 100 opinions. A bit of background information for those not familiar with Tor. Tor was created by the US Navy as a method to create secure, anonymous internet communications. It was soon after released from restricted...

TPM 2.0 and Windows 11- Part 1

With the roll out of Windows 11, the term TPM 2.0 has been introduced to the general public. What is it exactly? Fundamentally, it is a platform integrity and security device. Beyond that, it depends on who you ask.

Q: How Does Our Privacy Get Violated When You Are Told It’s Secure?

When you leave your home for vacation and lock the front door, is your home now “secure”? Not if you left the back door unlocked.

When you leave your home for vacation and lock all doors and windows, is your home now “secure”? Not if someone can toss a rock through a window for access.

Q: Can a Firewall Prevent Phishing?

Phishing is an attempt to gather information from someone while posing as someone or something else. For example, receiving an email that appears to be from your bank, asking for you to confirm your social security number.

The Practical Paranoid makes all of our books available in three formats to best meet your unique needs:

 

  • Paperback.

    This is the traditionally published book. Most are 7.5”x9.25” for easy shelving, reading, and carrying. The biggest advantages of paperback is that you can quickly move through the book, and you can write notes, highlight passages, and even dog ear pages.

  • Kindle.

    The ebook took the market by storm, with Amazon’s Kindle format being the most popular. These are exact replica’s of the paperback editions. You can read a Kindle book on an Amazon reader, any Android or iOS phone or tablet, and macOS and Windows computers. With Kindle books, you can update to the latest book version by deleting the book from your device, and then download the current version from your Kindle Library.

  • Live.

    The Practical Paranoid has taken the ebook one step further. With our Live editions, you will always have the most current version of the book. Live books are exact pdf replica’s of the paperback editions that are viewed online in a browser. Any device that has Internet and browser capabilities will have full access to Live books without even downloading them.

A Great Step-By-Step Guide You'd be Foolish Not to Follow

This reviewer is a 60+, female, self-trained MAC user currently in OS10.8.1 and getting ready to buy a new MAC with Mavericks OS. I purchased and read Marc’s book cover to cover in preparation for understanding the scope of my commitment to get my new Maverick OS computer set-up in the most optimal way, for my home-use network. I want to get it hardened from the get-go. This was the best forty odd-dollar investment I could have made.

Practical Paranoia for the non-paranoid...


I became a client of Marc’s five or six years ago when I said goodbye to Windows, became a Mac shop and put in an OS X server. So when Marc announced his new book, Practical Paranoia, I didn’t waste any time buying a copy.

The reason is simple, when Marc tells you something, you can take it to the bank.

The book is clean, well organized, designed to be completely accessible for the non-geek, and provides step-by-step screen shots and instructions on how to save yourself from the nightmare of data loss or breach.

Best Book on the Subject


Easy to use – I did about half of the recommendations in under an hour. I’m a writer and I run a business from home. I’m not so technically adept. When I travel, I hate packing up all my equipment and putting things in storage to make sure that, in the unlikely event the house is robbed, all my data is safe and I could easily restart my business from a backup in the cloud. This book is a “paint-by-numbers” approach to security for every aspect of a computer system, from backups to email to encrypting the physical drives.

There’s really nothing else on the subject, unless you want to read technical blogs for days. This book has it all in one place and makes it easy for even a normal person (like me).