Patented Solution


Hackers create trojans that are completely undetectable to Norton, McAfee, Bitdefender, Kaspersky, and more. That’s why hackers seemed unstoppable… until now.

Introducing Hacker Deterrent: a patented, new invention created by an internationally renowned cybersecurity expert. Hacker Deterrent’s novel method exposes hidden trojans, and instantly severs the hacker’s connection to them.

For example, watch how this unique invention exposes and blocks spyware invisible to Norton and Bitdefender both:



Trojans sneak past firewalls by injecting themselves into other programs that have already been granted internet access. For example, while Microsoft Word (Winword) is accessing the internet, the trojan will inject itself into it. Thus, when the trojan talks to the hacker, the firewall merely thinks it’s Winword using the internet. The trojan is fully allowed.

This is the enigma that needed to be solved: How can trojans be exposed and blocked while they are hiding in reputable programs? Hacker Deterrent’s inventor finally had an epiphany: Trojans aren’t talking to the manufacturers of the processes they’ve invaded. This is the key to exposing them. This is the key to blocking them.

Trojans must communicate with hackers’ servers (called C2 Centers). Even when a trojan hides inside another app such as Winword, it still must communicate back to the C2 Center. The C2 Centers operate at IP Addresses which don’t belong to the manufacturers of hardware/software you own. That’s the hacker’s Achilles heel. Whenever an app tries to communicate with a destination other than its manufacturer, the trojan exposes itself.


In this screenshot:

One Winword destination is “Microsoft Corporation.” Since Microsoft is the manufacturer of Winword, it’s allowed.

Another Winword destination is “Richard Harper.” Since Richard Harper isn’t the manufacturer of Winword, the trojan hidden inside Winword is exposed and stays blocked.

It’s truly that simple. For example, compare how all three methods deal with a trojan hidden in Winword trying to communicate with Richard Harper:

Method Analysis Result
Winword is a reputable program. The Trojan inside it is allowed to run.
It’s normal behavior for Winword to use the internet. The Trojan inside it is granted internet access.
Hacker Deterrent
Winword is trying to talk to a destination different than its manufacturer. The Trojan inside it is blocked.

This is how Hacker Deterrent blocks the trojans that antivirus and firewalls can’t. Think about this: If all your apps are solely talking to their manufacturers then none of your apps are talking to hackers. Simple, yet true.

Unique Approach

Hacker Deterrent’s unique approach is surprisingly easy-to-use:

1. Hacker Deterrent initially blocks all applications (except your browser) from accessing the internet.

2. Hacker Deterrent then discovers and displays the actual name to whom each application wants to connect (e.g. “Microsoft Corporation,” “Adobe Inc.,” etc.).

3. You just click on the names of makers of software/hardware you own (which tells Hacker Deterrent to allow them).

That’s it. You’re done. After all, everything else remains blocked — including invisible backdoors, spyware, and trojans.

Incredibly simple. Incredibly security.

Dynamic Whitelists

The secret to Hacker Deterrent’s unparalleled strength is found in a brand new paradigm: Dynamic Whitelists.

Whitelists specify who a computer can talk to. The problem is that configuring whitelists used to be difficult to setup. Therefore, antivirus and firewalls abandoned the security of whitelists and replaced it with a less-secure technique called heuristics instead. Heuristics tries to automatically identify and block hackerware. But since hackerware can always be made invisible, hackers always get around heuristics — including the heuristics used in Norton.

Hacker Deterrent brings back whitelists, but in a very unique way. First, whitelists are no longer predefined by the user (as older technology required). Instead, the whitelists are generated dynamically, on-the-fly, in real-time. Second, Hacker Deterrent makes dynamic whitelists easy by transforming it into a simple process: simply match applications to the names of their manufacturers.

Whitelists have always provided the most security because they restrict who the computer can talk to — leaving hackers cutoff. But their past difficulty once made achieving this security impractical. However, with Hacker Deterrent’s unique dynamic whitelisting, the most secure form of hacker protection is finally the easiest. In other words, the most secure form of hacker protection is finally available to all.

For details on how dynamic whitelists overcome the weaknesses of traditional cybersecurity: Click here.

More Than Meets The Eye

Hacker Deterrent allows you to apply dynamic whitelists to: Entities, Domains, or even individual Sites. For example, you can whitelist all of Facebook, Inc; or you can whitelist only certain domains owned by Facebook Inc.; or you can even choose to whitelist only specific sites on domains owned by Facebook Inc. You can even drill down to obtain ISP and geolocation info on every IP address as well.

There are many other features packed inside Hacker Deterrent’s elegant display. See user guide for more info.

Browser Traffic Color-Coding

Because Hacker Deterrent allows browsers to access the internet, it automatically color-codes every browser connection:

Green: Known Reputable

Red: Known Malicious

Yellow: Unknown Reputation

Hacker Deterrent automatically blocks red browser connections.

In other words, it automatically blocks two types of traffic by default:

Known malicious (red) browser traffic.

Every internet application except your browsers.

Only green and yellow browser traffic are allowed by default. (Note: You can even set Hacker Deterrent to automatically block yellow browser traffic if you’d like to pre-approve it.)

By allowing reputable browser traffic, you can surf the internet with convenience and ease. By automatically blocking every other internet application, no secretly installed software can sneak behind your back.

Simple. Secure.

TTC Security

The novel idea of Dynamic Whitelists was the brainchild of internationally renowned cryptographer Michael Wood. He termed this now patented concept: Transparent Traffic Control (TTC) Security. The reason being that name-based, dynamically generated whitelists isn’t just the most secure method, it’s also the easiest and most transparent as well:

Useful Tips

The following are just a few of the ways you can use Hacker Deterrent to keep unwanted strangers from accessing your digital life:

Avoiding Email Scams: Only open emails from strangers on a PC running Hacker Deterrent. Let Hacker Deterrent show you who the email actually connects to. If John Podesta had watched where his emails were going, he could’ve prevented the now-famous Wikileak’s debacle.

Safely Open Downloads: Before you open your next software download, grab a free copy of Hacker Deterrent first. Let Hacker Deterrent show you if the software tries to secretly access the internet.

Take Back Your Privacy: Just because you buy a company’s hardware or software, doesn’t mean you have to allow them to watch everything you do. With just a single click of the mouse, you can stop any company from monitoring your every move.

For more tips on online security and privacy, please visit our blog.


Visit Blog Download

Note: This website uses the word “trojan” to refer to independent processes which seek to establish an internet connection to transmit digital info out (i.e. spyware), create an opening for other malware to be installed (i.e. backdoor), and/or allow someone to secretly control the computer (i.e. RAT). For tips on achieving maximum security and convenience when dealing with trojans, please visit our blog.


Inventor’s Biography

Internationally Renowned Cryptographer: Michael Wood is the inventor of the acclaimed REDOC-II encryption system (US Patent 5003596). The historic strength of Michael’s encryption was first attested by Dr. Thomas Cusick (who published 60 papers in the field of cryptography and 8 PhD students whose thesis work was in this area). Dr. Cusick’s conclusions were subsequently confirmed by Drs. Eli Biham and Adi Shamir, the two cryptographers famed for breaking the United State’s government’s national encryption standard. Michael’s Redoc encryption methods are currently taught in the cryptography textbook Applied Cryptography by Bruce Schneier.

Internet-Communications Expert: Michael Wood is also the inventor of an artificial-intelligent system for mapping network topologies — a core component of managing internet traffic (US Patent 6405248). This technology was sold to Micromuse for $42 million for incorporation into the NetCool product line; which was subsequently sold to IBM for $865 million.




“I have been in the industry for 23 years and this is by far the best addition to my arsenal of tools for dealing with unacceptable network traffic. I think a dynamic white-list is a good solution.” — Timothy Gallardo

“I’ve had this for a week now, I’m very pleased with the tool…. Overall it appears to do what is says it does!” — Enoxh Eloe

“This is amazing! Thank you!” — Therial Rial

More testimonials here.


#1 Hacking Method of 2016

The Verizon Data Breach Report for 2016 is out. So what was the number one hacking method of 2016? And how can you protect yourself from it? Find out here.


New Trojan Records Everything

T9000 Trojan records every video, audio, chat message, Microsoft Word document, Excel spreadsheet, Powerpoint presentation, and more. Meanwhile, it’s undetectable to popular anti-malware, including: Norton, McAfee, Bitdefender, and Kaspersky.

Can Hacker Deterrent stop sophisticated trojans like T9000? Find out here.


Hacker’s Dirty Little Secret

The cybersecurity industry has a dirty little secret that hackers don’t want you to know. What’s the secret? Find out here.


Key To It All

When it comes to defeating trojans, there’s one key to it all: Command and Control Centers (aka C & C Centers, or C2 Centers). C2 Centers are the very heart of the hacker’s operation. Copies of the files you read, the keystrokes you type, the videos you watch, etc. are all packaged and sent to the hacker’s C2 Center. Also, when a hacker wants to control your computer, such as uploading a file, he does so through the C2 Center as well.

Even though C2 Centers are the very heart of the hacker’s operation, half of the security experts at large companies aren’t familiar with them. This lack of knowledge results in tragic consequences. For the golden key to stopping hackers is to sever their malware’s connection to the C2 Center. The moment you do so, the hacker’s entire operation falls apart. More info here.


Shockingly Easy To Break Windows 10 Encryption

What if the supposedly secure Bitlocker encryption on Windows 10 could be completely undone simply by pressing two keys? It’s actually that shockingly easy, provided you know which two keys to press and when. More info here.


Myth: Only Complex Trojans Bypass Antivirus

The cybersecurity industry claims that only sophisticated hackers can bypass antivirus and firewalls. But how many lines of code must a person write to bypass antivirus? The answer is going to surprise you. Find out here.


Email Security and Privacy

Two recent Yahoo incidents raise serious concerns over email security and privacy:

  • Over 500 million Yahoo email accounts were recently hacked. (NBC News)
  • The US Govt installed a “” backdoor into Yahoo email servers. (The Intercept)

With the major email providers offering little security and even less privacy, what can you do to take email security and privacy back into your own hands? Find out here.