Patented Solution


 

Hacking attacks continue to succeed despite widespread use of antivirus. Here’s a secret that antivirus makers don’t want you know: The technology they use to stop viruses can actually make it easier for hackers to access your computer:

“Feds issue alert that Symantec, Norton Antivirus products could let hackers hijack computers.” — Tech Times

[A]ntivirus programs have become the problem, not the solution. Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers.” — Tech Republic

“Is your antivirus protecting your computer or making it more hackable? Internet security experts are warning that anti-malware technology is becoming less and less effective at protecting your data and devices, and there’s evidence that security software can sometimes even make your computer more vulnerable to security breaches.” — CBC News

“Research shows Antivirus software is making surfing and online banking less secure.” — Tech2

“Is your antivirus software putting you MORE at risk?” — Daily Mail

“It might be time to stop using antivirus.” — Ars Technica

“Study finds antivirus software ineffective.” — Government Technology

“Symantec admits anti-virus software is no longer effective at stopping virus attacks.” — Dot Tech

“Antivirus software so ineffective it’s a waste of money, report suggests.” — Computer World

“Google engineer says antivirus apps are ineffective magic, [that] don’t genuinely help. Google security expert says antivirus solutions are useless.” — Softpedia

Key to Stopping Hackers

Stopping viruses and stopping hackers are two different security issues. Unfortunately, the technology used to stop viruses often opens the door to hackers in the process. Widespread overreliance on antivirus has contributed to hackers having free reign over any computer they want. If antivirus doesn’t stop hackers then what does?

“Antivirus tools are a useless box-ticking exercise says Google security chap.
Advocates whitelists and other tools that ‘genuinely help’ security.” — The Register

“Google security expert says antivirus apps don’t work. It’s time to switch to whitelisting instead.” — Network World

Whitelisting Explained

There are two opposite approaches in regards to securing your digital life: blacklisting and whitelisting.

Blacklisting: Blacklisting tries to identify the bad sites, and then block them.

Whitelisting: Whitelisting uses a list of pre-approved sites, and only allows traffic to those sites.

Blacklisting is always out of date as hackers continually create new malicious sites. New malicious sites (by definition) aren’t in any blacklist. The lag between each newly created site and the time it takes to eventually be in a blacklist is the hacker’s window of opportunity. Once that window is closed, the hacker just creates a new site (and thereby a new window). The ease in which blacklisting is bypassed is stunning.

Whitelisting only allows traffic to flow to pre-approved sites. Therefore, newly created sites aren’t even an issue (since the newly created sites are in the pre-approved list). Hackers can literally create millions of new sites and it doesn’t matter to whitelisting one single bit. Since none of those millions of sites are in the whitelist, they’re blocked.

Traditional Whitelisting Problems

With whitelisting being so much more secure, why hasn’t it been more widely used — especially with the tremendous increase in hacking attacks? While whitelisting is effective, it used to be impractical to use:

Too Difficult to Setup: Traditional whitelisting required knowing every conceivable good site in advance; making it extremely difficult (if not impossible) to setup.

Too Restrictive on Browsing Traffic: Traditional whitelisting often interfered with users being able to go to the sites they want, and it often breaks webpages by inadvertently blocking links needed to generate the webpages.

Too Cumbersome to Maintain: Maintaining the list of approved sites on an ongoing basis proved impractical for most use cases.

These three issues have long prevented widespread adoption of whitelisting in security programs.

Patented Solution

Terra Privacy LLC has just unveiled a new invention that finally solves all three problems with traditional whitelisting. Hacker Deterrent Pro uses a new form of whitelisting which is:

Easy to Setup: Hacker Deterrent Pro’s patented method enables you to setup your initial master whitelist in less than ten minutes. Then you are done.

Easy for Browsing the Internet: Hacker Deterrent Pro also has a patent-pending technology that automatically updates your browser whitelist on-the-fly, in real-time, as you surf the net. This technology literally does all the work for you automatically.

Easy to Maintain Your core whitelist only needs to be updated each time you use new software or install a new browser plugin. Hacker Deterrent Pro’s patented method allows you to update the whitelist with a single click of the mouse. Maintenance is almost effortless.

If you want to keep your digital life out of hackers’ hands, you can finally take control with Hacker Deterrent Pro.

Transparent Traffic Control

Hacker Deterrent Pro also includes another patented security method in addition to its unique whitelisting approach. This security method involves Transparent Traffic Control. Unlike security systems that run silently in the background, Transparent Traffic Control continually displays in the foreground the actual names of all who want to communicate with your computer. This closes the door on a critical security hole in other security systems.

Here’s a very important question: If a security system runs silently in the background, how do you know when a hacker has tampered with it? Answer: You don’t know. And hackers routinely use this fact to their advantage.

Transparent Traffic Control always shows the names of all who want to communicate with your computer. There aren’t any settings to disable or filter this display. Therefore, there’s no way for a hacker to configure it to secretly allow traffic to their servers. Even if a person physically adds the hacker’s server to the whitelist, Transparent Traffic Control would show the connection so that you can permanently shut it down with a single click of the mouse. With Transparent Traffic Control (TTC) Security, hackers have no where to hide.

 

Select news coverage of Terra Privacy LLC:

Beta News — May 26, 2017

Security Week — May 25, 2017

PC Tech Magazine — March 10, 2016

 

Inventor’s Biography

Internationally Renowned Cryptographer: Michael Wood is the inventor of the acclaimed REDOC-II encryption system (US Patent 5003596). The historic strength of Michael’s encryption was first attested by Dr. Thomas Cusick (who published 60 papers in the field of cryptography and 8 PhD students whose thesis work was in this area). Dr. Cusick’s conclusions were subsequently confirmed by Drs. Eli Biham and Adi Shamir, the two cryptographers famed for breaking the United State’s government’s national encryption standard. Michael’s Redoc encryption methods are currently taught in the cryptography textbook Applied Cryptography by Bruce Schneier.

Internet-Communications Expert: Michael Wood is also the inventor of an artificial-intelligent system for mapping network topologies — a core component of managing internet traffic (US Patent 6405248). This technology was sold to Micromuse for $42 million for incorporation into the NetCool product line; which was subsequently sold to IBM for $865 million.

 



 

Testimonials

“I have been in the industry for 23 years and this is by far the best addition to my arsenal of tools for dealing with unacceptable network traffic. I think a dynamic white-list is a good solution.” — Timothy Gallardo

“I’ve had this for a week now, I’m very pleased with the tool…. Overall it appears to do what is says it does!” — Enoxh Eloe

“This is amazing! Thank you!” — Therial Rial

More testimonials here.

 

#1 Hacking Method of 2016

The Verizon Data Breach Report for 2016 is out. So what was the number one hacking method of 2016? And how can you protect yourself from it? Find out here.

 

Viruses vs. Trojans

Which are more common: viruses or trojans? The answer might surprise you. Find out here.

 

New Trojan Records Everything

T9000 Trojan records every video, audio, chat message, Microsoft Word document, Excel spreadsheet, Powerpoint presentation, and more. Meanwhile, it’s undetectable to popular anti-malware, including: Norton, McAfee, Bitdefender, and Kaspersky.

Can Hacker Deterrent stop sophisticated trojans like T9000? Find out here.

 

Hacker’s Dirty Little Secret

The cybersecurity industry has a dirty little secret that hackers don’t want you to know. What’s the secret? Find out here.

 

Key To It All

When it comes to defeating trojans, there’s one key to it all: Command and Control Centers (aka C & C Centers, or C2 Centers). C2 Centers are the very heart of the hacker’s operation. Copies of the files you read, the keystrokes you type, the videos you watch, etc. are all packaged and sent to the hacker’s C2 Center. Also, when a hacker wants to control your computer, such as uploading a file, he does so through the C2 Center as well.

Even though C2 Centers are the very heart of the hacker’s operation, half of the security experts at large companies aren’t familiar with them. This lack of knowledge results in tragic consequences. For the golden key to stopping hackers is to sever their malware’s connection to the C2 Center. The moment you do so, the hacker’s entire operation falls apart. More info here.

 

Shockingly Easy To Break Windows 10 Encryption

What if the supposedly secure Bitlocker encryption on Windows 10 could be completely undone simply by pressing two keys? It’s actually that shockingly easy, provided you know which two keys to press and when. More info here.

 

Email Security and Privacy

Two recent Yahoo incidents raise serious concerns over email security and privacy:

  • Over 500 million Yahoo email accounts were recently hacked. (NBC News)
  • The US Govt installed a “” backdoor into Yahoo email servers. (The Intercept)

With the major email providers offering little security and even less privacy, what can you do to take email security and privacy back into your own hands? Find out here.