Page 38 - Cyber Defense eMagazine October 2023
P. 38

All this, combined with my background as a self-taught programmer with various inventions, prompted
            me to search for a solution to the problem myself. And I have created one.

            First, I needed to set aside from consideration any serious mass breaches of security and focus on the
            three possible methods hackers use to attack and capture individuals' private information:

            1. Capturing online keystrokes (keylogger)

            2. Watching the screen during website access

            3. Capturing and transmitting a file that contains your passwords



            In our product, HACK BLOCKER, we coined the term "VACCINATES" to emphasize how it protects you
            against all of the hacking attacks on those websites you choose to "vaccinate." And it does this after we
            totally deleted and eliminated all the access security on all of the websites - 2FA, a USB physical key,
            Google Authenticator, and a half-dozen PC antivirus programs, which I won't bother to list.

            Using our Hack Blocker invention, you gain complete, secure access to your selected websites with a
            single mouse click. This includes financial - banking, brokerage, retail, and many other websites. The
            software is purposely portable on a flash drive, making it usable on any PC, with 1-click website access
            and with unbreakable encryption only overcome by the user\owner. If lost, it is unusable by anyone not
            knowing the 'KEY.' But with the ‘KEY’, inserting a new Hack Blocker Flash Drive into the original PC
            automatically reinstates it with all your accumulated website data.

            So, what's the magic sauce? It's simple. When a user adds or edits a new website, we turn off the internet,
            essentially stopping all internet traffic while the program creates a complex password and encrypts and
            saves the website's access information with the owner's 'KEY.' The encryption KEY is memorized by the
            user\owner and never appears anywhere within the saved data. Then, we turn the internet back on,
            access the website from a list with a single mouse click and enter the required access information with a
            click and paste, never having to type on the screen.

            While many password manager programs attempt to do this, they are usually cloud-based. They cannot
            do the vital step that Hack Blocker does – automatically turn off the internet while inputting website access
            information and turn it back on when done.

            Now you have the history behind the Hack Blocker development. It's less expensive than anything out
            there  and  is  the  ONLY  ONE  that  worked  for  us.  It  is  ten  times  easier  than 2FA,  USB  Key,  Google
            Authenticator, etc. And it's entirely portable – carry it on your key chain and get complete 1-click website-
            protected access on any PC.

            There is now also a downloadable free trial version that installs directly onto your PC’s hard drive which
            can be activated to full functionality via email.









            Cyber Defense eMagazine – October 2023 Edition                                                                                                                                                                                                          38
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   33   34   35   36   37   38   39   40   41   42   43