HOME

The Complete Guide To

Computer Security...

For Mere Mortals

The Complete Step-by-Step Guide to Securing All Aspects of Your Computer Privacy

Your Personal Privacy has NEVER been more under attack than it is right now

Perpetrated of course by criminals, but increasingly now too by criminal governments who act in defiance of the very Constitutions set up to restrict their powers, the attack on Privacy is relentless.

The net effect of this two-pronged attack on us then, is that all of us need the very toughest and most advanced Computer Security that we can lay our hands on.

The revelations of N.S.A. whistle-blower, Edward Snowden, starting back in June 2013, served only to “officially” remind us, of what alert individuals have long known to be true ... and that is, that without taking serious steps to protect our own Privacy & Security, then our online lives and data, are a virtual “open door”.

"Because of all this, The Q Wealth Team commissioned the best computer security experts that they could find, and asked them to report back to them with detailed recommendations, on exactly how to counteract this unparalleled threat to our personal privacy."

That investigation is now complete, and the result is the publishing of the following Security Report, which represents the most cutting edge, “step by step” guide available on the subject to date.

It is a Guide that brings together the very “best of breed” solutions that are available in the industry today, and it will walk you right through the critical steps we all need to take. All the way from the vital foundations that need to be put in place, right through to genuinely “military grade” security software, as well as other software solutions and strategies, that will give you the maximum peace of mind and protection possible today.

Beyond that, Q Wealth Report have also arranged deep discounts for “Done For You” and Consultancy services, offered by our computer and Cyber security partners.

In this eye opening Guide, our experts teach you how to:

  • Secure Your Web Browser
  • Secure Your Email
  • Secure Your Data
  • Secure Your Internet Use
  • Secure Your Laptop, Physically
  • Access Q Wealth Recommendations For Privacy Protection
  • Invest In a Totally Secure Laptop

But just how did we ever find ourselves in this position in the first place?

How did we find ourselves having to go to these extraordinary lengths?

In other words ... How did we end up having to protect ourselves, quite so much anyway?

Well in order to answer those questions, we really need to take a brief look back in time, to see just how and where the recent accelerated levels of privacy invasion came from.

Allow us then to put the recent massive rise in “dragnet security” and “upstream surveillance”, into a little bit of historical context.

In the wake of “9-11” ... the Bush Administration hurriedly declared their “War On Terror”. Striking “while the iron was hot”, by taking advantage of fear and a national grief, as well as a desire for revenge, they rushed through multiple pieces of extremely complex “security legislation”, literally within days.

Such was the flurry of activity, that many felt that these measures simply had to have been written and prepared, long before the event, with some even suggesting that they were just waiting for the “right crisis” to come along, in order to unleash them.

Consider that The Patriot Act alone for instance, was almost 60,000 words long, weighed in at 365 pages, and created or amended almost 150 Laws, Acts and Statutes! And all of that was researched, written, reviewed, and released ... all in just 25 working days from 9-11 ?!

26 Oct 2001, Washington, DC, USA — US President George W. Bush signs the Patriot Act Anti-Terrorism bill in the East Room of the White House. This act gives broader powers to law enforcement agencies to fight terrorism. — Photo by Ron Sachs/Corbis Sygma — Image by © Ron Sachs/CNP/Corbis

But wherever the truth lies (no pun intended) ... one thing is for certain ... and that is, that the world-changing events on 9-11, without question, provided the Administration with the exact pretence and “justification” required, to create The Surveillance State that is now so firmly in place.

Almost immediately, a new “Department of Fatherland Security” ... (sorry we meant to say “Department of Homeland Security”!) was formed.

Then the powers and authorities of the T.S.A. (Transport Security Authority) were also “upgraded”, leading to it being dubbed by many as a “Gropers Charter”.  Alongside these these two behemoths, a virtual “alphabet soup” of further legislation was also proposed or passed.

The powers and authorities of the T.S.A. (Transport Security Authority) were also “upgraded”, leading to it being dubbed by many as a “Gropers Charter”.  Alongside these these two behemoths, a virtual “alphabet soup” of further legislation was also proposed or passed.

The “SEVEN DWARVES” Were...

S.O.P.A.

F.I.S.A.

P.I.P.A.

A.C.T.A.

F.A.C.T.A.

C.I.S.P.A.

And of course, not forgetting the Daddy of them all ... The U.S.A. P.A.T.R.I.O.T. Act ... the acronym of which by the way, stands for ... Wait for it...

Uniting and

Strengthening

America by

Providing

Appropriate

Tools

Required to

Intercept and

Obstruct

Terrorism

The committee who came up with these, must have been up all night! And to think that most people thought that it was all just about “being a Patriot”!

Such has been the outrage and reaction against the excesses and abuses of the PATRIOT Act, that 12 years later, in 2013, even the primary author of the Act, Jim Sensenbrenner, felt compelled to react to the outrage, by helping to pen an amending Act called ...

The USA FREEDOM Act!  

This time it stood for...

Uniting and

Strengthening

America by

Fulfilling

Rights, and

Ending

Eavesdropping

Dragnet-Collection, and

Online

Monitoring!

You really couldn’t make this stuff up!

But now as the years have passed by, let’s just say that the Freedom Act seems completely toothless, in comparison to the still draconian Patriot Act, and looks like just what it was simply a token gesture”, put in place merely in an attempt to pacify the chorus of public protest.

The original “unpatriotic” Patriot Act then, represented one the greatest assaults on personal freedom in history, and was rushed through Congress with unseemly haste.

So much so, that astonishingly, the majority of Members of Congress didn’t even read a single word of it, before they were pressurised into passing it into law.

It was a staggering exercise in political coercion and “arm twisting”... or was it “democracy”? Many were confused.

At the time, a clearly furious Dr. Ron Paul, one of only 3 Republican Congressmen to vote against the original Patriot Act, summed up the feelings of millions of Americans, not to mention billions worldwide, when he said:

Dr. Ron Paul / Republican Congressman

The insult, is to call this a 'Patriot Bill', and suggest that I'm not patriotic, just because I insisted on finding out what is in it, and voting no! I thought it was undermining the Constitution, so I didn't vote for it, and therefore, I'm somehow not a patriot? That's insulting!"

Congressman Paul added :

Our forefathers would think it's time for a revolution! This is why they revolted in the first place! They revolted against much more mild oppression!"

Congressman Dr. Ron Paul

Making his feelings well known on the CNN News Channel

But ... and here is where we really need to take a step back ... many people like Dr. Paul ... (and most likely you too if you’re reading this) were quite rightly appalled, and vehemently opposed to the extent of these measures ... but ... none of that outrage changes one underlying reality.

And that reality is ... that all freedom-loving people, simply have to find a way to “live with”, or “work around”, these increasingly draconian powers.

And so with all of the above in mind ... we’d like to introduce you to something that we have light-heartedly called... The Tale of 2 Laptops

Our story is of someone caught up in the new “Guilty Until Proved Innocent” world of “dragnet security”, that 21st century “border security” has become. If nothing else, the experiences of the Tale should spur us on to “invest in our privacy” ... so that we don’t have to go through, what you will soon find out that a man in Canada had to undergo.

Our “Tale” then, is based on his true-life experiences in 2015. It is the simple story of a person who fell foul of the ever-encroaching “security measures”that we’ve been discussing. We have merely spared his name simply to protect him

And so here it is ... But what follows is no mere fable...

'The Tale of Two Laptops'

You and a friend are returning from a business trip.

You’re both passing through airport security in parallel queues.  You’re are both stopped at the same time by security agents.

What transpires next, will mean one of you has a “normal day”... but the other, will have a really, REALLY “bad day at the office”.

The bottom line, is that you’re both about to face a huge moral dilemma, and an assault; an assault on your privacy.

Crucially though ... only one of you though will deal it “the smart way”.

You have both been singled out for what the agents call a “routine manual search”.  As part of that search, the TSA agents ask you both for the “password for your laptop”.

As part of that search, the TSA agents ask you both for the “password for your laptop”.

The reason for their request?  No reason given! They just flatly repeat ...”We just need to take a look inside your device.”

You can see the dilemma developing can’t you, and obviously neither of you is happy, at all, about such intrusion and invasion of privacy.

​And so this really is “where the rubber meets the road” time.

And so just what DO you both do?

"It is your friend who reacts first ... They decide to “stand on their privacy principles”, and they refuse the request ... declining to divulge their password!"

to “stand on their privacy principles”, and they refuses the request ... declining to divulge their password!

“Hmmmm ... this will be interesting!”, you think!

The Result?  The result was just as you suspected.  Your friend is promptly arrested ... and their laptop is confiscated!

And now they get to spend some really “uncomfortable” time, in a private “rubber glove” interrogation room, being questioned by aggressive TSA agents who haven’t had a refusnik to play with for a few days.

When they are eventually done, you’re friend is told sharply, that they were ... “... obstructing an officer in the course of their duty. See you in court!”

Only in recent times, have such heavy-handed tactics by agents even been made “legal”, and hence as always, freedom loving people are once again having to “adapt to survive”.

Such warrant-less and Constitution-defying “Search & Seizure” tactics of course, are still completely illegal, were they to happen anywhere else in the country, (especially without “probable cause” or a warrant). But they are perfectly legal, at airport and border security checkpoints!

But let’s rewind a little bit ...  Let’s see how “you” handled that same situation in our Tale!

So how did “you” react, when faced with that same request?

After all ... aren’t “your” principles on privacy, every bit as precious to you as your friend’s were to them?

The difference though, as you will soon see ... is that you had made some REALLY smart decisions and moves ... long before you stood in that security line!

​What was “your” response to the agents then?

Your response was to immediately supply the Agent with your password ... just as requested! No questions asked!

OK ... so did that mean that you had “abandoned your principles”?

​No, not at all ... as we will very soon see.

​The Agent then opened up your laptop, tapped in your password, and had a good old “snoop around”.

All they saw though, was a perfectly normal Operating System, and normal, innocent files, data and contents.

But ... “all was not as it seemed”. Because what that agent in fact saw, was not “everything” on your hard drive.  What they saw, was only the “publicly visible” part of your data.

In other words, what they go to see, was only the data that YOU were prepared to let them to see!
What they didn’t get to see, was any any of your sensitive “business data” or “personal data”.

But how is that achieved? Essentially it was achieved by implementing just ONE “layer” of a complete suite of security solutions, that are contained in the fully revised and updated, 2015 edition of ...

The Complete Guide to

Computer Security

For Mere Mortals - 2015 edition

​This stunning, state of the art Guide, has been created to protect your “privacy”, and your “principles”!

To allow you to “comply”, without having to “compromise”.

The Guide is a comprehensive, concise collection of the very latest “Personal Privacy” and “Cyber-Security” solutions that are available in the market place today.

It is a step-by-step study, that walks you through practical protection strategies that you can deploy immediately, to protect yourself. The Guide systematically builds into a practical knowledge base, that builds multi-layered security around every aspect of your computer life.

On page 26 of the Guide for instance, you will find details of the specific “layer” of security that “you” used, in “The Tale of Two Laptops”.  That “layer” is called the “Plausible Deniabilty Layer”, and the Guide shows you exactly how to implement it.

But just to give you a hint, the strategy involves “encrypting only your most sensitive data” ... and NOT all of your data.

But why does it recommend you do it that way?

Why perform only “selective encryption”, rather than “blanket encryption”, of your entire hard drive? Surely applying “uncrackable encryption” to your entire hard drive, secures everything, and that has to be a good thing, yes?

Well ... no actually, it’s not. It is very much NOT a “good thing”, and it can lead to you having an infinitely worse “day at the office”, than even your “friend” in the Tale of Two aptops had to endure!

Here’s a hint ... Trust us ... you do NOT want to go through ... “Rubber Hose Cryptanalysis”!

Page 30 of the Guide outlines exactly what that is, and why, at all costs, you need to avoid it.

Now we’ll share other “layers of security” strategies from the report with you, in just a few moments ... but in the meantime, lets just quickly go back and see how YOUR “Plausible Deniability” software strategy worked out ... as opposed to your “friend’s” painful experience.

Quite simply put, satisfied that their initial “manual analysis” of your laptop has revealed nothing untoward ... the agent quickly sends you on your way, none the wiser as to the contents of the secret files, safely hidden out of sight.

Unlike your business colleague, your outcome means that ...

1. You still have your laptop!

2. You don’t have to convince a judge to let you have it back!

3. Your private and business data is STILL secure!

4. Your concerns and principles about “privacy” have been honored!

5. And, you’re free to get on with the rest of your day ... in peace!

Now THAT, is what’s called “working smart”! And THAT, is how a “very private person”, ends up being “happy” to go along with a TSA agent’s request. Well ok ... maybe “happy” is too strong a word for it!

The “key” though, is that we simply have to be prepare “ahead of time” for these situations ... and that is what “The Complete Guide To Computer Security For Mere Mortals” is all about.

The “Plausible Deniability” strategy though remember, is just ONE of the many “Layers of Protection” that are contained in :

The Complete Guide to

Computer Security

For Mere Mortals- 2015 edition

  • Protect Your Identity
  • Protect Your Privacy
  • Stop being “tracked” while browsing
  • Deploy Data Cloning Software

Also learn how to:

  • Use an offshore email service
  • Encrypt Your Email using PGP software
  • Browse the web anonymously

All of this, and a whole lot more is crammed into the Guide

  1. Complete Browser Security:  Protect and make your browser safe against unwanted spam and phishing programs .
  2. Complete Email Security: Secure your laptop against all unwanted spam and virus, or data phishing emails.
  3. Complete Laptop Security: There are many different grades of laptop Security, from securing your emails and enjoying private browsing, right through to complete data protection.

Only $97

Get Started Now With a 30-day No Risk Money Back Guarantee!

On top of all that, for those wanting to go to the “Next Level”, the Guide shows you how to obtain your own “Totally Secure Laptop”.

These laptops truly are “state of the art”. Fitted with genuinely “Military Grade” 256-bit Loop AES encryption, they are as close to impregnable as its possible to get right now.

So whatever your needs are, the brand new, 2015 edition of “The Complete Guide to Computer Security for Mere Mortals” is ready and waiting for you.

It is simply the best system available for protecting your privacy and your data. If you believe that you deserve the best possible protection, then don’t hesitate ...

Simply click on the link below, and you will have immediate access to a Guide that will change forever, how secure you feel.

Only $97

See what some of our customers have to say:

"I think you should write a book on security. Ever considered it?"

“I have just completed reading the articles you have written; they are fantastic. You really know your stuff, and importantly, you convey it in simple language…

I really appreciate the time you are taking to answer my questions Fredrick. It sets me at ease, knowing I will get a very professional service from the company. I always support such businesses by continuing to give them my business and also referring friends/business contacts… I think you should write a book on security. Ever considered it?”

offshore banking
A.S. Q Bytes member

This is a page section

This is a page section

This is a page section

The Practical International Banking Guide - 2015 Edition

"The Practical, Step-by-Step Guide to Securing Your Financial Future"

CLICK HERE To Learn More

x