Want a free story?
Contact
Downloads
Stuff
Somewhere on the planet earth, it’s spring.
The Day I Discovered I’m not Worthless
Tina Scott, thanks for marrying me forty years ago
Mom, may you find the peace in Heaven you wanted on earth
Doug Bean, My Biological Dad. I’m Grateful We Reconciled.
About
About – why do I write?
Sunrise
Tina Scott, thanks for marrying me forty years ago
Mom, may you find the peace in Heaven you wanted on earth
Doug Bean, My Biological Dad. I’m Grateful We Reconciled.
The Day I Discovered I’m not Worthless
Egg drop experiment with Elijah
Books
Trafficking U
Trafficking U
Jesse Jonsen: Lemonade Candy
If I Were a Trafficker, How Would I Find Online Grooming Victims?
Presentation – How Do Online Predators Find Victims?
Stuffing the Protagonist into the Trunk
Virus Bomb
Virus Bomb
Turlach Flanagan: Zero Day
Does 100 proof alcohol feed or douse flames?
Bullseye Breach
Bullseye Breach: Anatomy of an Electronic Break-In
Bullseye Breach was a 2015 Midwest Book Awards Finalist
Two Minute Silent Video: How the Bullseye Breach Attack Unfolded
Regina Lopez: Central American Refugee
Is your cybersecurity as weak as the cheap lock on my bathroom door?
A few people
Good Guys
Jerry Barkley, 1994
Jesse Jonsen: Lemonade Candy
Joanne Gittens, #metoo Pioneer
Bad Guys
Fake News Proposal
Turlach Flanagan: Attack Tools for Hire
Turlach Flanagan: Attack Tools for Hire
Turlach Flanagan: Zero Day
Does 100 proof alcohol feed or douse flames?
Frank Urbino: King of email marketing
Bahir Mustafa: Botnet Master
Wai Jiande: Shanghai Internet
Victims
Fools Gold Academy: Bullseye Breach Victim
Regina Lopez: Central American Refugee
Taneka Martin: Mall of America Bombing Victim
A dozen or so of Greg’s Cybersafety Tips
Media
Media Information
Radio
Fall 2019 radio tour
AM 1280 The Patriot
Sunday, August 18, 2024 with Brad Carlson; Iranians phished American Politicians
Sunday, July 21, 2024 with Brad Carlson; Crowdstrike, Ticketmaster, Facebook, and Books
Sunday, April 7, 2024 with Brad Carlson; Facebook Spying,Good Cybersecurity=Profits, and More
Sunday, Feb. 4, 2024 with Brad Carlson; Microsoft Cloud Email Attack
Sunday, Dec. 31, 2023 with Brad Carlson; Comcast/Xfinity Attack, Christian Nationalism
Sunday, November 26, 2023 with Brad Carlson; CEO Fraud, Online Safety
Sunday, October 15, 2023 with Brad Carlson; 23 and Me and Cybersecurity Pro Burnout
Sunday, Aug. 13, 2023 with Brad Carlson; Microsoft Azure Attack
Sunday, July 16, 2023 with Brad Carlson; Solarwinds Attack, Online Grooming, and “Trafficking U”
Sunday, Mar. 27, 2022 with Brad Carlson; Conti Ransomware Gang and Fake Kidnapping
Sunday, Feb. 27, 2022 with Brad Carlson; Politics, Religion, and Cybersecurity
Saturday, Oct. 23, 2021 with Brad Carlson; Targeted Iranian Cyberattacks
Sunday, July 11, 2021 with Brad Carlson; Kaseya Cyberattack and more
Sunday, May 16, 2021 with Brad Carlson; Colonial Pipeline
Sunday, Jan. 3, 2021 with Brad Carlson; Social Media Disinformation
Sunday, Dec. 27, 2020 with Brad Carlson; SolarWinds attack
Sunday, July 26, 2020; hijacked Twitter accounts
Sunday, May 31, 2020; COVID-19 Contact Tracing and More
AM1280 The Patriot, From Holes 4 Heroes 2020, Saturday, Feb.1, 2020
Over-eager prosecutor picking on an 11-year-old, Dec. 8, 2019 with Brad Carlson
AM1280 The Patriot, with Brad Carlson, Sunday, August 4, 2019
AM1280 The Patriot, with Brad Carlson, Sunday, June 23, 2019
AM1280, The Patriot, with Brad Carlson Feb. 10, 2019
AM1280, The Patriot with Mitch Berg and Brad Carlson. Holes 4 Heroes 2019
OPM Data Breach and More with Brad Carlson, July 22, 2018
Cyber-security and the 2016 Election, Brad Carlson, July 21, 2018
Holes 4 Heroes Medicine Lake, Jan. 27, 2018, AM1280, The Patriot
Northern Alliance Radio, Mitch Berg, Medicine Lake, Feb. 4, 2017
Northern Alliance Radio on AM1280, Feb. 6, 2016
AM 830 WCCO Radio
With Vineeta Sawkar, Tuesday, Aug. 20, 2024; 2.4 Billion Records Stolen From National Public Data (NPD)
With Vineeta Sawkar, Monday, June 24, 2024; United Health Group Data Breach
With Vineeta Sawkar, Thursday, March 23, 2023; TikTok
With Vineeta Sawkar, Thursday, Jan. 12, 2023; FAA NOTAM meltdown
With Cory Hepola, Tuesday, Feb. 8, 2022; Safer Internet Day
With Cory Hepola, Thursday, Jan. 27, 2022; Fake QR Codes
With Cory Hepola, Thursday, Jan. 13, 2022; Cory’s Phishing Text Message
With Cory Hepola, Thursday, Dec. 16, 2021; Online Scams, Log4j Vulnerability
With Cory Hepola, Tuesday, Dec. 7, 2021; Always-on cell phone camera
With Cory Hepola, Monday, Nov. 15, 2021; FBI email Hacked!
With Cory Hepola, Monday, Oct. 25, 2021; My Exchange Server Hacked!
With Cory Hepola, Thursday, Oct. 14, 2021; Killware
With Cory Hepola, Tuesday, Oct. 5, 2021; Facebook Outage
With Cory Hepola, Friday, Oct. 1, 2021; Cybersecurity Awareness Month
With Cory Hepola, Mon. Sept. 20, 2021; Microsoft passwordless authentication
With Cory Hepola, Friday, Aug. 27, 2021; Finally some Cybersecurity Leadership
With Cory Hepola, Tuesday, Aug. 17, 2021; Govt cyber-bounties, T-Mobile, cybersecurity at home
With Cory Hepola, Tuesday, July 20, 2021; Chinese cyberattacks, Israeli Spyware, COVID Antivax Lies
With Cory Hepola, Friday, July 9, 2021; PrintNightmare, Kaseya Cyberattack, and WWIII
With Cory Hepola, Wednesday, June 30, 2021; Should We Ban Ransomware Payments?
With Cory Hepola, Wednesday, June 2, 2021; JBS Ransomware Attack
With Cory Hepola, Wednesday, May 26, 2021; Arizona Election Audit
With Cory Hepola, Friday, May 14, 2021; Colonial Pipeline ransomware
With Cory Hepola, Wednesday, May 12, 2021; Colonial Pipeline Ransomware
With Cory Hepola, Tuesday, May 5, 2021; Attempted Poisoned Linux Kernel Updates
With Cory Hepola, Thursday, April 22, 2021; Pulse Secure VPN Attack
With Cory Hepola, Friday, April 9, 2021; Transparency, SolarWinds, and Oracle vs. Google
With Cory Hepola, Wed., March 3, 2021; Deepfake Viral Lies and Chinese Cyberattacks
With Cory Hepola, Friday, Feb. 19, 2021; Insurance Fraud, SolarWinds in the News, and More
With Cory Hepola, Thursday, Jan. 14, 2021; Scraping Parler Posts to Track Rioters and More
With Cory Hepola, Tuesday, Jan. 5, 2021; Online Safety, Social Media Disinformation, and More
With Cory Hepola, Friday, Dec. 18, 2020; SolarWinds Attack; the One We all Feared
With Cory Hepola, Monday, Nov. 30, 2020; Cheap Chinese WiFi Routers
With Cory Hepola, Friday, Nov. 20, 2020; COVID Holiday Online Safety
With Cory Hepola, Friday, Oct. 9, 2020; Ransomware, IOS Camera Protection
With Cory Hepola, Thursday, July 16, 2020; Twitter Attack
With Cory Hepola, Tuesday, July 7, 2020; Ransomware and Credit Card Fraud
With Cory Hepola, Thursday, June 4, 2020; COVID-19 Contact Tracing
With Cory Hepola, Tuesday, April 21, 2020; Build a VPN in 4 Easy Steps Without Spending 1 Penny
WCCO AM 830 with Cory Hepola, Thursday, April 9, 2020; the EARN-IT Act is a wolf in sheep’s clothing
WCCO AM 830 with Cory Hepola, Monday, March 9, 2020; Batman and Robin and Backdoor Malware
WCCO AM 830 with Cory Hepola, Tuesday, Feb. 18, 2020; CISO Stress and Burnout
WCCO AM 830 with Cory Hepola, Monday, Dec. 16, 2019; phones and security cameras spying on us
WCCO AM 830 with Cory Hepola, Monday, July 31, 2019; Capital One data breach
WCCO AM 830 with Cory Hepola, Monday, June 17 2019; the great 2019 Target outage
WCCO AM 830 with John Hines, Monday, April 9, 2018; Panera Bread and more
WCCO AM 830 with John Hines, Friday, Oct. 20, 2017, KRACK
WCCO AM 830 with John Hines, Thursday, Sept. 28, 2017, Equifax
WCCO radio, Roshini Rajkumar, Sunday, Sept. 17, 2017, Equifax
WCCO AM 830, Jordana Green and Paul Douglas, Sept. 8, 2017, 5:10 pm, Equifax
WCCO radio, AM 830, Esme Murphy, July 1, 2017, 8:05 pm
WCCO AM 830, Roshini Rajkumar, June 27, 2017, 9:35pm, Petya
WCCO AM 830, John Hines, May 15, 2017, WannaCry and Ransomware
Television
KARE-11 News Sunrise with Kim Insley, Sept. 20, 2017
May 26, 2015 Twin Cities KMSP TV interview. Fox 9, “The Buzz”
KARE-11 Bullseye Breach interview, May 30, 2015
Online
The best books featuring vulnerable people like me who stepped up as superheroes when pushed past their limits
Security vulnerability reporting: Who can you trust? July 2, 2024
A Literary Approach: The Novel Intersection of Fiction and Cybersecurity, Jan. 29, 2024
Best Tools for Online Privacy & Security, WebsiteRating.com, May 3, 2023
Nine gift ideas for open source enthusiasts in 2022, Opensource.com, Nov. 22, 2022
Balancing “If it ain’t broke, don’t fix it” vs. “Release early and often” Sept. 9, 2022
Interview with author & cybersecurity specialist Greg Scott, Eleanor Bennett, Logit.io, Sept. 15, 2022
Balancing “If it ain’t broke, don’t fix it” vs. “Release early and often,” Red Hat Blog, Sept. 9, 2022
Do your homework, Hollywood! Damien Black, Cybernews, June 10, 2022
Fake Kidnap Scams, Damien Black, Cybernews, April 4, 2022
(More Than) Five Tips to Repel Ransomware, Jan. 20, 2022
Why we should cringe at Hollywood hackers, Jurgita Lapienytė, Cybernews, August. 17, 2021
The 7 Best Mini-PCs of 2021, Adam S. Doud, Lifewire, June 3, 2021
How a university got itself banned from the Linux Kernel; Monica Chin, The Verge, April 20, 2021
Data Leaks: Is Your Company’s Data Already For Sale Online? Rob Baillieul, LifeRaft, March 2, 2021
Uniting Our Polarized Society, Feb. 24, 2021
What is Cybersecurity All About? Casey Crane, Infosec Insights, Jan. 15, 2021
Thinking like Cybercriminals, Vilius Petkauskas, Cybernews.com, Jan. 3, 2021
Access Control, Casey Crane, the SSL Store, Nov. 12, 2020
Beginner’s Guide to IoT Security, Patricia Staino, Motley Fool, Nov. 6, 2020
What is a Firewall? Casey Crane, The SSL Store, Oct. 13, 2020
What is Cybersecurity? FRSecure, Oct. 8, 2020
Can An Identity Thief Change Your Home Address? Oct. 3, 2020
Smishing – by Casey Crane with the SSL Store. Oct. 2, 2020
The Future of Smart Homes – Authority Magazine, Sep. 30, 2020
3 Ways to Protect Remote Workers From Cyberattacks, Aug. 20, 2020
How Do You Answer “Tell Me About a Time You Failed” Aug. 20, 2020
Test Guild, Joe Colantonio – Cyber Security Tips and Virus Bombs with Greg Scott, Aug. 13, 2020
Infosec Insights: SMBs: 10 Cyber Security Tips That Make You a Tougher Target, June 17, 2020
CreditDonkey – Are Online Banks Safe? june 10, 2020
Round Table with Sharifah Hardie, July 3, 2020
Face to Face with Sharifah Hardie, July 2, 2020
Roundtable with Sharifah Hardie, June 5, 2020
Publisher’s Weekly – How to Avoid Writing Tech Gibberish
Government Technology Magazine – Book Review: Virus Bomb
3 Cybercrime Cliches That Will Kill Your Writing DEAD
So, Ya Wanna Be A Pen Tester, Huh? (Page 81)
Morgan James Publishing Red Carpet Event, July 11, 2019
8 Tips to Spot an Online Imposter
MoneyTips Identity Protection Survey Findings
A bald guy’s credit card fraud story
Can an identity thief change your home address? July 14, 2018
“Bullseye Breach” excerpt – CSO Online Aug. 4, 2015
CES 2018; Governor Tim Pawlenty and Digital Privacy
Bullseye Breach was a 2015 Midwest Book Awards Finalist
Rod Rosenstein’s responsible encryption fantasy Oct. 21, 2017
Print
Mary Ann Grossman Reviewed Trafficking U, St. Paul Pioneer Press, Jan. 12, 2025
Minneapolis Star Tribune: Internet-Fueled Hysteria Turns a County Prosecutor Into a Witch Hunter
Long Distance but Face to Face, Minneapolis Star Tribune
Local Entrepreneur Makes Connections, Minneapolis/St. Paul Business Journal
Home Life in Real time, St. Paul Pioneer Press, Dec. 4, 2004
Waving Hello From a Distance, NY Times, Thanksgiving Day 2004
COVID-19
Oldies but Goodies
NT Heartland Archive – ENT Magazine
Converts Corner Archive – Enterprise Linux Magazine
DNS Attack columns
Digital Age, October, 1995
Giving Back
Fishing for Life
Holes 4 Heroes, Feb. 8, 2025
Holes 4 Heroes, Feb. 10, 2024 (canceled for lack of ice)
Holes 4 Heroes, Feb. 11, 2023
Holes 4 Heroes, Feb. 12, 2022
Holes 4 Heroes, Feb. 20, 2021
Holes 4 Heroes, Feb. 1, 2020
Holes 4 Heroes, Feb. 2, 2019
Holes 4 Heroes White Bear Lake, Feb. 3, 2018
Holes 4 Heroes on Medicine Lake, Jan. 27, 2018
Holes 4 Heroes, Feb. 4, 2017
Holes 4 Heroes, Feb. 6, 2016
Holes 4 Heroes, Jan. 31, 2015
Holes 4 Heroes Feb. 1, 2014
Holes 4 Heroes, Feb. 2, 2013
Holes 4 Heroes 2012
Tee it up for the Troops
Tee it up for the Troops 2015
Tee it up for the Troops 2014 Flagship event
Tee it up for the Troops 2013 Flagship Event
Resources
How to Build a VPN in Four Easy Steps Without Spending One Penny
Overview
Step 1: Build an OpenVPN Base Server
Step 2: Install OpenVPN and configure Authentication
Step 3: Set up the Server Configuration and Start OpenVPN
Step 4: Set up OpenVPN Clients
Troubleshooting, Possible Next Steps, and a Favor
Social Media, Working from Home, Mental Health, Substance Abuse
Social Media Online Abuse Resources
Working from Home
Mental Health
Substance Abuse
Mini-seminars and Presentations
Edina, MN. Rotary Club – Online Predators
Red Hat Insights Demo
NEXT Crown College 2024 – Online Threats
If I were an online predator, how would I find victims?
Microsoft Word Manuscript Tips
Cybersecurity 2022-0616: What We’re Up Against and How to Kick Attackers’ Butts
Long Island, NY ISC2: A Radical (Not-So) New Proposal – Embracing Open
Cybersecurity 2020-1230: What We’re Up Against and How To Kick Attackers’ Butts
Facebook Live – How to Set Up Your Internet Identity
How to log a great support case
Demo – Log a support case
A radical not-so-new idea
Cybersecurity – What We’re Up Against, Why We Must Care, and What to Do About It
A dozen or so of Greg’s Cybersafety Tips
Build a sales funnel
EC-Council University Webinar: Major Threats In Network Security
Spectre and Meltdown mini-seminar, or the end of modern civilization
Passwords Must Die. Long Live Passphrases.
143 Million Reasons to Reform the US Credit Reporting Industry – Part 1; Why
Credit Reporting Industry Reform Part 2 – Fixing the System
Cyberattack power half-hour
Ransomware mini-seminar
Spam and phishing mini-seminar
Internet Trust Mini-seminar
DNS poisoning mini-seminar
IoT and DDoS mini-seminar – don’t let anyone turn your devices into mindless drones!
30-Day Challenge
Week 1 – Why care about cybersecurity?
Week 1 Day 1: You don’t have to be a cybervictim.
Week 1 Day 2: John Podesta and other mess ups
Week 1, day 3: Government isn’t the answer
Week 1 Day 4: Identity theft and credit reporting
Week 1 Day 5: Why is sharing important?
Week 2 – cybersecurity howto
Week 2, Day 1: Fixing our credit reporting system
Week 2 day 2: Spot a phishy email a mile away.
Week 2 Day 4 Smart home appliance deployment
Week 2 Day 3 Smart-home appliance shopping
Week 2 Day 5 Troubleshooting internet trouble
Week 3 – Cybersecurity Policy
Week 3 Day 1: Should government regulate encryption?
Week 3 Day 2: Why social media is bad
Week 3 Day 3: Why social media is good
Week 3 Day 5: Should government regulate social media?
Week 3 Day 4: net neutrality
Week 4 Day 1: Hollywood Hackers
Week 4 – Stuff that didn’t fit earlier weeks
Week 4 Day 2: retro identity theft
Week 4, bonus day: Communicating with tech people
Week 4 Day 3: Man up and swallow my pride
Week 4 Day 4: Sometimes it’s not a cyberattack
Week 4 Day 5: Cybersecurity arms race
Bonus: How to repurpose your video
Bonus: How to repurpose your video
Blog
Politics and Religion
Slice of Life
Cybersecurity
Who Says IT is Boring?
Technology
Memoir
Phish collection
All Blog posts
Select Page
Let’s stay in touch
Search for:
Want a free story?
Follow Us
LinkedIn
X
YouTube
Facebook
Recent Posts
No Kings and Online Abuse
Social Security Statement Phishing
CISA: So much for a public/private partnership
How the Hands Off movement can win me over
Impressions from my first protest rally
Recent Comments
Greg Scott
on
Why I Plan to Attend a Hands Off Protest Rally
Toni
on
Why I Plan to Attend a Hands Off Protest Rally
Kathy Kensmoe
on
Overturning the US Constitution with an executive order
Greg Scott
on
Overturning the US Constitution with an executive order
Toni
on
Overturning the US Constitution with an executive order
Archives
June 2025
May 2025
April 2025
March 2025
January 2025
December 2024
November 2024
October 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
September 2023
August 2023
July 2023
May 2023
April 2023
March 2023
September 2022
July 2022
June 2022
May 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
February 2021
January 2021
December 2020
November 2020
October 2020
August 2020
July 2020
May 2020
April 2020
March 2020
February 2020
December 2019
November 2019
September 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
June 2018
May 2018
April 2018
February 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
March 2017
February 2017
November 2016
October 2016
July 2016
March 2016
February 2016
October 2015
July 2015
June 2015
May 2015
April 2015
December 2014
June 2014
May 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
July 2013
May 2013
April 2013
March 2013
Categories
Cybersecurity
Memoir
Phish collection
Politics and Religion
Slice of Life
Technology
Who Says IT is Boring?
More links
Resources
Books, Available everywhere books are sold
Landing pages
Fool for God download page
Opt-in page
Thank you ebook download page
Loading Comments...
Write a Comment...
Email (Required)
Name (Required)
Website
Recent Comments