Safe Computing is like Safe Sex

Safe Computing is like Safe Sex

You Have to Practice it to Avoid Infection Keeping the Bad Guys out and your Information Safe

Safe Computing is Like Safe Sex
Part of the Home Computer Security series:
  • Safe Computing is like Safe Sex
Editions:Kindle: $ 6.99
Pages: 220
Paperback: $ 12.99
ISBN: 978-1943517008
Size: 8.50 x 11.00 in
Pages: 232
Audiobook: $ 13.08
Hardcover: $ 34.95
ISBN: 1943517290
Pages: 238

Computer Security Can be Achieved Even in a World full of Hackers, Viruses and Spam

You can Protect your Computer and your Valuable Information, Bank Accounts and Photos Without Breaking the Budget or Hiring an Expert.

What if practising a few new habits could dramatically reduce the chances of your system being infected with a virus or attacked by a hacker? Imagine surfing the web without worrying about the terrors of credit card fraud or identity theft? What if you could keep the bad guys away with a few simple applications?

Security expert and Computer Executive, Richard Lowe Jr, presents the simple steps you can take to protect your computer, photos and information from malicious hackers, malware, ransomware and viruses. Using easy-to-understand examples and simple explanations, Lowe explains why hackers want to break into your system, what they do with your information, and what you can do to keep them at bay. Lowe answers the question: how do you keep yourself safe in the wild wild west of the internet?

What will you learn by reading this book?

  • What the heck are the hackers trying to do with your computer and your data.
  • How to protect your computer from viruses.
  • The best way to keep your online accounts, including your bank information, safe from hackers.
  • How to keep your data and photos safe from computer crashes and disasters.
  • How to prevent intruders from using your wireless to break into your computer.
  • How to protect yourself on while surfing the web using your local coffee shop Wi-Fi.
  • How to safely use a hotel or public computer.
  • How to build a firewall around your computer to keep evildoers out.
  • How to protect your computer from viruses using antivirus.
  • How to secure your home network.

And many, many other tips and techniques to keep your data, your credit, and your life safe.

Did you know?

If your computer is not properly protected, even just opening a web page can infect your system? "The link promised pictures of cute cats, so Shelby clicked on it right away. She loved animals, especially cats, and spent a bit of each day laughing at funny pictures about them. Shelby had not patched her system in years which made her vulnerable to drive-by attacks. As soon as the web page opened, Shelby’s system was infected with a particularly nasty virus."

That malicious hackers try to fool you into entering your account and passwords so they can steal your money and your identify? "Bill, a friend of mine, woke up late one night anddecided to check his inbox. He saw an email that appeared to be from PayPal stating there was unusual activity on his account and he needed to login to recover. He clicked the link, entered his username and his password. Afterwards he went back to sleep, happy that his PayPal was protected from fraud. Unfortunately, he fell for a phishing scheme and actually give hackers his username and password. Within a short time all of the money in his PayPal account was gone."

That those Wifi hotspots in coffee shops and elsewhere can steal your information unless you take precautions? "Nathan was in a hurry. Today he was happy to find a new hotspot, called “fast coffee shop” has shown up on the list of wireless networks available. He connected to it without much thought and did quite a bit of work. Unfortunately, Nathan connected a few personal sites without using https, and the hacker who had provided the hotspot stole some of Nathan’s passwords."

Buy this book NOW before it’s too late! Protect your computer, photos, information and identity.

Get Your Copy Today and Ensure your Computer is Safe

Pick up your copy today by clicking the BUY NOW button at the top of this page.

Publisher: The Writing King
Cover Artists:
Reviews:Robert W. Locke Jr. on Amazon wrote:

I finished reading the book this morning. There was a ton of stuff I did not know about internet security. I use Google Chrome, CCleaner, McAffee LiveSafe, and Anti-Malware. I just started to use HTTPS after reading that page. I really like your BEST PRACTICES. Your examples are easy to read and informative.


Has your computer ever been infected by a virus? Have you ever felt that sinking feeling when your system wouldn’t boot up and you wondered if you just lost all your files? Did you ever find yourself locked out of your computer with a demand for payment or else you’d never see your files again? Even if this hasn’t happened to you, I’ll bet you know someone who has had these kinds of experiences.

I’ve helped countless friends and acquaintances throughout my career recover their computer systems from all types of disasters, including everything from a simple virus to attempts to extort ransom. The worst damage I encountered, back in the days of Windows 7, was a computer that had 496 virus infections at the same time. The owner didn’t even know his computer was infected! He bought it to me because it was “running a little bit slow.”

Computer security has been an interest of mine since my college days in 1981. I fell into the subject by accident. I was attending junior college and I had a hole to fill in my schedule. The only class available was this weird sounding course that involved computers. It looked boring and had nothing to do with my major, but there was no choice. I had to take a computer class and I wasn’t thrilled about it at all.

It surprised me to no end when, after just a few days, I discovered that I had found my calling. I loved writing applications (we called them programs back then) to do math problems, play games, display graphics, and keep track of things. I soon realized that I had a certain knack for looking at a problem and figuring out how to get the computer to solve it for me.

The computers we used back then bore no resemblance to the systems of today. The one I used in college was the size of four refrigerator boxes and required heavy-duty air conditioning and power, as well as constant care and feeding from technicians. I was fascinated watching them go about their tasks and talking about this mysterious thing called an operating system.

I decided I had to get a look at this operating system, whatever it was, because it sounded so interesting. One day I sat down at a computer terminal and started trying different password combinations for the administrator account, just for kicks. I had this idea that if I could get into the computer as an administrator I could learn more about how it works. In other words, I was curious.

That was my first and only attempt to hack into a system. It didn’t go well because my teacher discovered within minutes what I had done. I thought I was going to get suspended or something worse, but he had a far more devious plan in mind for me.

“Since you hacked our computer you are now in charge of system security,” Mr. James, the man in charge of the computer department, told me. “It is your job to keep people out.”

Ironically, that’s how I got my start in computer security.

As time went by I was hired by a startup company called Software Techniques, and before long I was promoted to the Vice President of Consulting. I worked at that company for six years, then was hired by Beck Computer Systems again as the Vice President of Consulting. In 1994 I moved to Trader Joe’s, a nationwide chain of grocery stores, with the title of Director of Technical Services and Computer Operations.

At all of those companies I was the person in charge of the computer security for the company business. That works out to a total of almost 35 years working to keep computers safe from evildoers. At Trader Joe’s the responsibility was so large that the job was split between me and the Director of Networking, Jimmy James. I was responsible for the security of the corporate computer systems while he was responsible for all network security.

During my 20 years at Trader Joe’s, I worked on hundreds of laptops, desktops and workstations, plus tablets and smart phones. Security was a huge concern as we handled millions of credit card transactions on a regular basis. It was vital to keep those transactions and card numbers from falling into the wrong hands.

I’ve seen everything that can happen to a computer, from massive virus attacks to worms to physical destruction from fire or water. I’ve cried along with my friends as they lost thousands of photos forever after being infected by a particularly nasty virus, and helped another friend recover their hard drive after they dropped it out of a second story window.

During those years I helped many people with security problems on their home computer systems. One fact has become clear during all this time. Most individuals believe their computer is safe and secure straight out-of-the-box and are often surprised to learn that, regardless of the operating system or manufacturer, the truth of the matter is quite the opposite.

My goal with this book is to help you fill in those gaps in your Windows® computer security. This will let you focus on using your computer instead of worrying and, worse yet, recovering or rebuilding from disaster.

I hope by passing along my security knowledge you can avoid the types of disasters I’ve seen throughout my career.

Notify of
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x