Protect Yourself in a Digital World

2 views

Rapp Report episode 166 The Internet is a wonderful place to connect with friends and family, but it's also an easy place for criminals to steal your identity. We live in a digital world and so many people are not aware of the dangers lurking around. There are so many things that can harm you in the digital world, such as computer viruses, email scams, and phishing scams. These things can be harmful to your system or even steal your identity. Cybercriminals do not care who they hurt or what they destroy as long as it is profitable for them! They target everyone from individuals to businesses to government agencies - anyone with valuable information on their computers. This could be anything from credit card numbers and passwords to corporate secrets and classified data. If the cybercriminal gets this information, he might be able to sell it on the black market where others can use these stolen items against you or worse yet - steal money directly from you by using your identity! It does not matter if you are a big corporation or just an individual at home trying to make ends meet; hackers will go after anyone with something of value on their computers! It only takes one computer virus or email scam to ruin your life. Protect yourself in a digital world. The best way to protect yourself is to be aware of the different types of dangers and how they work. Andrew and Bud will discuss computer viruses, email scams, phishing scams, and ransomware on this show today! They will also give you tips on how you can better protect yourself from these threats!

0 comments

00:08
Today, we're going to talk about how to protect yourself in the dangers of the digital world.
00:16
Welcome to The Wrap Report with your host, Andrew Rapoport, where we provide biblical interpretation and application.
00:23
This is a ministry of striving for eternity in the Christian podcast community. For more content or to request a speaker for your church, go to strivingforeternity .org.
00:32
Welcome to another edition of The Wrap Report. I am joined by my host, Bud.
00:40
Greetings for this unusual podcast. Topically.
00:46
That's right, because typically we deal with Christian topics, and this one is a little bit different for folks who don't know, but because I think a lot of people probably don't know my background so much, but I have a background in IT, and I've had many years in cybersecurity using, basically learning about how bad guys use the computer to do bad things.
01:08
And IT is insensitivity training? Is that? Right. Yes. Exactly. Okay, good. All right. You know, information technology or whatever else you want.
01:18
That one. Okay. IT is, isn't that, wasn't that some movie about a clown? I don't know. I never saw it.
01:23
I just remember seeing commercials. Oh, I don't, I don't know about that. Some scary movie.
01:29
I don't know. But, you know, there are dangers, but with that, people don't even think about it.
01:35
Most people know some of the dangers with computers and the internet and having everything up in the cloud and having a digital world.
01:43
We're seeing some of that now, the effects and dangers, even with big tech, seeing how they could just say, oh, we don't like certain books.
01:52
We're just going to erase, gone. You know, votes for elections, gone.
01:59
We don't like the outcome, you know, and we're seeing how the technology can affect so much.
02:08
People are starting to realize the danger of this. When we talk about big tech, we talk about how they have their algorithms that are able to change people the way people think.
02:17
They're able to keep certain things out of the news. So people think, oh, there's nothing wrong with Biden's son.
02:23
He didn't do anything wrong. Just keep that out of the news. You know, everything bad, just keep it out of the news.
02:31
Everything they want to have in the news, they keep in the news. You know, it's kind of like, you know, five minutes before that Georgia shooting,
02:40
Asians suffered from white privilege and they had whiteness. And then once the media and the liberals could use the
02:47
Georgia shooting because they didn't want to address the issue of pornography because that would be damaging to their business or what they with their pleasure.
02:57
So what do they focus on? They say, oh, it was about Asians and Asian hate. Suddenly, Asians were no longer whiteness.
03:03
They no longer had white privilege. Just five minutes difference. Amazing. You know, we saw this and you sent me a thing with the the guy who who did the shooting who, you know, the focus that they had in the article when they wrote it was that he was a
03:21
Christian evangelical and went to the, you know, after the Southern Baptist Church, he went to.
03:27
Oh, yeah. Yeah. You know, not addressing why he did the shooting. The big thing was he was a
03:33
Christian. That's what they could use. So we understand that aspect. But there's other things
03:38
I think, Bud, that I've done in my past is in a professional sense in helping to identify how people use the
03:47
Internet to do things that shouldn't be done. And there's easy ways to protect ourselves.
03:55
And so what I wanted to do is talk about some of the dangers, some of the things that are ways of protection.
04:00
So this is going to be less of a theological podcast that we've done. Really the reason is, is, folks,
04:06
I wanted something. I just I hate that every week. Bud always sounds smarter than me. So I figured, let me think of a topic.
04:12
Oh, brother. Bud has nothing to offer. Because he's computer illiterate, pretty much.
04:19
Oh, thank you. Thank you. So we're going to the doctrine of digital perseverance or something.
04:25
This is OK. I'll work with this. I've been I've been searching the scriptures all day.
04:31
I couldn't find anything. But that's fine. I'm sure I'm sure you can find something, but there are you know, there's some things that are basic things that people are are unaware of.
04:45
For example, passwords. It seems simple because most people think, well, they're just they're just going to Amazon or they're just going to wherever some website and it wants them to log in.
05:00
And what a lot of people do is use the same login, because how do we remember so many passwords?
05:06
Think about how many. And in fact, I actually when I went to move from New Jersey, I had to go into every website to update the address.
05:18
And I realized I have hundreds of passwords on hundreds of websites. Oh, yeah.
05:24
And you think about how many websites you have logins to that you'll hear in the news where some website
05:31
Best Buy gets hacked and now they have your email address and your password.
05:37
Well, they break those passwords down and basically they're going to look for passwords that are simple.
05:43
Why? Well, a simple password is the easiest to crack. But the other reason is people who use simple passwords.
05:52
Usually use the same password over and over and over. And so what they'll start to do is go to the major sites like Amazon or eBay or things like that and try it out.
06:05
And now they start purchasing things on your account using your credit card. They ship to some other location.
06:13
Now, they're usually going to be skilled enough when they do that to know not to ship it to their own address.
06:18
Some people are idiots and don't do that. I had I had a password of mine that got cracked for egghead .com,
06:28
which is where you get computer software and their computer parts and stuff. And the guy went and bought something.
06:35
I forget what he bought, but he made the mistake of like shipping it, I think, to his real address. And, you know, it sent me an email saying
06:43
I purchased on. He then tried to cover it up by creating like a bunch of spam looking emails from egghead .com
06:49
so that it looked like, you know, so it would be buried in there. But unfortunately, I was sitting at the computer when the email came up and quickly changed my password.
06:58
First thing went into the went in and removed the order. Second thing, and then the 50 emails he had sent me.
07:06
Oh, my goodness. But passwords are a thing that a lot of people don't they don't have a good memory to remember every password if you're going to change them all.
07:17
So most people do one of two things. They write it down. That's bad as well, because if anyone finds that they have your passwords, which was always in high school, you know, it was always interesting because the secretary kept the passwords for the school computers literally in her desk, like written on paper.
07:40
Yeah. Yeah. It would be taped. It would be taped to the writing section that you'd pull out from the side of the desk.
07:46
Everybody could find it for the week. You know, this week's bad word is pencil. It was always there were so many people that hacked into the school computers.
07:54
And it's like you never figure out where the problem is. But, you know, there's a simple solutions to passwords and there are tools you can get.
08:04
Now, there's a couple of tools that you can get, like a one password or a last pass.
08:10
Those are both in the cloud. In other words, you have a password stored at their location and you can use it on all of your other devices.
08:19
That's convenient. However, what would be the best place to go if you want to get a whole treasure trove of passwords?
08:27
Yeah. What if that gets hacked? Yeah. What if that gets hacked? Right. That becomes a dilemma. So one thing you could get is a thing.
08:34
There's a tool called Password Safe. It's free and Password Safe is not in the cloud.
08:41
So you can get something like that, although then you have to go have whichever computer you're running on to make sure that that's the one that you have your your password.
08:52
So there are different things to do, but I would recommend people get some sort of tool to track all their passwords, something that now most of the bigger companies like one password or last pass, they're going to have good security because they know that there's plenty of people who are looking to to hack them.
09:12
But, you know, don't believe that. Anyone is safe from being hacked, even the federal government, where the federal government had all of the information from people who are have top secret clearances.
09:29
Well, the Chinese government had hacked that and got the names of all the people that have classified or classifications with their home addresses, their bank accounts, all kinds of stuff.
09:42
And so it would be wise to to to realize that you are always susceptible to being hacked.
09:49
Everybody is. But one thing to do is to have is just have passwords, a password tool to track them.
09:58
Another thing to do is backups, always keep backups. Now, but do you do you back up your computer at all?
10:06
Yes, absolutely. I maintain our network at work and I also do it at the house.
10:12
So I mean, I don't know how many times people have lost things because they didn't keep a backup of it, lost plenty of data.
10:22
But there's a different reason why backups become essential. Now, this probably doesn't happen, but at your house, but it could happen at your work.
10:30
A lot of companies deal with this. A lot of school systems actually deal with this schools and medical places, a thing called ransomware.
10:38
And so what ransomware is someone hacks into your computer and then they encrypt your entire hard drive and tell you that you have to pay them to get it back.
10:48
Yeah. You know, it's always amazing to me, bud, is the people that pay these people using a thing called
10:54
Bitcoin, which is not traceable and they pay the person and the person never gives them the key to unlock.
11:04
Well, let me think about this. You're trusting a criminal to do, to be honest. So, you know, an easy solution to that is just having a backup.
11:16
You know, there was there was one company that basically they had ransomware. What ended up happening was all their systems had come in.
11:25
They came in and found out that the computers that were left on were all hacked and encrypted.
11:31
So what they quickly did was take all the other computers off the Internet, turn those on so that they had the information on those, but then basically just said,
11:42
OK, we're restoring from backup and ignored the ransomware. So that's something that's less likely to happen to people, though.
11:51
More likely to happen to people is people don't have virus protection on their. Now, most
11:56
Windows users have virus protection because, well, that's where you get most viruses.
12:02
And there's actually a reason for that, because it's an open system. It's more open than, say,
12:08
Mac OS. And because more people use it, they get they have more people to send a virus to.
12:18
And so there's a lot of different types of viruses out there. But you want to be running some kind of protection against viruses and what's called malware.
12:28
These are things where people are going to be putting something in to infect your computer, but some of them could be very malicious.
12:35
You know, I know that my sister used to think that it wasn't a big deal. She had a router that didn't have a password on it, but it only went to her son's gaming computer.
12:47
But her son's gaming computer was also connected to their house router. And so, you know where she runs her business.
12:56
And so what ended up happening was someone parked outside the house, noticed an open router, no protection, went in there from there, started to scroll their way around, look at what else they could find and found some other other systems, the other router and started to be able to pull off information.
13:17
So you could have people that do that. You have people who might make your computer into a bot to act in a to attack other people.
13:27
But one of the things that you end up seeing with viruses is the majority of them would be caught by virus protection.
13:35
Simple thing people don't realize. But I want to get into some things that are more insidious that most people fall for.
13:45
And one of the things I forgot to say also, but when I talk about passwords is anyone that is using passwords, they should, should, if there's an option for it, use at least two factor identification.
14:01
Some some websites will say that they have that if they have it, they typically what they'll do is you put in your password.
14:07
It pops up and says, hey, I just sent to your cell phone a text message, put in the code that you just had or to your email.
14:14
Why is that good to do? Because, well, like in my case, when my kids decide they want to try to use my
14:22
Netflix or something like that, I get a notification.
14:27
And but if anyone else was to try to get in, you get you get notification on that.
14:33
So that's a wise thing to do. But what a lot of people were going to say, but no,
14:39
I was just going to say a couple of the banking financial sites that I use, they actually do that.
14:47
That's part of the routine. So you've got a password to get into it, but then they're going to send you a text message or they can call you with it.
14:57
I mean, it's automated, but so it's got that two level kind of thing on a couple of the financial sites that I use.
15:05
And and I like that. I mean, it's a little bit of an extra step, but that's
15:10
OK. It's it may be a little bit of an extra step, but you at least then know if someone's got your password.
15:20
Yeah, yeah. And then having multiple having different passwords for every site prevents someone if they get your password to one, they it protects against another.
15:30
So if they get your eBay password, they're not going to be able to log into your Amazon account. But there are sometimes
15:36
I got I got an email, oh, I forget how long ago, a couple of months ago, maybe like six months ago, actually even longer.
15:45
And it was interesting because what happens when these places get hacked? They find your your password.
15:52
And so back when I first had, you know, when the Internet was first starting, I didn't have a very secure password, very simple thing.
16:00
And I got an email that said, you know, I've been I've logged on to your system and I know that this is your password.
16:08
Now, when they do that, it looks legit, right, because you recognize that as your password. And what they're doing is they want to get credibility, like saying, like, look,
16:16
I can really access your entire computer. I have I have control. That's that's their goal of sending these emails.
16:22
And then what they do is say, hey, I've been on your computer for six months and I've been checking.
16:29
I have all your passwords and your banking information. If you don't send me five thousand dollars in Bitcoin, you know.
16:37
I'm going to share this with all your friends. And typically, here's the thing. Typically, the emails I just got one, I told you about this week where it is funny because English clearly wasn't the guy's first language.
16:47
Not that I'm much better in my English, but but, you know, the thing was he asked for one hundred dollars in Bitcoin or he was going to release all the videos he took because he accessed the camera and he was able to watch everything that I did and all the sites that I went to.
17:04
And because he's going to release that to all my friends because he has all their email addresses. Well, there's a couple of things there.
17:10
If you're not going to sites that you don't that aren't going to be the sites that because the reason they always put that in is because unfortunately, a majority of people do go to pornography sites.
17:22
And therefore, that's probably true for most people. If you don't go to those sites, you know what you realize? There's nothing for you to show.
17:29
I got nothing. I got nothing. Yeah. And see, that's the whole thing is that they're they're banking on the fear.
17:38
A lot of the reasons this works for people is because there's a lot of people that do go to those sites and they wouldn't want all their friends to know.
17:44
And so their belief in the trust is the fact that they knew the password. Because they got that password right, people actually believe them and try to figure out how to send them the money,
17:57
OK, when they probably have nothing but the password. And so there's a lot of things that I end up seeing with that where I have seen people fall prey to that and send money.
18:11
And the majority of it, what it is, is you have your basically you're going to have your email address and password with a number of sites that have been hacked.
18:24
You're going to be out there. You know, you're there. They're going to have. It's somewhere on the on the
18:33
Web. Your email on the dark Web, at least your email address has been out there.
18:39
Now, let me give you a website to go to to find out if you're if you've ever been hacked. There is a site called
18:46
Have I Been Pwned. Now, let me spell the word pwned because it's not it is missing some values.
18:55
So it's have I been pwned .com.
19:01
And what you do is you go in, you stick your email address in and it'll tell you all the places that you've been pwned, where someone has your information and set up to be notified.
19:16
Yeah, so if your if your information comes up, actually, one of the credit bureaus that I look at it, it tracks that.
19:25
And so I noticed several months ago that my email address was on the dark
19:32
Web. I don't even know what the dark Web is and not that savvy. But, you know,
19:39
I did a little bit of looking and and what do I need to do? Well, instantly I change all the passwords.
19:44
I don't know how that happens. But the fact is, everybody, just like you have a carbon footprint, allegedly, you got a you've got a digital footprint.
19:52
You're out there. You've ever been online. There's information out there. Oh, yeah.
19:58
You know, I had I had one person who I know that this person was like convinced that they had an email address that wouldn't be traced back to them.
20:06
They don't really use it much. And it's just something that they had. And I said, well, give me the address.
20:12
They gave me the address. And I went to a couple of sites that I know. And within about 30 seconds,
20:18
I gave this person their name, their birth date, their age, where they live, their
20:24
Facebook, their children's Facebook. And this person was so freaked out because like, but I don't use that for anything.
20:31
But see, the thing is, that email that may not be used for anything is also tied to the same computer that's used for others.
20:39
So sometimes that stuff can get linked. Sometimes you use it for something and there's enough correlation to be able to link those things together.
20:48
And so that ends up happening a bunch of times. And so this, again, is a thing where you want to be careful when you're clicking on emails.
21:00
Email scams are probably the biggest issue that people deal with and the biggest way that they fall prey to scams.
21:09
Like I said, because of the fact that people, unfortunately, a lot of people do watch pornography, they fall prey to not wanting anyone to know that.
21:20
And so they give the money. I think as we were saying before we started recording, it might be that the guy that only wanted $100 of Bitcoin versus $5 ,000, the $100 probably gets paid more because people can.
21:32
Yeah, probably so. Yeah. But wait, I mean, so the $14 million that was not like malware, but it was an email, the $14 million that I won a couple of weeks ago in the
21:44
Nigerian lottery, I mean, that's legit, right? Of course. Because I got plans for us.
21:51
I mean, we can do a lot with that. You hold on to those plans. Don't go spend that money yet.
21:57
But like you were talking about, it's, you know, just pay attention to some basic grammar. And I always look at the return email address because that never seems to match when it's bogus.
22:11
It's always some obscure return address or sender address.
22:16
Whenever you get an email, what you want to do is look at... So if you get an email and it says they're from Apple and they'll have the
22:24
Apple logo it might look like an official looking email. And it says, you know, your account's been locked.
22:32
You need to click this link and log in. Okay. First thing to do is look at who it's from.
22:38
Because if it's not from, you know, apple .com, now that doesn't mean that they might have,
22:45
I've seen where it'll be apple .com dot something else. Plus some other little nuanced extension added to it.
22:54
What we call a domain name is that last bit where it would be the apple .com, that last part of it.
23:02
That you want to make sure is Apple, Amazon, wherever. The other thing is just hover over the link.
23:09
You can even do this. And I've done this at times where something looks like it could be legit. What you do, because there are ways to send an email and mask what's called the header.
23:21
So it looks like it's sent from someone else. So one of the things I always do before clicking on anything is
23:28
I usually right click either the button or the link, and I can copy the link location.
23:36
And then I paste it somewhere else, not in a browser, because I don't want to go there, but I'll paste it into a
23:42
Word document and examine where it was sending me. And if they're saying they're from apple .com,
23:47
but the link is taking me to Nigeria, maybe it's not really from Apple.
23:53
Yeah, I get those frequently. I mean, frequently, two, three times a week from PayPal.
23:59
Your PayPal account has been compromised. You need to click here and correct your banking information and verify your data.
24:09
But it comes from like some guy named Bob, you know, I'm like, okay, no. No, we had one at church that was interesting.
24:18
We had someone that sent an email to the church. And the email address,
24:24
I forget the name of it, but we'll just say Bob Curtis. That wasn't it. But let's say it was
24:29
Bob Curtis. And the return address was like BobCurtis833 at Gmail.
24:36
But in the email, he's explaining and says Bob Curtis, and then puts an email address for Bob Curtis at Gmail.
24:44
Well, the email came from a Black Lives Matter activist that I was able to figure out, where the other
24:53
Bob Curtis that's in the signature line was some older gentleman. Neither one of them are anywhere near our church.
25:00
So I don't know what they were trying to get from the church. I just decided we won't respond to that email.
25:08
Probably smart, yeah. But the thing is that sometimes people will do that. They will put an email address even in the bottom.
25:16
So with the same name, and it's to deceive someone. But a lot of the times what this email scams, the way to identify a scam is generally this.
25:28
One of the things they're going to do is they got to get you to panic. There's something in it to cause panic.
25:35
Your account is locked. Someone hacked your account. We need you to change your password.
25:41
Something, or like that email I was saying, where they've been in your system for six months, they're going to share all your dirty secrets.
25:50
That's the advantage of not having dirty secrets. But the thing is they have to, it's a panic moment.
25:59
The email will try to convince you that they have more information than they have to get you to be concerned enough to follow through with whatever they do.
26:11
One of the things that you end up seeing with that is recognize when they're trying to enforce that panic, and then take a step back and examine whether is this really an issue?
26:25
Your computer has a virus. It's going to shut down the internet, which is actually what
26:31
I had a phone call. We don't do it anymore. I used to get phone calls. And I remember the guy calling saying, your computer is, we've detected activity from your computer.
26:42
And it has a virus on it. And I'm like, really? Yes, it's putting out a lot of traffic.
26:47
And it could shut down the internet. Really? Shut down the internet? Wow. I said, and you're with who?
26:53
He's like, Windows Company. I'm like, Windows Company, huh? So not Microsoft, Windows Company.
26:59
I'm like, so me being me, I'm playing along with it. I should have recorded this because it would have been fun.
27:04
My wife was like, will you stop messing with these people? But I'm either going to share the gospel with them, or I'm going to have some laughs.
27:12
At least I'm keeping them from another call. So I said, oh, wow, I'm concerned. What should I do? He goes, well, turn on your computer.
27:19
I said, okay, it's on. He's like, all right, what I need you to do is I need you to go to the little
27:25
Windows logo at the bottom. I said, I don't have one of those. He's like, you don't have one of those.
27:30
I said, no. He's like, oh, okay, you have a Macintosh. You'd click the little
27:36
Apple icon at the top of your screen. I said, but I don't have one of those. He's like, what do you mean?
27:41
I said, I have Linux. But if you could read my computer to know that I'm sending out this much traffic, you would have known that already.
27:50
And so he ended up putting me on with his supervisor. And at this point, I'm laughing with my wife.
27:56
And the supervisor hears me laughing and goes, okay, I'm just going to hang up. Did either one of them repent?
28:02
I mean, did you get to that point? Oh, man. Usually by the time I say, do you consider yourself to be a good person, they hang up.
28:08
I don't know why. Again, I did some that actually, I have had some people that call that, you know, because I like to use those opportunities to share the gospel.
28:17
And there are times when we've had where some people will dialogue. I've had some people that, now this is the problem.
28:23
If they, I had a window treatment company that a guy calls up and he let me share the entire gospel.
28:29
I mean, I spent about 15 minutes sharing the gospel with him. And so now
28:34
I had to listen to his 15 minute talk on the window treatments. I told him,
28:40
I said to him first, hey, first, before you get to what you want to talk about, you called me. So since it's my time,
28:45
I want to spend it on something I want to talk to you about. And so he let me. Hey, your drapes look good behind you too.
28:53
They're very nice. But when email scams come, people make a mistake of thinking that what they see is accurate.
29:05
Yeah. And you can spoof emails. Another thing that people make a mistake of, and I'm going to get into some ways of protecting your children as well, because a lot of parents don't think about their children online.
29:18
Their children are not going to have good secure passwords. What most hackers look for is the children accounts on computers.
29:27
Because from the children's account, they can get to your account because you're on the same network.
29:32
Unless, of course, you're like me, that you'd segment your network so the kids would on their own.
29:42
In my case, you think about all the IoT devices that you have, the internet of things devices, your smart
29:50
TV, your smart refrigerator now, even. I'm waiting for the smart toaster.
29:55
You know, you said it so when you come home, they're toasters, right? I don't know. But, you know, they have this where everything is connected to the internet.
30:07
And with that, those things are not that secure. People were able to hack into people's nest.
30:15
They had a nest thermometer. And you go, well, what's the big deal? You know, they have a nest thermometer.
30:22
What, like, so what? So you know the temperature in my house? Yes, but from the temperature in your house, someone can get to the rest of your network.
30:29
In fact, there was a company that ended up having an issue.
30:35
They were, their company was hacked. And they couldn't figure out with all the security they had, how the hackers got in.
30:43
Well, this company was, they had a farm. And all of the cows had collars that were connected with cellular to get to the
30:56
Wi -Fi on the farm. So if the cows were to get lost, they could find the cow.
31:04
Digital bovine hacking, really? And these, because people thought the collars, who cares where the cow is?
31:13
There was no security on that. But from that, they were able to get in. There was a, there was a restaurant that had a big fish tank.
31:21
They had a fish tank with a, the system to keep the water pure was connected to the internet.
31:28
So that if it had a problem, it would be able to order the, like if it needed different chemicals or whatever, the system would recognize that and automatically order them.
31:40
However, there was no security on that. And it was also on the network for the restaurant.
31:48
And so through the, I guess it was a thermometer in the fish tank, they were able to hack in to the computer network of the company.
32:00
And through that, they created a ransomware where they encrypted the company's computers and asked for money to get that turned back.
32:09
So these are the things that people don't think of. When we have kids, bud, kids, growing up with kids now, people have to be aware of the things that go on on the internet their kids are not wise to.
32:25
The two largest type of sites where you will get viruses and malware are pornography sites and gaming sites.
32:35
And if you have a child that's on a computer connected to the internet, they are on the gaming sites.
32:42
My children growing up for many years had a computer that was not connected to the internet for this very reason.
32:50
I also had them on Linux, which most hackers are not, means they can't play all the games, but most of their viruses don't work on that computer.
33:02
But the reason that they do the pornography sites and gaming sites is because those sites, you're either downloading video or you're downloading games, you're occupied in the game and you don't notice the slowing down of something else being downloaded with it.
33:20
And because of that, they can download things. So I tell parents not to let their kids play games from internet websites, because that's like asking for viruses.
33:35
And don't think that your virus protection is gonna be enough because they're always gonna find new places or new viruses, they're gonna create new ones.
33:44
So with children, you have to be mindful. You have to be mindful not only of the websites they go to, and there is software you can get.
33:54
I recommend that there's software for anyone who's struggling with pornography, there's software you can get to be able to make sure that your computer's locked down.
34:03
Now, my kids growing up when they knew that we had a thing, I think it's called
34:09
SafeEyes was what we used. There's a couple of different ones out there. I don't know if SafeEyes is around anymore, but we had
34:16
SafeEyes. And SafeEyes, my wife had a password that she would log in, and that gave the kids 30 minutes of time on the computer.
34:25
And we had restrictions of what websites they could go to and things like that. But kids are kids, my son is a pretty smart guy.
34:33
So what does he do? Well, he knows that my wife makes him turn around every time she puts the password in.
34:40
So what does he do? He set up his camera on video mode and left it on the bookshelf so that while she types the password in, he could figure out what the password is.
34:55
Smart kid, okay? But here's the thing, what he didn't know at that time is
35:02
I also had a thing, they don't have anymore. There is a thing I used called eBlaster, but there's other products
35:09
I'm sure out there like it because corporations use it all the time. But I had something on the computer that they didn't know.
35:16
It didn't require a password. It didn't show that anything was running, but what it was doing was capturing every keystroke they typed, every website they went to.
35:27
And so I knew that my son knew the password because I knew he was going over time.
35:34
I also knew that with the password, once he had the password, he could bypass the securities we put in.
35:41
But I would get an email every day that told me everywhere that he had gone. That he went. So it also gave me all of his passwords because as he typed those in,
35:50
I knew those. That was something stealthful. Now, why did I do that? Well, to protect my kids against their own sinful natures, right?
36:01
I didn't trust that even though my kids knew that there was some software on there to do a protection.
36:06
I also knew that what I would do when I was a kid and try to find a way around it. And so that's what they do.
36:14
And so as parents, you wanna have something on your computers. You wanna, if your kids have phones, you want parent controls on your phones.
36:23
If you struggle with pornography, make sure your wife or someone else has parent controls on your phone, okay?
36:30
Do not allow yourself devices that can connect to the internet that could lead you to sin or to be put you in a position where something dangerous could possibly happen.
36:42
That's something you want to realize is people think like, well, it's not a big deal.
36:48
I actually, this is many years ago, when I first got a wireless router and I thought, what's the big deal if my neighbors use my internet, right?
36:59
Who cares? And so I didn't have a password on it. Why? Because then
37:05
I didn't have to type it in all the time. And so it was easy until I one day noticed that there was a lot of traffic going on my internet.
37:15
And I figured that's not normally what my, because my neighbor would sometimes use the, because he didn't have wireless. And so he would sometimes use mine.
37:22
I didn't think a big deal. But when I saw a bunch of traffic, I went, something seems wrong. Well, I ended up going in and using some tools to sniff the network to see what was the traffic.
37:34
Well, someone was logged onto my router and uploading child pornography. Oh. Yes.
37:40
So I quickly unplugged the, you know, unplugged it. And the guy was parked right outside my house.
37:46
And I discovered back then that they, there are people who drive around looking for open channels where they can upload what would be illegal.
37:56
Now the, and something like that, what makes it illegal is the uploading. If it's uploaded on your computer, you're the one that could go to jail.
38:04
And so after that, I put a very secure password that my kids hated because it's 64 characters long and very difficult to type.
38:18
So, but you, that is a protection, you know, never leave.
38:25
Also, if you have a wireless router, never leave the default password. You know, I don't think they send them now with default passwords.
38:31
I think now they have something to generate them, but we, we just recently, eight months or so ago, upgraded our servers at work.
38:41
And so we, oddly enough, we're, we're not online because 20 something years ago, when we first set up the company, we had been online and we used our desktop both for our accounting and inventory, as well as internet, we'd do emails.
38:58
We got hacked and we had security on there. We had virus protection. So we learned a lesson real quick.
39:05
We really don't even need our corporate programs accessible by web.
39:12
We do everything in the building. We don't need to remotely log in or anything like that. So I took the servers off the internet.
39:20
Now you can't get the software upgrades that I get annually for the accounting, except by download.
39:27
So when we install the new servers, I had hardware firewalls installed because we've got two servers.
39:38
So I had a hardware firewall and I forget they each have like four channels or something like that.
39:43
But when it was, it was funny that you mentioned that because when they came in and, and I had, you know, my guru installing them,
39:51
I'm like, how did, how did you get in there so quick? Oh, they all come with a password administrator. Everything's administrator.
39:57
You want me to leave that in there? I'm like, do you think you should, or maybe we should come up with a different one? Because that's what people do.
40:05
They don't think to change that. And even whatever your device is, people have all kinds of things that they have in their home.
40:16
They have their smart TVs that are connected to the internet. They have their
40:22
DVR players. And, you know, you think about how many devices that are connected.
40:28
Now, if you know how to do things, I mean, like I said, my, you're talking about firewalls in my house.
40:35
I have all of my things that are connected to the internet on one network. And then I have a separate network for my computer.
40:42
So if someone was to get into one, they can't get into the other. So I limit that. Then I have guest networks.
40:48
So when people come to my house and they want, hey, can stay in my house, they need the wifi. I'm like, yeah, here it is.
40:54
Here's the guest network. That's a limited network. I have that restricted. And so there's certain things.
41:00
So there's things like that you could do that would help. But one of the other things when it comes to children, bud, because children will look for ways to get around whatever rules you put in place, right?
41:16
But they think they're savvy. And they often don't realize how unsavvy they are.
41:22
So here's what I did with my youth group many years ago when I was pastoring a church about a dozen plus years ago.
41:32
Oh, more than that now. So what I did was with the youth group was all the youth group thought they were so smart because they were creating
41:41
Facebook accounts, even though some of them were younger. I think you had to be 13 to have a Facebook back then.
41:47
And some of them were younger than that, but they would use fake names. They would use bogus birthdays, you know, things like that, say that they live in different places in the world.
42:00
And they would also, they were back then, there was a website called, I think it was called Jenga or something.
42:06
What's a journaling site, right? So I had a friend of mine who used to be a private detective and he took my
42:12
Facebook picture, created a Jenga account from my
42:17
Facebook. He found one of the youth group kids and he spent three months figuring out because they all had bogus names and addresses, things like that.
42:28
He spent three months creating what we call a community of interest. What community of interest is, so we had one girl said she went to Disney World with her brother and names her brother and puts a picture of the whole family.
42:41
Then he saw that here's the brother with the posting the same picture saying he was there with his sister and names the sister.
42:48
Okay, now he has the real names, right? Puts that connection together. He was connecting things, all these different dots where he could get everyone's real names and like there was one girl that she put a picture of herself.
43:01
She was like 15 years old, I think 16 years old. And she said she was 93 and from the
43:06
Philippines, you know, things like that. And within three months, he was able to build a community of interest to get all of their real names where they live roughly.
43:16
In fact, what I had him do is he came into the youth group and I just said, okay, folks, how many of you guys have accepted me on Jenga?
43:23
And like half the hands go up. I said, no, you didn't. You accepted a friend of mine who's a private detective.
43:29
Here's what he discovered about you guys. And he freaked them out because here's what he did. He said there's one girl that posted a story that every time she would get upset with her parents, she even named the park that she goes to.
43:44
He said, okay, she's given me a picture of herself. She's given me the name of the park. And I know that she always goes there when she gets in a fight with her parents.
43:54
And then he said, she also talked about a story of when she was a child and a bird landed in her hair and got tangled in her hair.
44:01
And ever since then, she's been freaked out by animals. The reason that story got worded was because we had prayer meeting one night and don't ask me how, but a chipmunk got into the building and we're all praying.
44:14
And she felt something crawling up her leg. And she opened her eyes to a chipmunk sitting on her knee and she screamed and we all screamed.
44:24
So she told that story. So he put together that he knows she's upset with her parents if she's there.
44:30
He knows she doesn't like animals. He concocted a story to build trust. And he said, so his story was that his parents forced him to like sleep with a dog because he got a dog bit him and they wanted to get him over that.
44:43
Like this whole story that he created to make it seem like he has a fear of animals.
44:48
His parents didn't understand them. And at the end of the story, I said, would you trust someone if they told you that in the park, knowing you're already in an emotional state being upset with your parents?
44:59
And she went, yeah. Another girl he turned to and said, she put out there that she is in home for two hours at least every day.
45:10
She gets home from school. Her brother is on sports. Her parents are working.
45:15
She's got at least two hours every day she's home alone. Because of different things she mentioned, because she would talk about her walk home.
45:24
Because these different things she would mention, he figured out exactly because she mentioned the school she went to.
45:30
He figured out exactly where she walked, how she went home. He found out enough that he actually said he gave an exact location and with a map and said, at this location, there's no houses anywhere nearby.
45:44
He goes, someone could be sitting in a car right there, pick her up and know that no one will even know she's missing for at least two hours.
45:54
And so the thing is, I tried to teach them this, they put way too much information out there and our children do that.
46:00
They don't think about it. They put the information out thinking nothing bad can happen. They think they're talking to people, maybe their same age and it could be an adult.
46:10
Unfortunately, much of the human trafficking that happens is through connections online.
46:17
Someone thinks they're talking to a girl their age and they're trusting the person and they find out, no, it's a 40 year old man.
46:26
And they say, let's meet. Parents, if you do not know where your children are going online, you cannot protect them.
46:37
My children knew that if they were gonna use my computers that I paid for, I was going to know their passwords to every account they have.
46:47
As a parent, I required that. Why? Well, I mean, I could find it out my own way, but they didn't know that.
46:53
That was part of my ruse to make sure they didn't know. But I always had the passwords.
46:58
You should know your children's passwords. Why? So that you can know what they're seeing, what they're doing.
47:06
You want to be going in and they're gonna try to clear the history of their browsers and different things like that.
47:13
But you want to make sure you know, because there are people that are using the internet to prey on children.
47:20
Earn trust to get them out of your protection. Maybe someday, Bud, we'll do an episode on some of the things
47:27
I did to protect my children for parents that at least would be more in line with our show on Christian topics, parenting.
47:36
But there are things I did. I've always told my kids, if anyone tells you not to tell me something, they mean to hurt you.
47:42
That's the very thing you should tell me. You have to train your children for the things that people might look to harm them.
47:53
And the internet is a place that is very dangerous for children. You know, we find it, there's a lot of good things that we can find on the internet.
48:01
There's also a lot of dangers. One thing, Bud, that you can find on the internet that's helpful is, well, our new sponsor.
48:14
And you're thinking, you're thinking, Bud, that it is my pillow, but you are wrong, my friend. You are wrong.
48:20
You're wrong. You thought it. Oh, okay, okay. You are wrong, my friend. What you want to do is you want to go, and I have created a, there's a link in the show notes, but I've created a link on Bitly that will make it easier for you to get to our page.
48:38
But we have partnered with Logos Bible Software. And so if you go to bit .ly
48:46
slash S -F -E Logos, L -O -G -O -S.
48:52
If you go there, if you want to upgrade your Logos or you want to get Logos for the very first time,
48:58
Striving for Eternity will give you not only the discounts that Logos provides, but we will give you five free digital books.
49:06
And this is something you can get on the internet. Logos is a Bible software package that I use heavily.
49:12
I think it is probably one of the best. It will increase your ability to do study in God's word.
49:18
It is something where you have tons of books. I happen to have about 60 ,000 books that all sit at my phone.
49:26
So you can get access. I don't suggest that you get that many books, but it has all the reference materials you would want to use to do studying of God's word.
49:36
You can have that all at your fingertips. Organized in such a way that if you're studying the
49:41
Bible and you just right click on a word, you can get to the Greek or the Hebrew and do some to understand what the original language is said.
49:48
You can have all your commentaries there. You can be able in just simple clicks to be able to do a lot of research.
49:54
They have a thing called a fact book. You're studying about a city. You're studying about Jerusalem. You just type in Jerusalem.
50:00
It'll bring up, go through your whole library, whatever books you have, anywhere where you have Jerusalem and show you different things about Jerusalem that could help and enhance your study of God's word.
50:11
So if you're someone who's planning to be a pastor, if you're someone who's teaching Sunday school or teaching a
50:16
Bible study, you might want to consider getting Logos and way to partner with us to get it.
50:23
That will get you five free digital books. Maybe you want Spurgeon's commentary on first Peter.
50:29
I'm going to start a Bible study on first Peter here soon. And so with that, we're going to, that would be a good one for me to get.
50:35
We have a whole bunch of books you can select from. If you, and to make it easier, because Logos has this long partner page.
50:42
I made it easier for you. Just go to bit .ly slash S -F -E
50:48
Logos and you'll be able to upgrade your Logos and get new packages.
50:54
If you want to upgrade to Logos 9, that would be a way of doing that. Actually, you know, bud, your pastor has used this and he got five free books.
51:03
He was very happy for that. Oh, wow. Nice. But we upgraded him. I think it was actually, we upgraded him to eight.
51:10
I don't know if nine was out back then, but that is a new sponsor that we have.
51:16
So if you want to study the Bible more and dig deeper, go check out Logos Bible software and you use our link to do so.
51:26
And you'll get the five free books. If you are going to go out there, they do have different discounts.
51:35
So that's something to make sure that you check that out.
51:43
So I like to throw bud off whenever I do that. And he was not expecting that one. No, that's not what
51:48
I was expecting. That's exciting though. Yeah, that's great. I'm not as savvy with Logos as you are, but I do use it too and I do need to upgrade.
51:59
But I'm waiting on the co -host special to come through. So when you get the link for that, maybe
52:05
I'll be a candidate. I don't know what that special is, but when it comes through.
52:12
Well, I'll tell you about it afterwards. Hey, listen, the reality though, is this isn't our typical type of show.
52:20
We're talking about a lot of different things that are not in the realm of Christianity, but realms where I know that a lot of people have gotten themselves into trouble with things online, falling prey to scams and things like that.
52:34
And we want to just highlight some things for you so that you would be more savvy when you're on the internet.
52:42
One of the things I didn't get to that would help to protect you is what's called a VPN. Let me explain what this is and tell you at least which one
52:52
I use and why. But there's a VPN. What that does is it is something, it stands for Virtual Private Network.
53:03
And what a Virtual Private Network is, is it is something that will basically take whatever is, it puts something on your computer that when it's going to send something over the internet, it's going to encrypt it.
53:17
And before it goes to wherever, so say you're going to go to Logos .com and you want to go out there.
53:22
I'm going to type in Logos .com and then what it does is it goes and what it sends over the internet, it encrypts and sends it to another server.
53:32
That other server knows how to decrypt it. And that other server is the one that'll actually go to Logos .com.
53:40
And then when it gets back its response, it will encrypt it and send it back to me encrypted.
53:45
Why is that important? Well, for very simple reasons. Everything you're sending through the internet, people are trying to spy on.
53:54
So they're trying to do that. What I said earlier of these, building these community of interests and trying to see where you're going.
54:02
And so it's like a website like Facebook. Facebook is known for trying to see where else you're going.
54:08
So they have things running on your computer or on your phone where they're trying to listen. On your phone, they're listening to your microphone.
54:15
On your computer, they're trying to figure out what other websites you go to. Google's trying to figure out all the sites you go to.
54:21
They want to figure that out for their own marketing, but other people want to figure it out because they want to build a community of interest to see how they could get you to fall prey to their scams.
54:34
And nowadays, we don't want big tech knowing what we're doing. So a thing around that is to use this
54:40
VPN. Now I use one called Hotspot Shield. And there's many of them out there. Whichever one you want to look for, there's a couple of things you want.
54:48
One, you want to make sure you get one that says that they do not have a log history.
54:55
Because what good is it if you're going to places and they're keeping a log of it so that they can do the tracking?
55:03
Now, of course, you have to trust that they are, you know, they may say they do a log history, but if you do a search on VPNs, you'll find a lot of them.
55:15
You want to find ones that are going to be ranked a lot higher and have a lot better ratings and looking in, you know, for ones that have that.
55:24
I went with Hotspot because in the industry at the time, it was one of the more secure ones.
55:31
It doesn't do the logging of the history logging. And it also has ways of speeding up because a
55:39
VPN will slow down your internet search. And so I paid for a lifetime. There's actually some ones that may be a little better out there now, but I paid for a lifetime use and well,
55:49
I'm Jewish and I'm not going to, you know, I'm not paying. And again, I paid a lifetime.
55:55
I'm not going to pay a second time for a lifetime. Yeah. But that becomes the thing to think about is to get a
56:02
VPN. And that just, that encrypts. Now, one of the things that with it is you can actually, my VPN, I can move it anywhere
56:10
I want in the world. So, you know, if, and this is one of the things, when I get these emails and people tell me,
56:16
I've been watching your computer. Well, if they were thinking they were watching my computer, they would have actually been on a computer in Brazil because that's where I wrote it.
56:27
And I actually changed where I route it to. So it's kind of my fun. I just route it to different places at different times.
56:33
So if anyone was trying to hack into the computer every day, I'm in a different country.
56:40
Now you may not be as nerdy as me, I understand. So, you know, these are just some different things that I hope that, you know, this is helpful.
56:49
But you're going to see a lot of times you get, a lot of this stuff comes through email that we have or websites that lure you into stuff.
56:58
You have people that do fishing now, but you do some fishing, don't you? Yes, I have.
57:04
Yes. Deep sea, offshore kind of stuff. Yeah, I've done that. So you've done the fishing where you contact a person pretending to be someone else and try to get some information from them, right?
57:14
Oh, no, not that. Except with you, but nowhere else. There's a thing called fishing scams where people try to pretend they're someone else to try to gain information from you.
57:27
And a lot of people fall for that because what these guys are typically good at is because they usually have enough information on you that they can figure out the rest.
57:36
And they just do a little guessing here and there. And they use that to try to get more information.
57:44
I've one classic fishing trick that I saw was a guy in a city.
57:52
And I wanna try this, bud. I really would, it'd be a great video. But this guy did a video where he goes into the city and he's telling people, we're out here just trying to talk to people about how secure their passwords are to their email address.
58:06
Do you have an email address? Yes. Okay, what's your email address? And they give the email address. Okay, so we wanna make sure that you have a secure password.
58:14
How do you remember what your password is? You're in this one girl. Oh, well, it's the name of my dog and the year
58:20
I graduated high school. Oh, you got a dog. What kind of dog do you have? Oh, I got a little French poodle. Oh, that's so cute.
58:26
What's its name? Fufu. Oh, so you went to, what school did you go to? Oh, such and such high school.
58:32
When did you graduate? Oh, you know, 2010. Oh. And they just give away their password.
58:40
There you go, yeah. I love the one guy that he did that and went, wait a minute, I just gave you my password. That's a phishing experiment.
58:48
That's where they're phishing for information and people don't even realize it seems innocent and they fall prey to it and give that up.
58:59
So my encouragement is to not fall for that. If someone's asking for information, know who they are.
59:05
Like I did with the youth group in that experiment, one of the things I told the youth group is I told them never to accept a friend request from people without knowing they actually know that person.
59:14
After that, I ended up adding all the kids on Facebook in the youth group that I wasn't friends with.
59:21
And I was so glad that they all called me up. Pastor Rappaport, are you, was that actually you? Is that you, yeah. And I said, yes, you can accept it, right?
59:29
That was good. That only lasted for a few weeks, unfortunately, but kids don't learn, right?
59:35
So I hope, Bud, that we didn't put anyone to sleep in this episode. But in case we have, in case we have put them to sleep, it would be good for them to get a good pillow, good mattress topper, good, you know, blankets and sheets to sleep on, don't you think?
59:55
I think so. I think so, definitely. And that's why if they wanted to get that, they should go to mypillow .com.
01:00:02
Click on the radio listeners square and use promo code SFE. There's a whole bunch, if you go to mypillow .com,
01:00:08
there's a whole bunch of products out there, some of them with great discounts, right now they're offering $40 off of their premium pillows.
01:00:16
$40 off is the biggest discount they've given. And you can only get it with the promo code.
01:00:22
And to get these huge discounts, use promo code SFE for striving for eternity. Or you can call 1 -800 -873 -0176.
01:00:33
That's 800 -873 -0176. Use promo code SFE. That information's in the show notes as well, because then not only do you get a good night's sleep, hopefully not listening to this podcast, but you also get to support striving for eternity.
01:00:50
So that is something we're grateful for. So we're glad to partner with them. These pillows are made in the
01:00:55
USA, which is a nice thing. We're not outsourcing to some other country. Like Brazil or something.
01:01:01
Like Brazil, where my computer, if you're talking to my computer, you think I am. Well, I happen to be in Brazil right now, as we're recording.
01:01:11
You know what? Maybe I'm going to change it to sunny Florida tonight, just for you. Do that, yeah. It's a wonderful evening tonight.
01:01:18
No, seriously, this is an important topic. And it applies to Christians.
01:01:23
I mean, Christ sending out the disciples, told them be shrewd as serpents, be innocent as doves.
01:01:31
That applies certainly in the spiritual realm. But look, we're aliens in this world. And we're going to increasingly be targeted.
01:01:38
So we need to be savvy about these kinds of things for the sake of our children and for the sake of our integrity and reputation before the world.
01:01:46
So very valuable. I knew Bud was going to find a way to slip a Bible verse in one way or another. I was going to quote
01:01:52
Stephen Hawking, who said he thinks that computer viruses should count as life. But we didn't have time for that.
01:02:00
So we'll catch that some other time. Yeah, you know, I actually think I could be mistaken. I think 2020 caught a virus and we should just reboot.
01:02:09
Yeah. And the people said.