Description

Hello Everyone,

So I'm giving away games to raise awareness of a charity I'm starting (don't worry, I'm not asking for/accepting any donations). I run a company that sells an enterprise computer security solution, but now I'd like to give back by making it available for free for home use.

I think the free technology is a perfect fit for gamers. It runs in the background without any UI/popups to pull you out of a game. It won't impact system performance (back when I had more free time, I played a lot of competitive multiplayer games and hated AV products that impacted my games). And frankly as a demographic I think we engage in some, let's say, riskier surfing behaviors that make it especially necessary to have something better than AV.

You can learn more about my security offering, Solidus, and download it at http://GetSolid.us. Feel free to message me here with any questions you might have (Tech-wise, about my credentials, etc).

I'm also planning to do some non-bundled giveaways for users of the technology to increase adoption and further encourage users to spread the word. I'd really love to see this charity make as much of a difference and protect as many people as possible. Let me know if you install the product (honor policy), and I will add you to a whitelist for those future giveaways.

Thanks for reading, and I hope you take advantage of the free security offering.

so do you engage in Pen testing Joe Kovacic?

6 years ago
Permalink

Comment has been collapsed.

Thanks for taking a look. I have never done a real-life pen-test. I have worked with some of the common tools in an educational setting, but my focus is on defensive security measures (primarily software development for detection, remediation, and orchestration). I have made some friends over the years that do pen-tests professionally. So if you are looking for someone with that expertise, I'd be happy to make a recommendation.

Thanks again for reading. Let me know if you have any other questions.

6 years ago
Permalink

Comment has been collapsed.

I'm not looking for someone, I was just interested if you came from the pen-testing industry, and if that's what inspired this software.

6 years ago
Permalink

Comment has been collapsed.

I worked on an IT Help Desk for a company that had rampant malware issues. I realized then that antivirus products weren't going to be effective moving forward and decided to start working on a solution to the problem. Working in incident response then gave me the idea to take the software I had developed for businesses and adapt it to start a charity for securing personal computers for free.

Let me know if you have any other questions :).

6 years ago
Permalink

Comment has been collapsed.

Ahh, see, incident response is the internal name of pen testing, filling out the forms, trying to track the origin, the methods used to gain access, how defense were bypassed, it's basically pen testing, but instead of looking inside from out, you are following the trail like a detective

6 years ago
Permalink

Comment has been collapsed.

Yeah, incident response is kind of like the opposite of pen-testing. Pen-testing simulates an attack to find openings, and IR Teams monitor environments to see when they may have been breached. Our IR Team was pen-tested as well to ensure both that we weren't a potential point of compromise and that we would detect any attacks they attempted.

6 years ago
Permalink

Comment has been collapsed.

Thanks for the chance at a game and your product! Best of luck in future endeavors!

6 years ago
Permalink

Comment has been collapsed.

Happy to give you the chance to win, and thank you for the positive message :).

6 years ago
Permalink

Comment has been collapsed.

Wow I won, Thanks!

It sounds like your offering alerts a real live person if a system gets compromised. What happens from there in regards to resolving the infection?

6 years ago
Permalink

Comment has been collapsed.

Congratulations!

Yes, my service provides free incident response to home-users. If I detect a computer has been infected, you will receive an email detailing what I detected as malicious and requesting permission to remove it from your system. The software will not take any action on your system without explicit consent.

Once i receive permission through email, I trigger remediation of the system remotely. The agent on your system will receive instructions on what to remove, and the associated files and registry entries will be removed from the system. At that point, a restart is recommended to remove any memory-resident portions of the infection.

Please let me know if you have any other questions, and enjoy the game :).

6 years ago
Permalink

Comment has been collapsed.

You do not have permission to comment on giveaways.