Landon Cruz

Joined a year ago

Landon's Favorites
Weit wie das Meer: Roman (German Edition)
Weit wie das Meer: Roman (German Edition)
Weit wie das Meer: Roman (German Edition) by Nicholas Sparks and Bettina Runge. Rated 4.5 out of 5 stars, with 60 ratings. Read more and check out similar items in the Nicholas Sparks category.
Yii2 By Example
Yii2 By Example
Yii2 By Example by Fabrizio Caldarelli. Rated 4 out of 5 stars, with 9 ratings. Read more and check out similar items in the 'PHP programming' category.
Urban Outlaw: Dirt Don’t Slow You Down
Urban Outlaw: Dirt Don’t Slow You Down
Wer hinter diesem Buch eine Abhandlung der Porsche Sammlung von Magnus Walker vermutet wird von diesem Buch enttäuscht werden, alles anderen finden eine interessante Autobiographie die natürlich mit einer der interessantesten Porsche-Sammlungen endet.
Das Buch ist in englischer Sprache auch gut und flüssig mit mittelmäßigen Englischkenntnissen zu lesen. Von den rund 256 Seiten im Hardcover sind 16 Seiten Vollfarbseiten mit netten Fotos aus dem Leben von Magnus.
Es zeigt die typische amerikanische Geschichte dass es in Amerika jeder mit Mut und Fleiß schaffen kann.
Magnus Walker beschreibt in dem Buch eindrucksvoll seinen Lebensweg von T-Shirt Verkäufer über den Designer zum Textilunternehmer, anschließend vom Immobilienbesitzer zum Vermieter für die Filmindustrie und vom Porsche Besitzer zum Rennfahrer, Renninstruktor und Porsche-Sammler. Dabei macht er aber auch immer deutlich, dass neben Fleiß auch immer etwas Glück in seinem Leben dabei war und dass Glück nur Möglichkeiten eröffnet, der Mut diese Möglichkeiten zu nutzen aber immer von einem selbst ausgehen muss.

Als Essenz aus diesem Buch bleibt "mache was du am besten kannst und nicht was andere von dir erwarten"
Beyond the Model T: The Other Ventures of Henry Ford (First Edition)
Beyond the Model T: The Other Ventures of Henry Ford (First Edition)
This review relates to the 1990 1st edition...

Dustjacket blurbage: "Henry Ford was once described as a lazy farm boy who would to go any length to avoid work. The vast and varied enterprises he undertook with earnings from his Model T, however, belie this assessment."

This book explores the many, many endeavours undertaken by Ford -- automotive, philanthropic, in the media, his schemes in social engineering, his education projects, his forays into aviation, mines, lumber, the rubber industry. A fascinating topic. When someone with ambition finds himself with a huge fortune and almost unparalleled power, where does he devote his energies and resources?

This is a well-researched and heavily illustrated book. Bibliographic information appears at the end of each chapter. It covers a lot of ground. At 204 pages, this book doesn't devote a huge amount of energy analyzing Ford's interesting, complicated, and controversial political and social views. But is certainly a novel, well-illustrated, and comprehensive piece of work.

Cloth over hardback boards with dustcover; glossy stock, a sewn binding. About 250 black and white illustrations. Index.
Spreadable Media: Creating Value and Meaning in a Networked Culture (Postmillennial Pop Book 15)
Spreadable Media: Creating Value and Meaning in a Networked Culture (Postmillennial Pop Book 15)
It's a little bizarre that a popular (at least according to Amazon sales figures) book about passing along media or commentary has gone over a month without having a review posted. I think it's because this is an ingenious, yet jam-packed book that looks at online participation and the sharing of information from a unique perspective that just plain forces you to think. This is not a quick read.

While there are plenty of social media books out that look at the "new phenomenon" of sharing as an organizational strategy or as platforms of tools as compelling new ways to share, the authors of "Spreadable Media" look more at the material itself that is or isn't being shared. What characteristics of materials make people want to spread them? What's in it for the sharer? When people read, hear or watch something that makes them want to circulate it, what triggers that decision? The authors point out there's nothing really new about this motivation. The passing down of keepsakes, family heirlooms, newspaper articles, scrapbooks, family trees, etc. has gone on for generations. First the photocopier and now social media platforms have just made it easier and almost instantaneous.

The main focus of the book is on the broadcast, mass-media business model of "stickiness" of content vs. the parallel concept of "spreadability." It's becoming increasingly apparent that if media doesn't spread today, it's dead--like a film/song/book/work of art/best practice no one sees/hears/reads/studies/tries. So while there's a loss of control in allowing your audience to manipulate and pass along one's creative effort, there's also an expanded opportunity that it will uncover new audiences and be more widely acclaimed than if you protect it and threaten users for "stealing it." Corporations, institutions, universities and other power structures are starting to recognize that.

Perhaps one reason "Spreadable Media" may be slow to generate reviews is in the sheer breadth of their analysis. My personal reason for reading "Spreadable Media" was to create company communities where members will pass along content to co-workers and customers to expand product knowledge and benefits and ultimately to increase sales. Some of the most insightful information I've read about this topic is indeed covered in this book. The authors portray "lurkers" (the bane of online communities where the vast majority of members who only consume others' information without contributing any of their own) as only learning and biding their time until they too understand the rules and start to participate. In Chapter 5 they even describe what makes materials sharable. This will help me to completely rethink the development of content rather than just to focus on why community members are either engaged or not.

The density issue comes into play, however, as they go through a variety of entertainment, mass-media examples about how and why we are all moving toward spreadability. These examples are interesting to consider but can be difficult to digest. There are probably few readers who have all these perspectives who can follow these various threads. So if the authors have done anything "wrong" in the book it is just the amount of commentary on how much our culture is changing to address ways that we learn across all aspects of our lifestyles. In summary then, "Spreadable Media" is a great book but prepare yourself for some pretty deep but original thinking as Jenkins, Ford and Green argue for the increasingly networked world we're all living in.
The Original Dump-a-Trump Pen Holder - Funny Donald Trump White Elephant Gift and Christmas Present
The Original Dump-a-Trump Pen Holder - Funny Donald Trump White Elephant Gift and Christmas Present
Whether you like or dislike 'The Donald',this is definitely a conversation starter and something unique for the politically incorrect or just to poke some fun(pun intended!) I plan to give this to my spouse since we are politically conflicted and will hopefully add some laughs and jolly on Christmas morning. It is just as described in the description and looks just like the picture. Go ahead and poke some fun...because life is too short.....
Margaritaville DM0700-000-000 Frozen Concoction Maker, 1, White
Margaritaville DM0700-000-000 Frozen Concoction Maker, 1, White
EDIT: We decided to leave the ice out 20 rather than 15 minutes and it shaved the ice perfectly! Nothing wrong with it now. LOVE it!
Great machine, easy to use, however it DOES NOT SHAVE ICE. We've tried several types of ice, from the cubes our freezer makes to different shapes/sizes and left them all out the recommended 15 minutes and all of it produced beads of ice. Every drink of my margarita required me to chew up half a mouthful of ice beads. Shaved ice is what snow cone machines make. This does nothing like that yet it's advertised as shaved.
This really sucks because everything else is perfect and we love the machine but for the $199 I paid i could have gotten four snow cone machines and made my drinks in a pitcher and been happy. I probably should have taken off more than one star since the ice is 90% of the whole "thing" but the rest of it is great. They just shortchanged the ability for it to do what they said it does.
Thoreau's Book of Quotations (Dover Thrift Editions)
Thoreau's Book of Quotations (Dover Thrift Editions)
I have always loved quotation books of all kinds, and the best ones most often come from the old masters of literature and philosophy like Aristotle, Rand, Franklin, Jefferson, Sandburg, Edger Allen Poe, and Henry David Thoreau to name just a few.

This Dover volume has more than 450 quotations from Thoreau's writings. Many of them came from his journal and other material. His rebellious nature can be felt in many of his writings. When he saw injustice he commented on it. When he viewed the beauty of nature he often wrote about how much he appreciated the simple life. His search for truth, beauty and the meaning of living a good life can be understood in this small volume of quotations.

A very small sample of the treasured comments in this text are these gems: "The mass of men lead lives of quiet desperation." "The fault-finder will find faults even in paradise." " That government is best which governs not at all." 'Read the best books first, or you may not have a chance to read them." "You cannot walk too early in new-fallen snow to get the sense of purity, novelty, and unexploredness."

This 57 page volume is organized into 17 sections which are as follows:

Contemplation and reflection, day and night, education, freedom and individualism, friendship and love, himself, human nature, law and government, literature and writing , money and business, morality and conduct, nature: animals, trees, water, religion, solitude, travel, work and leisure. Some of his views may have been considered radical in his time, but truth always stands the test of time. This book was a pleasure to read.

Anyone who desires to learn the innermost thoughts of a great writer should check out this text.

Rating: 4 Stars. Joseph J. Truncale (Author: The Samurai Soul: An old warrior's poetic tribute).
The Soul of C. S. Lewis: A Meditative Journey through Twenty-Six of His Best-Loved Writings
The Soul of C. S. Lewis: A Meditative Journey through Twenty-Six of His Best-Loved Writings
An author who has long challenged me with his Christian worldview is C.S. Lewis. I was blessed with reading an excellent book highlighting his amazing mind, `The Soul of C.S. Lewis: A Meditative Journey through Twenty-Six of His Best-Loved Writings.'

Here is the synopsis of this lofty book:

C.S. Lewis opened more than just the wardrobe door... He also opened doors to new worlds of ideas, fantastic discoveries, and insights on the human experience. Author of the Narnia series, Lewis was the premier twentieth-century thinker on life, literature, and Christianity. His fiction and nonfiction continue to inspire readers and moviegoers today. Drawing from twenty-six of Lewis's works - both fiction and nonfiction, his popular works as well as his lesser known ones - The Soul of C.S. Lewis encourages reflection on his key spiritual themes and opens a door, in its own way, toward our understanding the soul of one of the twentieth-century's greatest literary figures.
The Soul of C.S. Lewis is perfect for the seasoned Lewis enthusiast, for those who want to be introduced to Lewis, or for anyone looking for personal growth. Written by Linda Washington and veteran Lewis scholars Wayne Martindale and Jerry Root, among others, this book uniquely gets to the core of Lewis and does so by drawing from a wide range of his works.
Each chapter contains an introduction to one of Lewis's works and tens meditations inspired by it. Rich in wisdom, these meditations highlight the interconnectedness of Scripture to life while challenging and inspiring readers to know God and live their lives well.

Here are the biography of the authors/editors:

Wayne Martindale, Ph.D., is a professor of English at Wheaton College, Illinois, where he regularly teaches courses on C.S. Lewis. He is the author of Beyond the Shadowlands: C.S. Lewis on Heaven and Hell, editor of Journey to the Celestial City: Glimpses of Heaven from Great Literary Classics, coeditor of The Quotable Lewis with Jerry Root, and author of numerous chapters and articles on Lewis as well. Wayne and his wife, Nita, have taken students to Lewis sites in England and Ireland. They have also lived and taught in China.

Jerry Root, Ph.D., is associate professor of evangelism at Wheaton College in Illinois and visiting professor at Biola University in Southern California. He wrote both his M.Div. thesis and Ph.D. dissertation on Lewis and has been teaching classes on the British writer for more than thirty years. He travels nationally and internationally lecturing on Lewis and is the author of C.S. Lewis and a Problem of Evil: An Investigation of a Pervasive Theme. He is coeditor, with Wayne Martindale, of The Quotable Lewis.

Linda Washington is a senior project writer for Livingstone Corporation and has authored and coauthored more than twenty successful books. Linda received her B.A. in English from Northwestern University and has held positions as an editor for the American Bar Association, Cook Communications Ministries, and Ligature Creative Studios.

In the Introduction, the writers/editors explains the Scheme of this book:

The Soul of C.S. Lewis: A Meditative Journey Through Twenty-Six of His Best-Loved Writings draws quotations from Lewis's writing. Limits of space as well as the authors' and editors' predilections narrowed the scope these readings. Nevertheless, each of the twenty-four chapters of this book highlight a particular Lewis source (or two, in a few cases). Each chapter is introduced with a one-page summary; this is followed by ten Lewis quotations and ten reflections. Each reflection ends with a Scripture verse that affirms the concept from Lewis. The chapters are bundled in groups of six within a topic that loosely generalizes a theme running through each book in that part. The four parts of the book are: Pilgrimage, Temptation and Triumph, Going Deeper, and Words of Grace. Each of these has an introduction explaining its general theme.
The purpose of The Soul of C.S. Lewis is to encourage reflection and thought. The selections are short; nevertheless, they are designed for the reader's personal growth. Lewis opened up more than just wardrobe doors. To read and reflect upon his work biblically is to take a journey of discovery. He opens a door into the liberal arts - those liberal arts that allow people to think well in order to live well. He leads them into new worlds of ideas and imaginative discoveries. Furthermore, Lewis integrates his faith into the learning process, and this, too, provides a significant model for a reader's own reflection. (p. xvi)

Christians are often accused of leaving their brains at the foot of the cross when they come to Christ. C.S. Lewis, in contrast, proved that a Christian can also be an intellectual and a scholar. Professor Lewis's legacy is large, and we are so blessed that he came to know Christ. His incredible creativity and brain (in conjunction with the working of the Holy Spirit, of course) undoubtedly pointed many to Christ, and many lives have been saved for all eternity as a result.
Although I have read many of Professor Lewis's work, I have certainly not read everything. This book is a terrific resource in summarizes the topics and steer us to works of his with which we may not have previously been aware.

A topic of great interest to me over the last several years is that of Grace. In the introduction to that section, `Words of Grace,' the following is shared:

Perhaps no topic appeals more to the deep need of the soul than words of grace. There is something in Lewis that seems to appeal to that part of each man, woman, and child who longs to be loved. This theme of Lewis's, though expressed throughout his work, finds one of its most endearing expressions in The Lion, the Witch and the Wardrobe. Aslan, the Christ figure, incarnates himself into Narnia: "the Word became flesh" (John 1:14, NKJV) in that world as it did in ours. Aslan, as an act of grace, gives himself to save Edmund and all Narnia. So great is the expression of this love that it is not conditioned on Edmund's performance or capacity to earn it; in fact Edmund can do nothing to save himself from peril - nothing of merit. His neediness is met by Aslan's love and sacrifice; nothing else can do. (p. 240)

In the Conclusion, the writers/editors explain how being involved with this book has changed their lives:

And this is only the beginning. Many of us have followed an interest in something Lewis wrote about and pursued it with a growing passion for the learning that is evident everywhere in his writing. After you finish reading everything Lewis write, you can set out to read everything Lewis ever read - and that's a life's work! Above all, may you be encouraged by this journey to read and so to draw strength from the Word of God, which is the very backbone of the books Lewis wrote and the life he lived. But the ultimate goal is not even to be a better reader of the Bible; it is to be a better follower of Jesus. Lewis did not want disciples. He would say of Christ a John the Baptist did, "He must become greater and greater, and I must become less and less" (John 3:30). (p. 317)

This book, as you can imagine after reading the credentials of the authors/editors, is extremely well-written. I have taken seminary classes in the past, and I pray the Lord allows me to take more again the future. For now, this type of book is a wonderful scholarly tome that is challenging, yet still within the grasp of most readers. It is a blessing to me that these books are published for the masses, and I thank Tyndale House for making this book available to us!

This book was published by Tyndale House Publishers and provided by them for review purposes.

Reviewed by Andrea Schultz - Ponderings by Andrea blog - [...]
The Jungle (The Oregon Files Book 8)
The Jungle (The Oregon Files Book 8)
In 1281, a Chinese general discovered the power of the laser. Now, centuries later, that early discovery could potentially lead to the end of the free world unless Juan Cabrillo and his Oregon crew mates can stop it first.

Cabrillo is initially hired to rescue a young boy who had been taken prisoner by Al-Qaeda. While on the mission, the group comes across the kidnapping of an American soldier. Rescued by Cabrillo, MacD Lawless is set to become the newest member of the Oregon team. With the boy safely rescued, Cabrillo and his team wait for their next assignment, which unfortunately turns out to be worse than the first. The group is hired to find the daughter of Roland Croissard. His daughter, Soleil, is known as an adventurer and she and her companion have disappeared in the jungles of Myanmar. Cabrillo and his team accept the assignment, but the events are about to change in an earth-shattering crescendo which could destroy the world, for even as the group is concentrating on rescuing Soleil, forces are at work stealing the U.S. nuclear launch codes. Cabrillo and the crew deduce that someone has developed a new quantum computer which has more power than anyone can imagine. To make matters worse, the computer's owner has blackmailed the President and now threatens the safety of the world. Can Cabrillo and his team find the whereabouts of the computer and destroy it in time?

This is an excellent book. I've only recently started reading Cussler, but this is the best of his books that I've read. It's easy to cheer for Cabrillo and his crew because they are the classic "good guys"; always out to defeat evil-doers at any cost. MacD Lawless is a fine addition to the crew of the Oregon, too. The story is explosive, and it projects what could ultimately happen if technology ends up in the hands of the wrong people. Highly recommended.
Feathers in the Fire
Feathers in the Fire
I thoroughly enjoyed this book. Definitely one of her best, filled with unexpected twists, turns & somersaults!
What an amazing & prolific author was Catherine Cookson. Every so often I return to her books, mostly when I’m feeling depressed & bored by the current slew of mostly very ordinary Authors writing now.
Be wary of Goodreads reviewers. The books some of them review are given to them free & very rarely do they give a bad one. Some of the books I’ve purchased on their opinions have been total rubbish so you have to ask yourself if they’ve ever read any really great books.
Edward's Twilight: edward's version of twilight
Edward's Twilight: edward's version of twilight
If the Twilight series has been so popular with readers it’s because they allow them to escape into a purely fantasy world where Vampires are good and beautiful. Though completely impossible, these romantic novels satisfy a deep need as does much art. Veillon’s crudely written book does everything possible to destroy the dream- like “ therapeutic” function of Meyer’s novels. I found it hard to continue reading after the first chapter. I’m not surprised that Veillon published the work himself as probably no editor would accept it!
Heart of the Steal
Heart of the Steal
Two men from very different worlds happen to encounter each other at a party. The attraction is apparent to both. Vaughn is a billionaire philanthropist, and William is an FBI agent from a very middle-class background. Can this really work?

This story drew me in from the very first page. Part of me didn't want to put it down; the other part of me wanted to read slower so the story would last. (I cannot be the only reader that does that!) I have all the faith in the world in these authors and I consider myself a fan; I just didn't see how they were going to make this relationship seem plausible. Wow, they did. They did an amazing job of taking the reader into Vaughn's head to understand things from his POV, and then they did the same thing with William. I loved how they did that! Felt like I really 'got' these characters.

There was such tender romance in this book. The quiet moments when Vaughn and Will were falling in love were simply lovely. There were also sizzling, steamy moments! There were also moments of great humor; Vaughn is a very funny guy! When teasing Will about his need for all things to be just so, when deciding they would be boyfriends, he said, "I know how you like things to be official. Shall I call a notary?" Yeah, Will's comeback was PER-FECT. When reflecting on his stay with Will in a La Quinta motel, Vaughn muses, "I'd even used the towels they provided without asking Will if they were intended as some kind of punitive measure." And then, "And the bed was remade with new pillows and sheets that didn't feel as though they were cleaned via car wash and left to dry in a pile on the floor." (Oh, Vaughn. You're such a lovable snob!) And as funny as he can be, Vaughn is also very sweet. "I wanted to make comfort and beauty and joy the baseline of William's life, not the exceptions to it."

Two things I wish were different: the cover and the ending. This cover does nothing for me. I don't find the color appealing and I don't care for the cartoon y artwork, sorry to the artist. This book is much too serious for cartoon people on the cover. Both of these authors have books with FABULOUS covers, so this one is surprising to me. The ending was so abrupt. I really, really would love to see an epilogue of these guys down the road at SOME point. Their new apartment, a different holiday with Will's family, or something.

If you are new to these authors, you must check out the "Middle of" books by Roan Parrish (m/m). Some of the best books I've ever read. Or if you want a f/m romance, try Small Change, a new series for her. Avon Gale's "Scoring Chances" series (m/m) contains some of the few books that I have re-read for pleasure. They are that wonderful. (Helps if you like hockey for that series.)
Harry Potter and the Deathly Hallows Part 2
Harry Potter and the Deathly Hallows Part 2
This is a disappointment, though as others have said the score for part 2 is far better than for part 1. Alexandre Desplat's cinema work has often been good, and it's usually sufficiently genre-idiomatic; e.g. the score for The Golden Compass was very different in scope from that for The Queen. OK, so he's a good, self-effacing professional film composer who usually tries to write to the drama rather than for his own (ego's) benefit. And there are many good moments in DH2, including echoes of the previous Potter composers' contributions: for example Nicholas Hooper's Gorecki-like invocations of dark mood, coupled with Desplat's more obvious melodic gift, can be really effective, and there are also echoes of Patrick Doyle's strong pulse, as well as of John Williams's clever orchestrations and melodic quirkiness. The Lily theme and its repeated use - in the Snape memory sequence and the Ressurection Stone sequence - is very effective. So why is the work for Deathly Hallows, in the end, disappointing? Chiefly because too much of it isn't like the Lily theme, but seems like reach-me-down: the slow repeated big drum strokes may raise tension, but they may also confirm that the composer can't think of something more original to do the same job. Of course film composers are pressed for time, and maybe the film-makers are to blame for working with their usual assumptions about jobbing film-music composers who can do miracles in a few weeks. Not this time - which is a shame. The final part of the adventure needed something more consistently original.
Mythical Roads
Mythical Roads
I loved this program! I can't travel like I used to so going on an arm chair adventure is my cup of tea! Great for the family too!
GRYPHON GUARDIAN Advanced Parental Control System & Mesh WiFi Enhanced Security Router (up to 1800sqft) Hack Protection w/AI-Intrusion Detection & ESET Malware Protection Smart Mesh WiFi System AC1200
GRYPHON GUARDIAN Advanced Parental Control System & Mesh WiFi Enhanced Security Router (up to 1800sqft) Hack Protection w/AI-Intrusion Detection & ESET Malware Protection Smart Mesh WiFi System AC1200
As a senior network engineer and cybersecurity expert I am exposed to a lot of firewalls/routers/NGFW and UTM appliances. So when I tell you something is great, you can bet it is great! First we will run through the hardware of this device, followed by the setup/configuration of it, then the testing and result of it. Sit back and get ready for the ride!

First things first.. The packaging is great, giving off a real premium feel. The box is so nice I think I want to put it on display. Hardware wise, this is a beast. Far above the most powerful consumer routers.

Gryphon has a Quad Core Arm Cortex A7 processor with 1GB of RAM and 4GB of Flash ram
3000Mbps throughput
3 Radios (2.4 and 2x5.0)
Beamforming and WiFi Priority
Mesh (instant)
Six Antennas

In comparison, a top of the line ASUS RT-AC3200 has a Broadcom BCM4709 dual-core 1GHz processor with 256MB of DDR 3 system memory and 128MB of flash storage. Which is absolutely ANEMIC compared to the Gryphon. Especially considering a Dual Core Broadcom will spike to 100% CPU use on anything over 500Mbps and will struggle to 900Mbps. Contrary to the Gryphon, which can run at wire-speed 1000/1000Mbps without breaking a sweat.

Software: (the basics, more later)
Gryphon runs on LuCI, which is a fork of OpenWRT - highly customized and locked down.
Intrusion Protection isn't signature based, rather it works off traffic anomaly inspection.
Web Filtration is by ESET, and ESET uses licensed zVelo web filtration. (one of the top 5 in the world)
Speed testing of your connection along with Up/Down Status of your WAN
Anti-Spoofing (MAC/ARP), Rogue AP Detection
Vulnerability Scans
Prioritized Device
Extreme Device and Parental Control

Setup is extremely easy and amounts to installing the iOS or Android App then following the instructions. Those instructions are, you register for an account, plug in the router, scan the QR code and the router is paired with your account and app and is ready to be configured. Initial setup from unboxing to an active WiFi signal ready for connection is less than 5 minutes. It should be noted that all of this is conducted over encrypted channels. There are a few things i would like to inform you of regarding setup;

1) You should unplug and fully disconnect your existing router. (with the assumption you have a Modem+Router setup right now)
2) The Gryphon plugs into the ethernet going to your modem.
3) Gryphon defaults to a network, you CAN change this now. (Gateway
4) Gryphon defaults to DNS, you CAN change this.
5) Gryphon allows multiple SSID's and allows you to segregate them by bands.
6) Gryphon has NO configuration via web portal. Hitting the firewall gateway of yields a device (the one you are on) landing page with statistics, and the ability to request access to specific websites you are blocked from.

After setup is completed you'll go into the app and start examining devices connecting to the Gryphon. Each new device connects automatically to the 'Guest' user profile. From there, it's up to you to select the device, label the type of device it is, then assign it to a user group for granular restrictions/control over the device. This is the meat and potatoes of the Gryphon because device assignment largely controls the type of protection a device will have. Some important information about this;

1) Some devices can't be user assigned once you designate the type of device. This is by design. If you pause the internet for a user with 4 devices, you don't want to pause their camera, thermostat or alarm system! So specific, critical devices are outside of the user profile area and designed as 'Things' by Gryphon.
2) Device designation controls the intrusion protection for the device. For example computers have a lot of random activity, so they will be 'softened' for IPS. While your thermostat essentially does the same thing, and the AI/Machine Learning knows what it does, so it has a hardened intrusion protection level. If you assign a computer to a thermostat category you are going to be bombarded with warnings about HTTP/HTTPS activity, open ports, etc.. Don't do this.
3) Device categories are 'somewhat' limited, about 29 different types. But strangely, they are missing some basic types like DVR, Network Switch, Servers and Robotic Vacuums. I would recommend assigning DVR to 'TV' category and vacuums to 'Other' for now. I've notified them of my request to add additional categories for some common devices. Most folks probably won't have an issue here, as every other device is included.

Once you assign each device to a category, and if it applies, to a user group then you can go in and configure the device access at the granular level and this is VERY powerful! Gryphon functions at the application layer, so it can determine application use on the individual device level, and control access to individual applications and when they can be used. For example if you don't want your kids on Snapchat after 10PM at night, you can control this with a simple slider. This is a very powerful system that far outstrips any other router in the world other than SMB/Corporate UTM offerings costings many times more money. We'll go into important points about parental control below;

1) You can control 'Homework' hours. Which means only homework/educational sites can be visited during X to Y hours on a specific device.
2) Actively PAUSE the internet for specific devices, anytime you wish. (and it does NOT use ARP poisoning like Fingbox and others)
3) Schedule internet time of day. On/Off, specific times, etc.
4) Enable safe-search for all search engines, and disable all youtube comments, automatically on all devices!
5) Store browsing history, with a snapshot of each page browsed.
6) Allow/Disallow VPN activity on each device.
7) Control individual application use, when you want and how you want. (No snapchat after 10pm kids!)
8) Click on the 'i' for age groups for more information and what is filtered. Adult 18+ will filter malware+porn only. Unfiltered will filter malware only. Unfiltered isn't clarified on the fact it still filters malware but it does. Toddler is the equivalent of full whitelisting mode. Essentially blocking everything except what you allow. That's a great profile age group for things like servers and limited IoT devices!
9) Blocked sites bring up a portal page, from there your users can 'request' access. Which then sends a screen capture of the page they want access to and the ability for you to one-click allow/deny. Impressive!
10) Users can go to the gateway IP on their device ( and request a laundry list of sites for you to unblock.

Security (my favorite category)

Gryphon is an incredibly secure router/UTM. It's running LuCI on OpenWRT, completely custom designed. All of the common 'hacking' ingress on it are completely closed off. No SSH, no web admin access, no HTTP/HTTPS configuration panel access. No default passwords. No WAN OR LAN facing configuration AT ALL. This in and of itself closes off many thousands of potential attacks and cannot be overstated about why it is important. Your typical home router comes out of the box with a default password and HTTP WAN/LAN access. Your typical home consumer opens it up, plugs it in and leaves all of this alone, and in the process gives even the most basic hacker complete access to their router, home network, and potentially all devices on the home network. So right out of the gate Gryphon is incredibly hacker resistant, there just isn't anything to hack on it. I ran port scans and penetration testing. Gryphon does very well here with full stealth on all service ports right out of the box. Some highlights about security;

1) All ports automatically stealthed.
2) No SSH/Telnet/HTTP/HTTPS admin access (lan or wan) Config is only through app.
3) No default passwords/logins. You setup a strong password for your account on the app, which is paired (encrypted) to the app. Only YOU can access your device, period. End of story.
4) ESET Technology for Web Scanning (HTTP/HTTPS), which is a subset of the powerful zVelo web categorization system.
5) Machine Learning/AI system for device anomalies with the capability to quarantine infected devices.
6) ARP/MAC spoofing detection/blocking.
7) New device control (including default blocking of new devices)
and much more...

With the bullet points out of the way, for security buffs I am going to tell you how to ramp this Gryphon up to new levels, essentially making it UTM-Like in functionality. First, I recommend instead of creating User Profiles, you create DEVICE profiles. This is easy to do, all you need to do is create a user profile for a specific goal you wish to accomplish. For example let's say you want to block some specific devices from ALL internet connectivity, let's say you run cameras with a local DVR or Blue Iris on the network and you DO NOT need your cameras talking to the internet. To accomplish this task with Gryphon all you need to do is create a 'Camera' user profile, assign a device type as 'Computer' to your cameras, move them to the Camera User Profile, then go in and edit the camera profile and pause the internet AND/OR set it to 'Toddler'. Your cameras will never be able to communicate outside of your network or be able to be hacked, or send telemetry to China, etc. This functions as a sort of policy based routing with some level of granular control and I feel is one of the most powerful aspects of Gryphon when configured correctly.

Instead of user categories, I have: Tablets, Phones, Desktops, Laptops, Servers, Cameras. Then I group devices within those categories and assign specific rules/controls to control them on a more granular level. For example my 'Servers' user profile is set to Toddler, then I go for the first day of use, look at the pages the server is trying to access, and whitelist/blacklist based on the activity I want to permit. That way the servers still get windows updates, but can't do things like have ransomware on them dialing out, telemetry from installed applications, etc. This is exceptionally powerful and a largely undisclosed (but major) benefit of Gryphon. The best part, I can do all of this and manage my entire network from my phone laying in bed! Here are some security tips that would likely make the Gryphon one of the most secure routers in the world;

1) Since all devices connect to 'Guest' user profile until you categorize them - I recommend restricting Guest Profile to Toddler and/or setting that profile to be permanently paused. That way it's a full lockdown on all new devices, until you approve those devices individually.
2) I recommend device categories for user profiles over individual users in many cases. This allows you to group all devices, then control them. Servers with limited access out the WAN. Cameras or other junk you might want to totally block from the internet, etc.
3) I recommend setting SCHEDULES for all computers. For example group your computers into a computer user profile, then set a schedule to disable the internet from 2AM-7AM each night. This will reduce your threat surface during off hours and provide additional security.
4) Go into malware protection, and toggle it to 'All Threats'. There is no reason to degrade security in any way.

Bottom line, out of the box this is one of the most secure router in the world. With minor tweaks, it IS the most secure one in the world, probably even above many SMB/Corporate offerings.

Wireless (how good is it?)

REALLY GOOD. My home is quite large, and this device covers all three floors and the entire floor plan with full bars in almost every area. To give you an idea of how good this is, I previously required 3 FortiAP units when I used Fortinet, and when I switched to Ubiquity I required a top of the line Unifi AC-HD Pro unit AND a Mesh Lite unit to cover the home. This unit performs better than any other wireless solution I have tested. Google WiFi, Velop, Orbi, all of them are childrens toys compared to this!

Speed wise, it's 3000Mbps 'total' maximum throughput. Obviously you won't get that if your connection is 300 Mbps, what it means is the absolute maximum from all devices and radios combined will be 3000Mbps. That's throughput on the LAN, WAN, and all three radius. But it does live up to it's potential far better than any other router I have tested - you can trust me on that! Top of the line ASUS routers are nothing but trinkets compared to this. They've really done their homework regarding this system.


No cons to this device at all. But I would recommend they implement a few basic things to take it to the next level. ICMP shouldn't respond from WAN. Even with ports all stealthed I'd like to see ICMP responsed blackholed. Not a huge issue. I'd like to see a 'custom' web filtration category where I can setup custom fields about what to block. A few more device categories would be nice.

In close - this is the best possible router (hybrid UTM) device you can purchase for your home. Period. Bar none. Nothing else comes close. You can toss every other gadget out (Fingbox, Dojo, Norton Sphere, Cujo, etc), they're all basically junk compared to this. This is the only consumer router to get my 100% seal of approval. In fact, for prosumers, you can probably forget about your Sophos and Fortinet's and run with this. You won't be disappointed! Another recommendation to Gryphon Company would be to improve information and FAQ with more detailed question/answers, especially for the Prosumer market. I'd like to see whitepapers, some test results, and maybe technical documentation. Information is a bit too vague IMO, and I have provided more information in my review here than you'll ever find anywhere on Gryphon, and it was done through my own testing/research over a 24 hour period.

Recent posts by Landon Cruz
Message Landon Cruz