In the book "125 Ways to Protect Your Personal Computer Short & Simple", the first page explicitly says "written by Gregory D. Evans" and credits William Fisher as "Co-author & Editor". This is notable as Evans has claimed that other plagiarized content was not his doing as he never claimed to write the content, only collect it. In "125 Ways ..", Evans provides 127 sections for protecting your computer. Extremely disjointed and repetitive in places (e.g., 1, 5, 7, 127 all deal with strong passwords), the book does not number the pages. The first edition is dated December 1, 2005 and contains a variety of material published by others between 2002 and 2005.
The following table details the portions of the book that were taken from other sources, making up 68% of the material. Information is included to distinguish not only plagiarized material, but also what was done in an attempt to obscure the original source (e.g., removing text or credit). This shows willful infringement of copyright and inexcusable plagiarism.
Due to time constraints, the first 25 out of 125 sections (most being one paragraph) were examined briefly via Google searches. 17 of the 25 sections checked were clearly plagiarized. A few sections could not be located via Google, but simply do not read as if Evans wrote them. They may be taken from print publications or other sources that have not been archived by Google. At least four sections appear to be written by Evans, based on the poor grammar and general style demonstrated by Evans over the years. For example:
|1. Making a Password||Entire section||Computer Mommy: FAQ (2002)|
|3. How to lock your computer||Entire section||rond36 comment to majorgeeks forum (2003)|
|4. To protect your files by using a screen saver password||Entire section||Mr.DLucy comment in Corsair support forum (2002)|
|5. Help protect your passwords||Entire section, slight alteration (e.g., 50 days -> 60 to 90 days)||Tips on How to Protect Your Computer and Online Passwords (2002)|
|6. To create a password reset disk||Entire section, slight changes (e.g., injecting "click Start" as a step)||Microsoft: To create a password reset disk|
|7. Use strong passwords.||Entire section||Microsoft: Use strong passwords|
|8. Don't enable the save password option.||Entire section||Microsoft: Don't enable the Save Password option|
|10. Use password protection on your screensaver||Entire section (even copying a grammatical error: "longer than you unexpected")||Microsoft: Use password protection on your screensaver|
|11. Protect your passwords.||Entire section||10 Ways to Protect your Data (2004-2005)|
|13. Protect against Spyware and Adware||Entire section||Is Your PC Affected by Spyware [DOC] (May, 2005)|
|19. Spyware Fighting Tools||Entire section||PC Mag: Anti-Malware Security (Nov, 2005)|
|20. Close Your Network (If Possible)||Entire section||Wi-Fi Alliance Five Steps to Creating a Wireless Network [PDF] (Dec 9, 2005)|
|21. Change Your Network Name||Entire section||Wi-Fi Alliance Five Steps to Creating a Wireless Network [PDF] (Dec 9, 2005)|
|22. Use a VPN (Virtual Private Network)||Entire section||Wi-Fi Alliance Five Steps to Creating a Wireless Network [PDF] (Dec 9, 2005)|
|23. Deploy WPA (Wi-Fi Protected Access) or WPA2||Entire section||Wi-Fi Alliance Five Steps to Creating a Wireless Network [PDF] (Dec 9, 2005)|
|24. Use MAC Control Tables||Entire section||Wi-Fi Alliance Five Steps to Creating a Wireless Network [PDF] (Dec 9, 2005)|
|25. Ban wireless networks that don't meet tough security policy||Entire section, small re-writes||Hardening Windows Systems by Roberta Bragg (2004)|
Note: While sections 20 - 25 were found in a PDF dated December 9, 2005, and the first edition is listed as December 1, 2005, we do not believe that the Wi-Fi Alliance plagiarized content from Evans.