john lund



Photographer John Lund flips his wig in this humorous self portrait and stock photo.
New WorkAbstractAchievementAdultsAdventureAfrican AmericanAgricultureAlternative MedicineAngerAnimal anticsAnimal Stock PhotosAnimal themesAnimalsAnthropomorphicArtificial IntelligenceAsian AmericanAvailable Greeting Card ImagesAviationBackgroundsBalanceBankingBasset HoundBearBig DataBirdsBirthday WishesBizarreBloodhoundBusinessBusiness Stock PhotosCards RPG MarketCardsLTCardsRPGCash FlowCatsChallengeChangeCheetahChihuahuaChildCloud ComputingCommunicationComplexityConceptsConceptual LightsConnectionConservationConstructionContemplationCowsCreativityCrystal Balls And The FutureCyber CrimeDangerDeadlinesDeterminationDogsDronesDroughtEcologyElephantsEmotionEnergyEnvironmentalEnvironmental ArtEthnicExecutivesExerciseFacesFamilyFantasyFat CatsFinanceFine artFishingFitnessFoodFreedomFriendshipFunFunny PicturesGetting Away From It AllGlobal BusinessGlobal CommunicationsGolden RetrieverGreenGreeting CardsGuidanceHackerHairHandshakeHappyHealthHispanicHolistic MedicineHomeHome BusinessHome ImprovementHopeHorsesHumorIdeasIndustryInfinityInformationInnovationInspirationIntenseInternationalInternetInvestmentJourneyLeisureLifestyleLighthousesLionsLoveManMedicalMoneyMotionNetworkingObstaclePeoplePicturePiggy BankPigsPoliticsPortraitPossibilityPowerRiskRoadsRomanceSavingsScenicScienceSecurityServiceSkillSmall BusinessSocial MediaSocial NetworkingSolitudeSpaceSpeedSpiritualSportsStanding Out From The CrowdStephanie D. RoeserStock PhotosStormsStrengthStrong WomenSuccessSumoTeamWorkTechnologyTerrierThe Way ForwardTigersTimeTogethernessTranquilityTravelVacationsVideosVisionVitalityWaterWeatherWhippetWirelessWomenYemen
Stock Photo ArticleCreating A Conceptual/Fine Art Stock Photo with Adobe PhotoshopPicture of the Devil - Creating a Stock PhotoFire Breathing DragonsConceptual Stock Photography - Sell Stock PhotosShooting People and Location Stock Photos AbroadRoyalty Free - Rights Managed - Micro Stock - Stock Photography PricingHindu Gods - The Hindu God Ganesha - Picture and StoryStock Photos…the Highest Form of Commercial PhotographyPictures of Dog Breeds - Shooting Stock Photos of Miniature PoodlesDominatrix Pictures - Photo Shoot and PhotoshopFemale Photography - Photographing the Human BodyPicture of a Wrecking Ball Produced with Adobe Photoshop ToolsPictures of Cows - Being Creative Taking Pictures of a CowPictures of Lions - The King of BeastsTaking Pictures of the Great Wall of ChinaShooting Stock Photos in the Himalayas – A Travel Adventure Photo-ShootPictures of Snakes - Taking Stock Photos in Mumbai, IndiaGetting Started in Stock Photography: Choosing Your Stock Photo Equipment CorrectlyStock Photos - Selling and Marketing Your Stock Photo ImagesPictures of Money - Lots of Different Kinds of Money PicturesUsing Sailboat Stock Image and PhotoShop to Make a Unique New Hot Stock PhotoSelling Your Photos as Greeting CardsFunny Monkey Pictures - Stock Photos and Pictures of Monkeys or BaboonsTiger Pictures - Shooting a Tiger for StockStarting a Stock Photo CareerFilling Small Business Needs in Stock PhotographyCreating Stock Photos with Strategic AlliancesPhotography Tips from a Pro on Shooting in Low LightThe Power of PositiveFunny Pictures - Funny Pics of Animals and PeopleBumbles, Blunders and Bad Luck!Crowd sourcing, Micro Stock and MoneyCreating a Conceptual Photo ImageThe (Information) Road to Stock Photography SuccessUse Your Photo Shoot Estimate as a Selling ToolHow to Generate Effective Ideas for Stock PhotosBlend Images - A Modern Day Stock Agency Photo Success StoryTaking Pictures of Backgrounds For Producing Great Stock PhotosHow to Shoot Successful Lifestyle Stock PhotosDiversify Your Stock Photo Business - Selling Photos on Mugs, T Shirts, and Printed Merchandise!Beginner Photography Tips - Understanding the Role of ApertureFive Quick Tips For Great Pet PhotographyTurning Doctor Visits Into Hot Selling Medical Stock PhotosSelling Stock Photos to the Largest Market of AllCreating A Successful Concept Stock PhotoChoosing the Right Stock Photo for Your Small BusinessMaking A Living At Stock PhotographyChoosing the Right Concept Stock Photo For Your BusinessHandshake Pictures and Images in Advertising and Business CommunicationsBeautiful and unusual Pictures of Lighthouses and Lighthouse Images with Beacons and Stormy SeasAnimal AnticsMotion FootageMassage Cats ArticleJohn's Galleries of unique stock picturesJohn's Stock Photo ArticlesFunny Pictures Of AnimalsPictures of Cute Cats Doing Funny ThingsFunny Pictures of Elephants Doing Extraordinary Things! Flying elephants, Disco ElephantsFunny Animals - Pictures of funny animals like cats, dogs, cows, and MoreFunny Dogs - Cute Puppies - Cute Dog Pictures - The Funniest Pictures on the Net.

Picture of binary numbers pour out of a bank vault illustrating themes of data protection, identity theft and internet security.An office worker recoils in horror as a multitude of hands reach out of his computer display towards him showing cyber security issues and spam problems.A pair of evil looking eyes peer out of a barely opened laptop computer in this photo-illustration of cyber crime and hackers.Picture of a cyber criminal wearing a ski mask and forming from pixels in an illustration of cybercrime, computer hacking and corporate espionage.A worried looking woman sits in front of a computer monitor in her office concerned with online security when she sees the screen filled with eyeballs.Cyber Warfare and video game play in the workplace are illustrated in this photo of a war tank and an explosion coming out of a computer display in an office cubicle.A computer hacker peers out from the circuitry of a computer mother board in a photo illustrating cyber crime and Internet threats.A computer monitor shows a bomb, fuse burning, created out of a circuit board in an image depicting cyber terrorism, hacking, computer viruses, computer worms and computer problems.A woman holds a stool in one hand and a whip in the other as she plays lion trainer in taming a dangerous computer.Computer circuitry serves as a face in a hoodie which is in an upscale corporate environment symbolizing corporate hacking and computer crime.A horrified woman holds a computer tablet from which tentacles are emerging and grasping for her in a picture about computer problems, malware and spam.

Hackers, Cyber Crime And Online Security


As more and more products and services are created to fight online criminal activity, Internet scams and hacking threats, the need for visual representations of cyber crime also blossoms.


Hackers, Cyber Crime And Online Security

Computer hacking and cyber crime have reached epidemic proportions. Businesses and individuals alike are scrambling to secure their online assets against cyber crime, identity theft and malicious hacking. The threats include malware, computer viruses, Trojan horses and spam proliferation. As we become ever more dependent on our online connections the threat from online criminals is exploding to the point where none of us can afford to be complacent.

Internet Scams And Hacking Threats

As more and more products and services are created to fight online criminal activity, Internet scams and hacking threats, the need for visual representations of cyber crime also blossoms. One of my goals for my photography business is to provide elegant solutions to the need for illustrations of concepts that include the territory of hacking, online threats and all manner of cyber crime. Whether the answer to a computer security challenge lies in firewalls, passwords, virus detection software or hard drive cleansing programs, I want to provide the photos to help advertise and promote the solutions to online adversity.

Threats To Business Productivity

The threat to business productivity goes beyond hacking and intellectual property theft, gaming, especially online multiple-party gaming also takes its toll on small and large businesses alike. The network threats are multiplying as well. Nation states are actually employing weapons like the Stuxnet worm. “Hacktivists” are fighting perceived threats to the environment by defeating encryption programs, criminal entrepreneurs go on “phishing” expeditions, and cyberpunks are creating havoc and mayhem for fun and their egos. Predators range from  “Nigerian Princes” scamming the unwary to state sponsored cyber terrorists using nano-virus weapons. Whether the threat lies in a teen ager hacking in through a back door, employees wasting time on computer games, or sophisticated insertions of Trojan horses and other viruses, we can offer compelling and impactful pictures to grab a viewer’s attention.

Mobile Device “bombs” And Computer Criminals

We even have photographic illustrations of mobile-device “bombs” and laptops both at home and in the workplace that are being used as portals for computer criminals. Need a faceless “hoodie” adorned hacker in a corporate office? We have it. Need an illustration of spyware in the office? We have that too. We have hackers embedded in circuitry, security devices in the “cloud”, and war games exploding out of a computer display in an office cubicle. Creating illustrations of cyber-crime in the cloud (online computing) is another daunting proposition, but one I have covered. We have pioneered in the effort of creating visually striking imagery illustrating cloud computing. So whether it is a teen-aged hacker emerging from a display, a bank vault door protecting online assets, or streaming data being penetrated by unwanted intruders, we have you covered!

Photo Libraries And conceptual Imagery

If you need a custom illustration for a product or service that you need visual representation for we would be happy to undertake your project. We have a vast library of photo resources from which to draw and as much experience as anyone alive at creating conceptual imagery using Photoshop (I first started using Photoshop commercially in 1990).  All of the models used in our imagery have signed model releases and our files are large enough to make billboards from, so when it comes to picturing computer and cyber crime, identity theft, corporate spying and all the associated online threats, we may well prove to be the answer.