Following on from our previous blog (So You Want To Be A Hacker) By now we would expect that you know what skills and qualifications are required to become a cyber security specialist. So now we need to equip ourselves with the right tools and know what they are and how to use them. In […]
Here are 20 vital tips for staying safe in hotels, motels and hostels across the world. 1. Do your research plan ahead. What kind of crime is common in the area? Is there a terrorist threat? Are tourists and women frequent targets? Knowledge is power, Know the full extent of your situation before diving in, […]
Red Blog Cyber Setting up to leave the back door open. Following on with our previous blog (so you want to be a hacker) So you want to be a hacker? Now it’s time to create a profile on your target in order to create an explot to compromise their systems. This stage could be […]
Who’s watching the watchers? Personal and physical identity are both at risk from criminals as well as companies that we trust. From identity theft to the selling of Personal data every time we are going about our lives someone is trying to gather information about us, this could be for criminal purposes such as stealing […]
So turn on some dark cyber techno grab yourself a jolt cola and tap into the matrix Guy Fawkes masks are optional. First things first what is a hacker? According to Wikipedia. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.Hackers may be motivated by a multitude of reasons, such as […]
The Red Blog Escape a moving vehicle. Kidnapping and abductions are a scary ordeal to find yourself in. Yet they are on the rise putting you, your family members, and just about anyone at greater risk of being abducted. Fighting back against an assailant is risky and could lead to injury. However, there comes a […]
Cyber Security Professionals Tool Kit By using a tool called Nmap a Linux utility normally used by cyber security professionals from the tool kit of kali linux, we are able to scan the network and locate any abnormal traffic or unprotected ports. Nmap provides a number of features for probing computer networks, including host discovery […]
When it comes to your Bugging Out and Disaster Prepping, you always need a Plan B (and ideally a Plan C, D, etc.). This applies to your Bug Out Vehicle as well. For example: • Plan A: You use your 4WD SUV as your bug out vehicle because you already use it as your everyday vehicle […]
In light of current threats and global escalation into possible world war or risk from global totalitarian control from governments big tech and pharmaceutical companies the geopolitical landscape for information freedom and how we use it has blurred into a very grey area. Ukraine appealed for a global army of IT experts to help in […]
The Red Blog Upgrade your carry options (EDC) or every-day carry is a collection of useful items that are consistently carried on person every day. The main reasons for having EDC are utility and preparedness; to help individuals overcome simple everyday problems, including possible emergency situations. This being said most of us already have an […]