Red Blog Cyber Setting up to leave the back door open. Following on with our previous blog (so you want to be a hacker) So you want to be a hacker? Now it’s time to create a profile on your target in order to create an explot to compromise their systems. This stage could be […]
Who’s watching the watchers? Personal and physical identity are both at risk from criminals as well as companies that we trust. From identity theft to the selling of Personal data every time we are going about our lives someone is trying to gather information about us, this could be for criminal purposes such as stealing […]
So turn on some dark cyber techno grab yourself a jolt cola and tap into the matrix Guy Fawkes masks are optional. First things first what is a hacker? According to Wikipedia. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.Hackers may be motivated by a multitude of reasons, such as […]
The Red Blog Escape a moving vehicle. Kidnapping and abductions are a scary ordeal to find yourself in. Yet they are on the rise putting you, your family members, and just about anyone at greater risk of being abducted. Fighting back against an assailant is risky and could lead to injury. However, there comes a […]
Cyber Security Professionals Tool Kit By using a tool called Nmap a Linux utility normally used by cyber security professionals from the tool kit of kali linux, we are able to scan the network and locate any abnormal traffic or unprotected ports. Nmap provides a number of features for probing computer networks, including host discovery […]
When it comes to your Bugging Out and Disaster Prepping, you always need a Plan B (and ideally a Plan C, D, etc.). This applies to your Bug Out Vehicle as well. For example: • Plan A: You use your 4WD SUV as your bug out vehicle because you already use it as your everyday vehicle […]
In light of current threats and global escalation into possible world war or risk from global totalitarian control from governments big tech and pharmaceutical companies the geopolitical landscape for information freedom and how we use it has blurred into a very grey area. Ukraine appealed for a global army of IT experts to help in […]
The Red Blog Upgrade your carry options (EDC) or every-day carry is a collection of useful items that are consistently carried on person every day. The main reasons for having EDC are utility and preparedness; to help individuals overcome simple everyday problems, including possible emergency situations. This being said most of us already have an […]
Having a strong and secure presence with your IT infrastructure and Internet usage is a must not only to reduce the risk from hacker’s and cyber crime, it also helps reduce unwanted spam and other data tracking information used to overwhelm you with useless advertising. So what can we do to strengthen our security presence? […]
Well, understanding body language is a great skill set to know, it will take years to perfect with all the subtle micro-expressions. However, there are a few things that everyone can learn to read people like a book. Visit the main site When we are put under pressure or forced to think on our feet […]