Following on from our previous blog (So You Want To Be A Hacker) By now we would expect that you know what skills and qualifications are required to become a cyber security specialist. So now we need to equip ourselves with the right tools and know what they are and how to use them. In […]
Cyber Security Professionals Tool Kit By using a tool called Nmap a Linux utility normally used by cyber security professionals from the tool kit of kali linux, we are able to scan the network and locate any abnormal traffic or unprotected ports. Nmap provides a number of features for probing computer networks, including host discovery […]
When it comes to your Bugging Out and Disaster Prepping, you always need a Plan B (and ideally a Plan C, D, etc.). This applies to your Bug Out Vehicle as well. For example: • Plan A: You use your 4WD SUV as your bug out vehicle because you already use it as your everyday vehicle […]
Having a strong and secure presence with your IT infrastructure and Internet usage is a must not only to reduce the risk from hacker’s and cyber crime, it also helps reduce unwanted spam and other data tracking information used to overwhelm you with useless advertising. So what can we do to strengthen our security presence? […]
Well, understanding body language is a great skill set to know, it will take years to perfect with all the subtle micro-expressions. However, there are a few things that everyone can learn to read people like a book. Visit the main site When we are put under pressure or forced to think on our feet […]
So what is phishing? the fraudulent practice of sending emails pretending to be from reputable companies containing dangerous malware reveal personal information, such as passwords and credit card numbers. “an email that is likely a phishing scam” This may look like a legitimate message from say PayPal or Amazon ect asking you to secure your […]
Red Blog Cyber Systems down Distributed Denial of Service Distributed denial of service (DDoS) attacks are a very big deal for any business infrastructure, small business e-commerce and private home network as they can stop your system dead in its tracks. A DDoS attack involves multiple connected online devices, or software collectively known as a […]
Ukraine accepts DOT, founder Gavin Wood donates $5.8million The official Ukraine crypto wallets are now accepting donations from the Polkadot (DOT) ecosystem; cofounder Gavin Wood has donated $5.8 million or 298,367 DOT. Calls from the crypto community for Ukraine to accept other cryptocurrencies have been answered. The official Ukraine Twitter account shared that it will […]
Let’s talk about Bugout vehicles Before we proceed further. Let’s be realistic, when the hits the fan, the best vehicle to use is the one you already have, be it work vehicle or your little rust bucket. That being said here are some useful things to consider when putting together a Bugout vehicle. Space: […]
Tha Red Blog Time to Bugout, War may be comming! A Bug Out Bag List is Not One Size Fits All In fact, any supplies that you are planning to use must be carefully put together with the following in mind. • What are you planning for? Will you be needing to use this in […]