Blog Archives

The Prepper’s Tablet Computer

When you imagine the archetypal Walking Dead or Hurricane Katrina type disaster scenario, creatures of comfort like us may find the thought of our electronic gadgets being rendered useless utterly terrifying (or liberating). Hardware and software used to send, store, and

Tagged with: , , , , , , , , , , ,
Posted in Cybersecurity, Equipment Testing, Preparedness

Child Robbed for his iPad

Good work on the deli owner’s part for stopping this POS. It is astounding that the robber had over 60 arrests on his record and was  STILL out on the streets. Lessons: It doesn’t matter how old you are, avoid

Tagged with: , , ,
Posted in Awareness, Child Safety

Computer Security Tips for Parents

If you want to keep tabs on who your son or daughter talks to on the Internet, there are steps you can take as a parent. COMPUTER SECURITY TIPS FOR PARENTS Put in place a required BIOS Password for the

Tagged with: , , , , , , , , ,
Posted in Cybersecurity

Safe Gun Storage and Home Risk Scenarios

Today we are going to go over scenarios that involve the human interaction element of safe gun storage and “nightmare scenarios” concerning safe storage. “The monster in my house” One thing to remember about the Sandy Hook Elementary School massacre is

Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Awareness, Gun Safety

Check out TAILS

For those who are really concerned about their internet privacy, give this a try. It is a LiveCD system that routes everything through the TOR network. https://tails.boum.org/ Download the .iso Right click and burn it to DVD using Windows Disc

Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Cybersecurity