Grow From Conflict

Grow From Conflict

January 10, 2024 263 Comments

Read More

Change in the New Year

January 01, 2024 345 Comments

Each moment is a chance for change and rogues know how to seize it.

Read More

Social Engineering

Social Engineering

July 02, 2020 706 Comments

Read More


So, You Keep Getting Hacked?

So, You Keep Getting Hacked?

June 01, 2020 2447 Comments

Read More

Anatomy Of A Computer Network Attack (CNA) – Part 1

Anatomy Of A Computer Network Attack (CNA) – Part 1

May 27, 2020 64 Comments

Read More

Rogue Skill Sets

Rogue Skill Sets

May 25, 2020 34 Comments

Read More


Stop Using Windows 7!

Stop Using Windows 7!

May 18, 2020 15 Comments

Change is hard, I get it.   Especially when that change gives you the nonsense that was Windows 8, which was also the final straw in converting me into an Apple fan.  Yes, I eventually gave Windows 10 another chance, and I've certainly learned to like it, but I still miss the days of Windows XP and Windows 7 (no one actually remembers Vista).

Read More

Cyber Hacking

Cyber Hacking

May 11, 2020 21 Comments

Read More

Hacking Humans

Hacking Humans

May 05, 2020 17 Comments

What does "hacking humans" even mean?  To put it simply, social engineering, or using verbal judo as Logan likes to call it, to get something you want or need.  Now, this sounds bad, but it isn't always supposed to be nefarious or malicious.  Sure, people have taken it that direction, but social engineering has been around for as long as humans have been around.  Probably even longer.

Read More


Gatorz - Deltas

Gatorz - Deltas

May 04, 2020 31 Comments

As someone who has been wearing Gatorz for  more than a few years and trips around the world I was happy to see a new style from Gatorz that didn’t scream either military issued or drop zone rat.  Don’t get me wrong I love my Wraptors but they definitely stand out as a look of a certain group. Evolution being key to survival Gatorz has done just that with the new Deltas.

Read More

Podcast 002: Zoom Update and Simple Ways to Secure Your Digital World

Podcast 002: Zoom Update and Simple Ways to Secure Your Digital World

April 20, 2020 17 Comments

Read More

Alternatives to Zoom

Alternatives to Zoom

April 13, 2020 14 Comments

First of all, let's talk about end-to-end encryption.  Let's say we have Frank and we have Sally.  Sally opens up her messaging app that supports end-to-end encryption - the app automatically generates a private key and a public key.  Sally's private key is never going to leave her phone, but her public key is stored on a server where it is available to anyone who sends her a message.

Read More



1 2 3 9 Next »