Skip to content
Technical Info and Support for Targeted Individuals
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video
Secure Computing

Episode 8 – Types of Cyber Threats

  • Post Author By Targeted Tech Talk
  • Post Date October 15, 2025
Estimated read time 2 min read

This article is also now available as a full video, click the link below to open the video in a new tab: For this episode [Read More…]

Electronics

Episode 7 – Ultrasonic Rangefinder

  • Post Author By Targeted Tech Talk
  • Post Date September 21, 2025
Estimated read time 3 min read

This article is also now available as a full video, click the link below to open the video in a new tab: For today’s presentation [Read More…]

Secure Computing

Analysis of GhostTouch Attack

  • Post Author By Targeted Tech Talk
  • Post Date September 1, 2025
Estimated read time 3 min read

This article is also now available as a full video, click the link below to open the video in a new tab: GhostTouch is a [Read More…]

General Info Secure Computing

Secure Computing Basics EBook and Video

  • Post Author By Targeted Tech Talk
  • Post Date August 17, 2025
Estimated read time 1 min read

This EBook is also available as a special hour-long presentation. Click the links below to open the video in a new tab: The EBooks page [Read More…]

Secure Computing

Tor versus VPN

  • Post Author By Targeted Tech Talk
  • Post Date August 7, 2025
Estimated read time 3 min read

This article is also now available as a full video, click the link below to open the video in a new tab: Once you start [Read More…]

Secure Computing

ESP32 Marauder Demo

  • Post Author By Targeted Tech Talk
  • Post Date July 30, 2025
Estimated read time 2 min read

This article is also now available as a full video, click the link below to open the video in a new tab: In the video [Read More…]

General Info Secure Computing

ESP32 Marauder Build

  • Post Author By Targeted Tech Talk
  • Post Date July 20, 2025
Estimated read time 2 min read

This article is also now available as a full video walkthrough with an example, click the link below to open the video in a new [Read More…]

General Info Secure Computing

File Checksums To Verify File Integrity

  • Post Author By Targeted Tech Talk
  • Post Date July 14, 2025
Estimated read time 2 min read

This article is also now available as a full video walkthrough with an example, click the link below to open the video in a new [Read More…]

Secure Computing

Advantages of Software Sandboxing

  • Post Author By Targeted Tech Talk
  • Post Date June 30, 2025
Estimated read time 2 min read

Software sandboxing is a technical term that describes process of running an application in isolation. This is a nice security feature because it greatly restricts [Read More…]

Artificial Intelligence Secure Computing

Use of Artificial Intelligence in Cybersecurity

  • Post Author By Targeted Tech Talk
  • Post Date June 8, 2025
Estimated read time 2 min read

We have seen an increased use of Artificial Intelligence in the Cybersecurity field and the trend is continuing upwards. Artificial Intelligence can be used in [Read More…]

Posts navigation

← Older Posts

Recent Posts

  • Episode 8 – Types of Cyber Threats
  • Episode 7 – Ultrasonic Rangefinder
  • Analysis of GhostTouch Attack
  • Secure Computing Basics EBook and Video
  • Tor versus VPN

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

Categories

  • Artificial Intelligence
  • Electronics
  • General Info
  • Secure Computing

You May Also Like:

Episode 8 – Types of Cyber Threats
Secure Computing

Episode 8 – Types of Cyber Threats

Posted on October 15, 2025October 15, 2025 by Targeted Tech Talk
Episode 7 – Ultrasonic Rangefinder
Electronics

Episode 7 – Ultrasonic Rangefinder

Posted on September 21, 2025September 21, 2025 by Targeted Tech Talk
Analysis of GhostTouch Attack
Secure Computing

Analysis of GhostTouch Attack

Posted on September 1, 2025September 2, 2025 by Targeted Tech Talk
Secure Computing Basics EBook and Video
General Info Secure Computing

Secure Computing Basics EBook and Video

Posted on August 17, 2025August 17, 2025 by Targeted Tech Talk
Tor versus VPN
Secure Computing

Tor versus VPN

Posted on August 7, 2025August 7, 2025 by Targeted Tech Talk
ESP32 Marauder Demo
Secure Computing

ESP32 Marauder Demo

Posted on July 30, 2025July 30, 2025 by Targeted Tech Talk

Email – targetedtechtalk@protonmail.com

Follow @TargetedTechTlk
Scroll to top
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video