Electronics Episode 9 – GPS Satellite Tracker Post Author By Targeted Tech Talk Post Date October 26, 2025 Estimated read time 4 min read This article is also now available as a full video, click the link below to open the video in a new tab: For today’s presentation [Read More…]
Secure Computing Episode 8 – Types of Cyber Threats Post Author By Targeted Tech Talk Post Date October 15, 2025 Estimated read time 2 min read This article is also now available as a full video, click the link below to open the video in a new tab: For this episode [Read More…]
Electronics Episode 7 – Ultrasonic Rangefinder Post Author By Targeted Tech Talk Post Date September 21, 2025 Estimated read time 3 min read This article is also now available as a full video, click the link below to open the video in a new tab: For today’s presentation [Read More…]
Secure Computing Analysis of GhostTouch Attack Post Author By Targeted Tech Talk Post Date September 1, 2025 Estimated read time 3 min read This article is also now available as a full video, click the link below to open the video in a new tab: GhostTouch is a [Read More…]
General Info Secure Computing Secure Computing Basics EBook and Video Post Author By Targeted Tech Talk Post Date August 17, 2025 Estimated read time 1 min read This EBook is also available as a special hour-long presentation. Click the links below to open the video in a new tab: The EBooks page [Read More…]
Secure Computing Tor versus VPN Post Author By Targeted Tech Talk Post Date August 7, 2025 Estimated read time 3 min read This article is also now available as a full video, click the link below to open the video in a new tab: Once you start [Read More…]
Secure Computing ESP32 Marauder Demo Post Author By Targeted Tech Talk Post Date July 30, 2025 Estimated read time 2 min read This article is also now available as a full video, click the link below to open the video in a new tab: In the video [Read More…]
General Info Secure Computing ESP32 Marauder Build Post Author By Targeted Tech Talk Post Date July 20, 2025 Estimated read time 2 min read This article is also now available as a full video walkthrough with an example, click the link below to open the video in a new [Read More…]
General Info Secure Computing File Checksums To Verify File Integrity Post Author By Targeted Tech Talk Post Date July 14, 2025 Estimated read time 2 min read This article is also now available as a full video walkthrough with an example, click the link below to open the video in a new [Read More…]
Secure Computing Advantages of Software Sandboxing Post Author By Targeted Tech Talk Post Date June 30, 2025 Estimated read time 2 min read Software sandboxing is a technical term that describes process of running an application in isolation. This is a nice security feature because it greatly restricts [Read More…]
Electronics Episode 9 – GPS Satellite Tracker Posted on October 26, 2025October 26, 2025 by Targeted Tech Talk
Secure Computing Episode 8 – Types of Cyber Threats Posted on October 15, 2025October 15, 2025 by Targeted Tech Talk
Electronics Episode 7 – Ultrasonic Rangefinder Posted on September 21, 2025September 21, 2025 by Targeted Tech Talk
Secure Computing Analysis of GhostTouch Attack Posted on September 1, 2025September 2, 2025 by Targeted Tech Talk
General Info Secure Computing Secure Computing Basics EBook and Video Posted on August 17, 2025August 17, 2025 by Targeted Tech Talk