Skip to content
Technical Info and Support for Targeted Individuals
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video

Category: General Info

General Info Secure Computing

Secure Computing Basics EBook and Video

  • Post Author By Targeted Tech Talk
  • Post Date August 17, 2025
Estimated read time 1 min read

This EBook is also available as a special hour-long presentation. Click the links below to open the video in a new tab: The EBooks page [Read More…]

General Info Secure Computing

ESP32 Marauder Build

  • Post Author By Targeted Tech Talk
  • Post Date July 20, 2025
Estimated read time 2 min read

This article is also now available as a full video walkthrough with an example, click the link below to open the video in a new [Read More…]

General Info Secure Computing

File Checksums To Verify File Integrity

  • Post Author By Targeted Tech Talk
  • Post Date July 14, 2025
Estimated read time 2 min read

This article is also now available as a full video walkthrough with an example, click the link below to open the video in a new [Read More…]

General Info Secure Computing

Windows System File Checker Utility

  • Post Author By Targeted Tech Talk
  • Post Date May 12, 2025
Estimated read time 2 min read

When windows system files are missing or corrupted, this can often lead to windows not functioning correctly or even crashing entirely. This is also a [Read More…]

General Info

In-Q-Tel, Venture Capital Fund for CIA, NSA, DHS Technology Research

  • Post Author By Targeted Tech Talk
  • Post Date March 16, 2025
Estimated read time 1 min read

In 1999 The CIA formed a large taxpayer funded venture capital fund currently called In-Q-Tel. The purpose of this fund is to make technology investments [Read More…]

General Info

Guide To Purchasing a Budget Laptop or Desktop

  • Post Author By Targeted Tech Talk
  • Post Date February 24, 2025
Estimated read time 3 min read

This article provides some tips for getting a computer or laptop when you have a limited budget. You can find a number of used or [Read More…]

General Info

LibreOffice – Free Open-Source Office Suite

  • Post Author By Targeted Tech Talk
  • Post Date February 17, 2025
Estimated read time 1 min read

I would like to recommend one free open-source software package. It is called LibreOffice. It includes the following: It is a free download available on [Read More…]

General Info

How the CIA looks you up online

  • Post Author By Targeted Tech Talk
  • Post Date October 8, 2024
Estimated read time 2 min read

In his 2019 autobiography, Edward Snowden shared some details from his time working at the CIA. One of these details was the process by which [Read More…]

General Info

Protect your Credit Cards With RFID Shielded Wallets

  • Post Author By Targeted Tech Talk
  • Post Date September 20, 2024
Estimated read time 2 min read

Almost all credit cards now include a chip that allows for ‘tap to pay’ functionality, the ability to wave your card over a sensor to [Read More…]

General Info Secure Computing

Technology Checklist Page Now Available

  • Post Author By Targeted Tech Talk
  • Post Date September 14, 2024
Estimated read time 1 min read

A new site feature is now available, the technology checklist page. This checklist makes it easy to see at a glance a consolidated list that [Read More…]

Posts navigation

← Older Posts

Recent Posts

  • Secure Computing Basics EBook and Video
  • Tor versus VPN
  • ESP32 Marauder Demo
  • ESP32 Marauder Build
  • File Checksums To Verify File Integrity

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

Categories

  • Artificial Intelligence
  • General Info
  • Secure Computing

You May Also Like:

Secure Computing Basics EBook and Video
General Info Secure Computing

Secure Computing Basics EBook and Video

Posted on August 17, 2025August 17, 2025 by Targeted Tech Talk
Tor versus VPN
Secure Computing

Tor versus VPN

Posted on August 7, 2025August 7, 2025 by Targeted Tech Talk
ESP32 Marauder Demo
Secure Computing

ESP32 Marauder Demo

Posted on July 30, 2025July 30, 2025 by Targeted Tech Talk
ESP32 Marauder Build
General Info Secure Computing

ESP32 Marauder Build

Posted on July 20, 2025July 21, 2025 by Targeted Tech Talk
File Checksums To Verify File Integrity
General Info Secure Computing

File Checksums To Verify File Integrity

Posted on July 14, 2025July 14, 2025 by Targeted Tech Talk
Advantages of Software Sandboxing
Secure Computing

Advantages of Software Sandboxing

Posted on June 30, 2025June 30, 2025 by Targeted Tech Talk

Email – targetedtechtalk@protonmail.com

Follow @TargetedTechTlk
Scroll to top
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video