Skip to content
Technical Info and Support for Targeted Individuals
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video

Category: Secure Computing

Secure Computing

Enable The Secure Boot Feature to Block Rootkits and Malware

  • Post Author By Targeted Tech Talk
  • Post Date May 4, 2025
Estimated read time 2 min read

Most computers purchased within the last few years have the capability to support a feature called Secure Boot. When enabled, Secure Boot will help protect [Read More…]

Secure Computing

Steganography – Messages Hidden Inside of Files

  • Post Author By Targeted Tech Talk
  • Post Date April 21, 2025
Estimated read time 2 min read

In this article I will walk through an example of Steganography, which is the ability to hide messages or other content inside of files. This [Read More…]

Secure Computing

Free Online File Scanning With VirusTotal

  • Post Author By Targeted Tech Talk
  • Post Date April 14, 2025
Estimated read time 2 min read

A very useful website for validating both individual files and website links is a website called VirusTotal.com This is a free site and you can [Read More…]

Secure Computing

Tails Operating System for Increased Online Privacy and Security

  • Post Author By Targeted Tech Talk
  • Post Date April 6, 2025
Estimated read time 2 min read

Tails is a Linux based operating system designed to boot from a USB drive or DVD. It is available for free and includes many good [Read More…]

Secure Computing

Check The Reputation of Websites and IP Addresses

  • Post Author By Targeted Tech Talk
  • Post Date March 23, 2025
Estimated read time 2 min read

Sometimes you will come across a website or an IP address and you may want to check to see if it is legitimate or not. [Read More…]

Secure Computing

Wire – End To End Encrypted Messaging App

  • Post Author By Targeted Tech Talk
  • Post Date March 3, 2025
Estimated read time 1 min read

SMS messaging (text messaging) on phones is not considered secure because it is not end to end encrypted. This means that your phone carrier and [Read More…]

Secure Computing

PC’s Can Be Remotely Powered On With Wake-On-Lan

  • Post Author By Targeted Tech Talk
  • Post Date February 3, 2025
Estimated read time 2 min read

In this article, I would like to highlight a technology found in many corporate environments that most people are not aware of called Wake-On-Lan. It [Read More…]

Secure Computing

LoRa Secure Off-Grid Communication

  • Post Author By Targeted Tech Talk
  • Post Date January 27, 2025
Estimated read time 3 min read

An interesting technology to take note of is called LoRa (short for Long Range). This technology allows one device to communicate with another device in [Read More…]

Secure Computing

OPNSense for Home Network Firewall and Routing

  • Post Author By Targeted Tech Talk
  • Post Date January 20, 2025
Estimated read time 4 min read

My top recommendation for securing your home network (after turning off wireless services such as WiFi and Bluetooth and going with an ethernet setup) would [Read More…]

Secure Computing

Malicious USB Cable and Detector

  • Post Author By Targeted Tech Talk
  • Post Date January 15, 2025
Estimated read time 2 min read

In a prior article, I provided some detail on the NSA’s ANT catalog which included a wide range of hardware and software hacks. Some of [Read More…]

Posts navigation

← Older Posts
→ Newer Posts

Recent Posts

  • Analysis of GhostTouch Attack
  • Secure Computing Basics EBook and Video
  • Tor versus VPN
  • ESP32 Marauder Demo
  • ESP32 Marauder Build

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

Categories

  • Artificial Intelligence
  • General Info
  • Secure Computing

You May Also Like:

Analysis of GhostTouch Attack
Secure Computing

Analysis of GhostTouch Attack

Posted on September 1, 2025September 2, 2025 by Targeted Tech Talk
Secure Computing Basics EBook and Video
General Info Secure Computing

Secure Computing Basics EBook and Video

Posted on August 17, 2025August 17, 2025 by Targeted Tech Talk
Tor versus VPN
Secure Computing

Tor versus VPN

Posted on August 7, 2025August 7, 2025 by Targeted Tech Talk
ESP32 Marauder Demo
Secure Computing

ESP32 Marauder Demo

Posted on July 30, 2025July 30, 2025 by Targeted Tech Talk
ESP32 Marauder Build
General Info Secure Computing

ESP32 Marauder Build

Posted on July 20, 2025July 21, 2025 by Targeted Tech Talk
File Checksums To Verify File Integrity
General Info Secure Computing

File Checksums To Verify File Integrity

Posted on July 14, 2025July 14, 2025 by Targeted Tech Talk

Email – targetedtechtalk@protonmail.com

Follow @TargetedTechTlk
Scroll to top
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video