Skip to content
Technical Info and Support for Targeted Individuals
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video

Category: Secure Computing

Secure Computing

Home Networking with Fiber Optics

  • Post Author By Targeted Tech Talk
  • Post Date December 30, 2024
Estimated read time 3 min read

One option for your home networking setup would be to use fiber optics connections for some or all of your networking needs.  For targeted individuals [Read More…]

Secure Computing

Avoid Weak Encryption

  • Post Author By Targeted Tech Talk
  • Post Date December 25, 2024
Estimated read time 2 min read

The idea behind encryption is a good one – protecting the integrity and confidentiality of your data. Encryption uses algorithms. The concept of an algorithm [Read More…]

Secure Computing

Best Paid Anti-Malware Programs for Computers and Phones

  • Post Author By Targeted Tech Talk
  • Post Date December 16, 2024
Estimated read time 3 min read

Paid Anti-Malware Programs (which also include anti-virus protection) will provide security features not available with an out of the box computer or phone setup.  You [Read More…]

Secure Computing

USB Data Blockers

  • Post Author By Targeted Tech Talk
  • Post Date November 18, 2024
Estimated read time 1 min read

One useful tool for protecting your phone and your pc is called a USB data blocker. Lets start with a bit of background: USB cables [Read More…]

Secure Computing

The NSA’s ANT Catalog

  • Post Author By Targeted Tech Talk
  • Post Date October 26, 2024
Estimated read time 2 min read

In late 2013 a leaked NSA document was published by the press.  The document originated in the 2008-2009 timeframe and it contains 49 pages of [Read More…]

General Info Secure Computing

Technology Checklist Page Now Available

  • Post Author By Targeted Tech Talk
  • Post Date September 14, 2024
Estimated read time 1 min read

A new site feature is now available, the technology checklist page. This checklist makes it easy to see at a glance a consolidated list that [Read More…]

Secure Computing

The NSA’s Relationships with Private Companies

  • Post Author By Targeted Tech Talk
  • Post Date August 31, 2024
Estimated read time 2 min read

As a targeted individual, it is important to understand some of the fundamental behavior and organization of the NSA which is responsible directly or indirectly [Read More…]

Secure Computing

Drive Encryption Recommendation – VeraCrypt

  • Post Author By Targeted Tech Talk
  • Post Date August 6, 2024
Estimated read time 2 min read

The article below is a good review of file and drive encryption. If you store files on an external drive or have a usb drive [Read More…]

Secure Computing

NSA “Upgrade” Factory Photos

  • Post Author By Targeted Tech Talk
  • Post Date August 3, 2024
Estimated read time 1 min read

In a previous article I recommended that targeted individuals consider purchasing electronics from retail stores. Here is further information to back up that recommendation. The [Read More…]

Secure Computing

Hardware Authentication Keys – Analysis and Top Picks for Targeted Individuals

  • Post Author By Targeted Tech Talk
  • Post Date July 30, 2024
Estimated read time 3 min read

Targeted Individuals should consider the use of a hardware authentication key.  A hardware authentication key is a physical device that looks and functions much like [Read More…]

Posts navigation

← Older Posts
→ Newer Posts

Recent Posts

  • Analysis of GhostTouch Attack
  • Secure Computing Basics EBook and Video
  • Tor versus VPN
  • ESP32 Marauder Demo
  • ESP32 Marauder Build

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

Categories

  • Artificial Intelligence
  • General Info
  • Secure Computing

You May Also Like:

Analysis of GhostTouch Attack
Secure Computing

Analysis of GhostTouch Attack

Posted on September 1, 2025September 2, 2025 by Targeted Tech Talk
Secure Computing Basics EBook and Video
General Info Secure Computing

Secure Computing Basics EBook and Video

Posted on August 17, 2025August 17, 2025 by Targeted Tech Talk
Tor versus VPN
Secure Computing

Tor versus VPN

Posted on August 7, 2025August 7, 2025 by Targeted Tech Talk
ESP32 Marauder Demo
Secure Computing

ESP32 Marauder Demo

Posted on July 30, 2025July 30, 2025 by Targeted Tech Talk
ESP32 Marauder Build
General Info Secure Computing

ESP32 Marauder Build

Posted on July 20, 2025July 21, 2025 by Targeted Tech Talk
File Checksums To Verify File Integrity
General Info Secure Computing

File Checksums To Verify File Integrity

Posted on July 14, 2025July 14, 2025 by Targeted Tech Talk

Email – targetedtechtalk@protonmail.com

Follow @TargetedTechTlk
Scroll to top
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video