Skip to content
Technical Info and Support for Targeted Individuals
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video
Secure Computing

LoRa Secure Off-Grid Communication

  • Post Author By Targeted Tech Talk
  • Post Date January 27, 2025
Estimated read time 3 min read

An interesting technology to take note of is called LoRa (short for Long Range). This technology allows one device to communicate with another device in [Read More…]

Secure Computing

OPNSense for Home Network Firewall and Routing

  • Post Author By Targeted Tech Talk
  • Post Date January 20, 2025
Estimated read time 4 min read

My top recommendation for securing your home network (after turning off wireless services such as WiFi and Bluetooth and going with an ethernet setup) would [Read More…]

Secure Computing

Malicious USB Cable and Detector

  • Post Author By Targeted Tech Talk
  • Post Date January 15, 2025
Estimated read time 2 min read

In a prior article, I provided some detail on the NSA’s ANT catalog which included a wide range of hardware and software hacks. Some of [Read More…]

Artificial Intelligence

AI Corner – Pretrained Models

  • Post Author By Targeted Tech Talk
  • Post Date January 6, 2025
Estimated read time 2 min read

I think that it’s important to introduce some AI concepts and terms so discussions of AI can be more informed. Using the correct terminology and [Read More…]

Secure Computing

Home Networking with Fiber Optics

  • Post Author By Targeted Tech Talk
  • Post Date December 30, 2024
Estimated read time 3 min read

One option for your home networking setup would be to use fiber optics connections for some or all of your networking needs.  For targeted individuals [Read More…]

Secure Computing

Avoid Weak Encryption

  • Post Author By Targeted Tech Talk
  • Post Date December 25, 2024
Estimated read time 2 min read

The idea behind encryption is a good one – protecting the integrity and confidentiality of your data. Encryption uses algorithms. The concept of an algorithm [Read More…]

Secure Computing

Best Paid Anti-Malware Programs for Computers and Phones

  • Post Author By Targeted Tech Talk
  • Post Date December 16, 2024
Estimated read time 3 min read

Paid Anti-Malware Programs (which also include anti-virus protection) will provide security features not available with an out of the box computer or phone setup.  You [Read More…]

Secure Computing

USB Data Blockers

  • Post Author By Targeted Tech Talk
  • Post Date November 18, 2024
Estimated read time 1 min read

One useful tool for protecting your phone and your pc is called a USB data blocker. Lets start with a bit of background: USB cables [Read More…]

Secure Computing

The NSA’s ANT Catalog

  • Post Author By Targeted Tech Talk
  • Post Date October 26, 2024
Estimated read time 2 min read

In late 2013 a leaked NSA document was published by the press.  The document originated in the 2008-2009 timeframe and it contains 49 pages of [Read More…]

General Info

How the CIA looks you up online

  • Post Author By Targeted Tech Talk
  • Post Date October 8, 2024
Estimated read time 2 min read

In his 2019 autobiography, Edward Snowden shared some details from his time working at the CIA. One of these details was the process by which [Read More…]

Posts navigation

← Older Posts
→ Newer Posts

Recent Posts

  • Enable The Secure Boot Feature to Block Rootkits and Malware
  • Steganography – Messages Hidden Inside of Files
  • Free Online File Scanning With VirusTotal
  • Tails Operating System for Increased Online Privacy and Security
  • Check The Reputation of Websites and IP Addresses

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

Categories

  • Artificial Intelligence
  • General Info
  • Secure Computing

You May Also Like:

Enable The Secure Boot Feature to Block Rootkits and Malware
Secure Computing

Enable The Secure Boot Feature to Block Rootkits and Malware

Posted on May 4, 2025May 4, 2025 by Targeted Tech Talk
Steganography – Messages Hidden Inside of Files
Secure Computing

Steganography – Messages Hidden Inside of Files

Posted on April 21, 2025April 21, 2025 by Targeted Tech Talk
Free Online File Scanning With VirusTotal
Secure Computing

Free Online File Scanning With VirusTotal

Posted on April 14, 2025April 14, 2025 by Targeted Tech Talk
Tails Operating System for Increased Online Privacy and Security
Secure Computing

Tails Operating System for Increased Online Privacy and Security

Posted on April 6, 2025April 6, 2025 by Targeted Tech Talk
Check The Reputation of Websites and IP Addresses
Secure Computing

Check The Reputation of Websites and IP Addresses

Posted on March 23, 2025March 23, 2025 by Targeted Tech Talk
In-Q-Tel, Venture Capital Fund for CIA, NSA, DHS Technology Research
General Info

In-Q-Tel, Venture Capital Fund for CIA, NSA, DHS Technology Research

Posted on March 16, 2025March 16, 2025 by Targeted Tech Talk

Email – targetedtechtalk@protonmail.com

Follow @TargetedTechTlk
Scroll to top
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video