top of page
Search


Encrypted Tunnels: The Ultimate VPN Guide
This guide will help you understand and use VPNs effectively, with real-world examples using ProtonVPN.
Randall
Mar 243 min read
2 views
0 comments


Ports of Entry: How to Lock Down Your Computer Like a Cyber Fortress
Think of ports as doors and windows into your computer. Some of them need to be open - like the front door when guests are expected.
Randall
Mar 234 min read
1 view
0 comments


RatT: Top 5 Application Vulnerabilities in 2025
This is your chance, 2025. Fix your security now, or my timeline is your future.
Randy
Feb 274 min read
2 views
0 comments


The Digital Survival Guide: 5 Steps to Protect Yourself Today
Protecting yourself online doesn’t have to be complicated. By following these five steps, you can reduce your risk of becoming a victim.
Randall
Nov 16, 20244 min read
9 views
0 comments


Is Your AI Ignorant, or Are You Just Using the Wrong Prompts?
Let’s face it: knowing how to talk to AI isn’t optional anymore. Prompt engineering is the new essential skill for anyone working with LLMs
Randall
Nov 15, 20245 min read
5 views
0 comments


How to Monitor Your Network Traffic
Learn how to monitor your network for security
Randall
Oct 22, 20244 min read
3 views
0 comments


How-To: Network Segmentation for IoT
How to segment your network for better IoT (Internet of Things) security
randallthomasmusic
Oct 22, 20243 min read
49 views
1 comment
bottom of page