CONCEALING YOUR IDENTITY – Installment #2

CONCEALING YOUR IDENTITY – Installment #2

If you’ve ever wanted to conceal your identity or protect your personally identifying information from prying eyes, then this series is made specifically for you. Installment 2: REWARDS CARDS & BURNER NUMBERS Use Your Burner Number As Your Rewards Card Number If...
CONCEALING YOUR IDENTITY – Installment #1

CONCEALING YOUR IDENTITY – Installment #1

If you’ve ever wanted to conceal your identity or protect your personally identifying information from prying eyes, then this series is made specifically for you. Installment 1: CONCEALING YOUR TRUE PHONE NUMBER Have you ever shared your phone number with someone and...
ASYMMETRIC CYBER SECURITY COURSES

ASYMMETRIC CYBER SECURITY COURSES

CELLULAR BASED DEVICES AND COMMUNICATIONINTERNET BASED DEVICES AND COMMUNICATION Cyber breaches are rampant in our world today. Sticking our head in the proverbial sand works great until it is our bank account, or credit card or email account that is hacked.   Then...
Which Tourniquet Should I Use?

Which Tourniquet Should I Use?

HISTORY In 2018 my two step-sons (we’ll call them Adam and John) took a cross-country trip to visit me in Florida. While in Florida, we took the opportunity to enjoy the great outdoors of the sunshine state by doing some wave running, eating seafood, throwing axes,...
CUSTOMIZED CYBER SOLUTIONS

CUSTOMIZED CYBER SOLUTIONS

HYBRID TACTICS ASYMMETRIC CYBER SECURITY COURSE Email: Info@hybridtactics.org 254.522.9062 Your cellular phone and personal computer are two of the key targets selected by hackers in order to attain your personally identifying information, leading to compromise of...