With the internet being almost everywhere and easy to access (airports, cafes, restaurants, even throughout some downtowns), you need to be careful about how you connect and your online presence. VPN for all of your online devices A common attack is a MITM (Man-in-the-middle) attack, which essentially is someone in the middle of you and the internet, collecting and/or altering …
Why Drones are good in a SHTF situation
When I say drones, I’m talking about civilian drones, the ones anyone can go out and buy. I recommend getting a drone as they can come in handy in SHTF situations. What better way is there to check something out near you without the associated danger? You can use a drone to patrol the area for looters, trespassers, etc. When …
Things to Consider When Choosing the Best Bug Out Vehicle and Accessories
What will it be used for? Just to get from point A to point B? Or will you be staying in your bug out vehicle for an unknown length of time? This will determine how many mods and accessories you will add to your vehicle. A “point A to point B” vehicle, you can get away with less mods. At …
Encrypt your $#!T – System Partition Encryption
Encrypting your entire system where your operating system resides and boots is the safest and most secure, as it encrypts ALL files. Even files within the operating system you wouldn’t know held sensitive information. When you encrypt your entire system drive, every time you boot your computer it will ask for your password to decrypt and boot your system. Because …
Encrypt Your $#!T – Encrypting Individual Files
How to Encrypt Files You never know when thieves, looters, hackers, officials, an ex, or whomever might get a hold of your computer which could have sensitive information on it. So, the best thing you could do is encrypt your files. In this article we will show you exactly how to encrypt files. Two basic ways of doing this is …