top of page
Search


Encrypted Tunnels: The Ultimate VPN Guide
This guide will help you understand and use VPNs effectively, with real-world examples using ProtonVPN.

Randall
Mar 243 min read
Â
Â
Â


Ports of Entry: How to Lock Down Your Computer Like a Cyber Fortress
Think of ports as doors and windows into your computer. Some of them need to be open - like the front door when guests are expected.

Randall
Mar 234 min read
Â
Â
Â


RatT: Top 5 Application Vulnerabilities in 2025
This is your chance, 2025. Fix your security now, or my timeline is your future.

Randy
Feb 274 min read
Â
Â
Â


The Digital Survival Guide: 5 Steps to Protect Yourself Today
Protecting yourself online doesn’t have to be complicated. By following these five steps, you can reduce your risk of becoming a victim.

Randall
Nov 16, 20244 min read
Â
Â
Â


Is Your AI Ignorant, or Are You Just Using the Wrong Prompts?
Let’s face it: knowing how to talk to AI isn’t optional anymore. Prompt engineering is the new essential skill for anyone working with LLMs

Randall
Nov 15, 20245 min read
Â
Â
Â


How to Monitor Your Network Traffic
Learn how to monitor your network for security

Randall
Oct 22, 20244 min read
Â
Â
Â


How-To: Network Segmentation for IoT
How to segment your network for better IoT (Internet of Things) security
randallthomasmusic
Oct 22, 20243 min read
Â
Â
Â
bottom of page