top of page
Search


Encrypted Tunnels: The Ultimate VPN Guide
This guide will help you understand and use VPNs effectively, with real-world examples using ProtonVPN.

Randall
Mar 24, 20253 min read


Ports of Entry: How to Lock Down Your Computer Like a Cyber Fortress
Think of ports as doors and windows into your computer. Some of them need to be open - like the front door when guests are expected.

Randall
Mar 23, 20254 min read


RatT: Top 5 Application Vulnerabilities in 2025
This is your chance, 2025. Fix your security now, or my timeline is your future.

Randy
Feb 27, 20254 min read


The Digital Survival Guide: 5 Steps to Protect Yourself Today
Protecting yourself online doesn’t have to be complicated. By following these five steps, you can reduce your risk of becoming a victim.

Randall
Nov 16, 20244 min read


Is Your AI Ignorant, or Are You Just Using the Wrong Prompts?
Let’s face it: knowing how to talk to AI isn’t optional anymore. Prompt engineering is the new essential skill for anyone working with LLMs

Randall
Nov 15, 20245 min read


How to Monitor Your Network Traffic
Learn how to monitor your network for security

Randall
Oct 22, 20244 min read


How-To: Network Segmentation for IoT
How to segment your network for better IoT (Internet of Things) security
randallthomasmusic
Oct 22, 20243 min read
bottom of page
