by HCS Technical Staff “What is a card skimmer?” Card skimmers are nasty little devices that are designed to surreptitiously steal information off your bank card or credit card by reading the magnetic strip when you conduct a transaction at either an ATM machine, a self-checkout lane at a store, gas pump, a DVD rental…
Author: The Tactical Hermit
The Holster Debate
Ahhhh..the old debate; Leather vs. Kydex for a gun holster. It is much akin to 9mm vs. .45 or AR vs AK debates of old. You have loyal disciples on both sides who are quick to tell you how they feel. As with all subjects, we here at HCS like to give you the facts and let…
Active Shooter at Texas Courthouse
The Plague continues…are you ready? http://www.foxnews.com/us/2012/03/14/1-dead-4-wounded-after-gunman-allegedly-opens-fire-at-texas-courthouse/
“Feeling Hot Hot Hot!”: Pepper Spray Selection and Training
By HCS Technical Staff “Mah only martial art is gun-fu!” “I’ll just draw down on the drunk trying to start a bar fight with me!” “Pepper gas is for girls!” Hang around the a gun shop long enough and you are bound to hear someone spout such idiocy. Anyone who tells you that you don’t…
Dress “Down” Essentials
The essence of this piece is prove to you that dressing “Tacti-cool” is not cool… if you carry a legally concealed weapon or want to remain “anonymous” in public so as not to alert strangers to your interest or training. Dressing “loud” or in other words dressing as to attract attention and notify other people that…
Counter Abduction Principles
You see it on the news…a botched child abduction in a Wal-Mart…your skin crawls and you think to yourself: “Would my kid(s) know what to do if somebody tried that?” The plain truth is that your kids will most likely NOT know what to do if you don’t talk to them about it and teach them frequently….
Survival Computing: When “The Cloud” Goes Dark
By HCS Technical Staff When you imagine the archetypal Walking Dead/Katrina/Tornado type disaster scenario, we creatures of comfort may find the thought of our electronic gadgets and gizmos being rendered useless utterly terrifying. The truth of the matter is that hardware and software used to send, store, and receive information (“IT” or Information Technology) is…
Malware & Cyber Warfare
by HCS Technical Staff How is it done? Offensive computer attacks are usually conducted by exploiting flaws in a computer web interface (most often a “login screen”) or surreptitiously installing malicious software (“malware”) on targeted computers to produce a number of effects on the computer system or devices that it controls. How does it happen? In the broadest…
Surviving a Tornado
With the recent outbreak and violent aftermath of F4 tornadoes in Indiana, Kentucky and the midwest, I thought it pertinent to go over the fundmanetal tornado survival basics and a few maybe you did not know. This has been one of the most violent tornado outbreaks in recent history, with a confirmed 39 dead at most recent count. The…
The “Plague” of the Active Shooter
Once again the headlines scrolled at the bottom of the screen “Student in Ohio goes on shooting spree at local school”…My stomach turned..”That coward S.O.B” I muttered under my breath. I was angry and agitated. The plague of the active shooter scenario had raised it’s ugly head once again, at the end result would be 3 dead, 2…