Skip to content
Menu
  • Tactical Hermit Substack
Menu

Category: Computer Related

U.S. Voter Database Mysteriously Appears Online in the Open

Posted on 5 January 2016 by The Tactical Hermit

A misconfigured database has provided users of the World Wide Web access to 191 million voter records. White hat hacker Chris Vickery happened upon the leaky system and sent CSO’s Steve Ragan his personal voter record to prove it. “It was current based on the elections listed. My personal information was accurate too,” Ragan writes….

Continue reading

Cyber-Espionage: The Biggest Dangers are the Ones You Will Never Know About

Posted on 4 January 2016 by The Tactical Hermit

For years, I slept fitfully after a “friend” told me that it wasn’t the noisy mosquitos buzzing in my ears at night that were a problem.  Instead, it was the female mosquitos that made no noise at all but laid eggs in your ears at night.  That image wrecked my sleep until the Internet helped…

Continue reading

3-D Printing Will Disrupt the World in Ways We Can Barely Imagine

Posted on 29 December 2015 by The Tactical Hermit

In the last few years, additive manufacturing, also known as 3-D printing, has transformed from an interesting hobby to an industry producing a wide range of products. It is on the path to causing major disruptions in global trade — and changing the international security environment. The explosion of additive manufacturing means it is virtually…

Continue reading

This article Will NOT Boost Your Confidence in American Cyber-Defense Capabilities

Posted on 21 December 2015 by The Tactical Hermit

Iranian hackers infiltrated the control system of a small dam less than 20 miles from New York City two years ago, sparking concerns that reached to the White House, according to former and current U.S. officials and experts familiar with the previously undisclosed incident. The breach came amid attacks by hackers linked to Iran’s government…

Continue reading

Merry Christmas America! Congress secretly Slips CISA into Budget Bill

Posted on 18 December 2015 by The Tactical Hermit

  Update 12/18/2015 12pm: The House and Senate have now passed the omnibus bill, including the new version of CISA.   Privacy advocates were aghast in October when the Senate passed the Cybersecurity Information Sharing Act by a vote of 74 to 21, leaving intact portions of the law they say make it more amenable…

Continue reading

Iran: A Rising Cyber-Power?

Posted on 18 December 2015 by The Tactical Hermit

“A Brown Water Navy” Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to meet its geopolitical goals. In testimony calling out Iran for attacks on Sands Casinos, Director of National Intelligence James Clapper put Iranian cyber capability in the…

Continue reading

How NexDoor and NestCams Help Cops Solve Crimes

Posted on 6 December 2015 by The Tactical Hermit

I will be doing some articles on the many civilian applications of both of these apps soon for both home and business security. -SF (NOTE: I think the name of the below video should have been “Night of the Living Trans-Vestites” or something along them lines; regardless I think it proves the absolute necessity of…

Continue reading

Computer Security: Email Hygiene Tips

Posted on 2 December 2015 by The Tactical Hermit

Anti-phishing and Email Hygiene Journalists and newsrooms are increasingly the victims of hacking and malware, and often hackers target them through their email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom starts with a relatively simple attack: phishing and spear phishing. Phishing is a social-engineering attack where an adversary crafts an email…

Continue reading

How to Find out if your Netflix Account was Hacked-And Fix It

Posted on 1 December 2015 by The Tactical Hermit

Netflix lets multiple people use an account at the same time, and this feature is great when it allows you to mooch off a friend’s account without inconveniencing them. But one problem with this policy is that it has inadvertently created a black market for “access” to stolen Netflix accounts. A recent report by McAfee Labs revealed you…

Continue reading

Intel Tradecraft: Geo-Tagging and Identifying a Picture by it’s Background (Similar Image Search)

Posted on 23 November 2015 by The Tactical Hermit

  In the most recent episode of Homeland, Carrie while trying to figure out what direction to go in searching a stolen laptop for intel, is distracted by the computer’s screen saver which is a picture that shows the suspect in a beachfront bar in what appears to be a tropical location. Thinking back, Carrie remembers…

Continue reading
  • Previous
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • Next

Tactical Hermit Substack

Recent Post

  • Texas News: To Hell with Islam
  • Real German History Taught by a Rabbi?
  • Weimar Conditions, Weimar Solutions
  • The Jewish Pornification, Eroticization, and Moral Corruption of Germany and America Since 1919
  • Khyber Optics MDO (Mini Dot Optic) Review

Buy Me a Coffee

General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

Wyoming Survival

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

The Feral Irishman

Bustednuckles

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Jack Lawson Books

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2026 | Powered by Minimalist Blog WordPress Theme