Gary Langston

Infosec, Infotech, Survivalist, Prepper

Pages

  • Home
  • Resume
  • Facebook
  • Twitter
  • LinkedIn
  • Genealogy
  • Ham Radio

Ham Radio















Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Home
Subscribe to: Posts (Atom)

Twitter Feed

Tweets by corerouter

Fraud Links

Scam Detector
FinCEN
Identity Theft Resources
Trendwatching
Fraud Investigation
IAFCI
Credit Card Protection

Categories

  • Fraud (291)
  • IP Blocks (2)
  • Rants (43)
  • Survival (153)
  • Technology (305)

Popular Posts

  • FBI agent to investigate fraud for NC elections board
    RALEIGH, N.C. — A veteran FBI agent will join the State Board of Elections next month to assist in voter fraud and campaign finance investig...
  • Blacklist IP's
    object-group network Custom_Block_List  network-object host 23.250.11.220  network-object host 209.10.104.55  network-object ho...
  • Bad Drone Quadcopter
     Images of the DJI knock off Do Not BUY you will thank me later. This is sold as a engineer made with the costs of go down and it is just a ...
  • Robo Caller
    520-277-9097 AZ, USA 3:27 PM Hello the FBI Has Reported..... Telemarketer
  • Live Websites for Information as It Happens.
     Flights -   ADS-B Exchange ,  Flightradar24 Maritime -  https://www.marinetraffic.com/ Weather and Earth Views-  https://zoom.earth/  , The...
  • A Hacker Scrubbed Child Porn Links from the Dark Web's Most Popular Site
    Accessible only with anonymizing Tor software, the deep web is an important bastion for private communication , as well as those looking to ...
  • Cisco Releases Security Updates for Multiple Products
    https://us-cert.cisa.gov/ncas/current-activity/2022/06/16/cisco-releases-security-updates-multiple-products
  • Robo Caller
    520-277-9097 AZ, USA 3:27 PM Hello the FBI Has Reported..... Telemarketer
  • FBI agent to investigate fraud for NC elections board
    RALEIGH, N.C. — A veteran FBI agent will join the State Board of Elections next month to assist in voter fraud and campaign finance inve...
  • Procedures for proper Digital Forensic Research.
    First of use a computer system just for the recovery and not an everyday used computer. After each use of research wipe the computer with Er...

Blog Archive

  • ▼  2023 (1)
    • ▼  January (1)
      • Information security training for new employees.
  • ►  2022 (21)
    • ►  September (3)
    • ►  June (4)
    • ►  May (14)
  • ►  2021 (3)
    • ►  November (1)
    • ►  May (1)
    • ►  January (1)
  • ►  2020 (5)
    • ►  December (1)
    • ►  September (4)
  • ►  2019 (2)
    • ►  August (1)
    • ►  May (1)
  • ►  2018 (1)
    • ►  December (1)
  • ►  2017 (7)
    • ►  November (1)
    • ►  October (1)
    • ►  September (5)
  • ►  2016 (6)
    • ►  June (2)
    • ►  May (4)
  • ►  2015 (55)
    • ►  December (1)
    • ►  October (1)
    • ►  April (3)
    • ►  February (4)
    • ►  January (46)
  • ►  2014 (492)
    • ►  December (6)
    • ►  November (26)
    • ►  October (36)
    • ►  September (8)
    • ►  August (46)
    • ►  July (40)
    • ►  June (50)
    • ►  May (74)
    • ►  April (90)
    • ►  March (98)
    • ►  February (18)
  • ►  2013 (48)
    • ►  October (10)
    • ►  August (8)
    • ►  July (2)
    • ►  June (4)
    • ►  April (14)
    • ►  February (2)
    • ►  January (8)
  • ►  2012 (164)
    • ►  December (16)
    • ►  November (16)
    • ►  August (6)
    • ►  July (14)
    • ►  June (8)
    • ►  May (30)
    • ►  April (28)
    • ►  March (46)
Gary Langston 2010. Awesome Inc. theme. Powered by Blogger.