Skip to content

Welcome to


Privacy Security VMware AWS Azure GCP

facial recogintion
OSINT Techniques

Reverse Image Search

Guide Reverse Image Search It is a simple process to perform a reverse image search. Most of the top search engines such as Google and

Read More »
Make a list

Data Removal Worksheet

Guide DATA REMOVAL WORKSHEET​ When removing your data from the internet the goal is to remove anything.  The main problem is identifying all the data

Read More »

about me


My name is Tom.   I have over 20 years of professional experience in information technology, virtualization, and cybersecurity.  I work out of my home office in Kansas City for TierPoint as a Solutions Engineer, but this blog, its content, and opinions are my own. I blog about technology, privacy, gadgets, web, and cloud technologies, where we’re going, and where we’ve been.  I’m excited about community, social equity, media, entrepreneurship, and above all, the open web.



Follow along the journey