­

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

UFO File: Official Nellis Air Force Base Recording From May 1995

December 17, 2013 Author: Category: Greg's Blog

None. Ufo, alien, c2cam, obama, drudge, Zionism, anonymous (group), anonymous, NDAA, activist, RT, alert, operation, theanonmessage, … ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

read more

Congressional oversight of DHS must change, says new task force report

September 11, 2013 Author: Category: Greg's Blog

Top Priority Sector:  federal_agencies_legislative Image Caption:  Task forcethat publishednew report Read More…. View full post on The Cyber Wars

read more

Anonymous – Operation Truth Force April 6 2013 – #OpTruthForce

July 12, 2013 Author: Category: Greg's Blog

Anonymous – #OpTruthForce – April 6 2013 Hello citizens of the World and users of Facebook. In past years we have seen a growing force around the world. Gove… ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

read more

Security Force Training Africa (Imo State Vigilantes Nigeria): So, you want to be a Ninja!!

June 27, 2013 Author: Category: Greg's Blog

Orlando Wilson Website: http://www.risks-inc.com Facebook: https://www.facebook.com/risksinc Twitter: https://twitter.com/#!/OrlandoWilson1 The Book: Interna… Read More…. View full post on Hip Hop Security

read more

Security Force Training Africa : Imo State Vigilantes Nigeria

June 26, 2013 Author: Category: Greg's Blog

Security Force Training Africa : Imo State Vigilantes Nigeria Orlando Wilson Website: http://www.risks-inc.com Facebook: https://www.facebook.com/risksinc Tw… Read More…. View full post on Hip Hop Security

read more

Gunfighter 101 Force on Force Training with Marauders

May 23, 2013 Author: Category: Greg's Blog

Gunfighter 101 provides participants a full day of force on force training with Ultimate Training Munitions (UTM). Visit www.Marauders.us for more informatio… Read More…. View full post on Hip Hop Security

read more

Security Force Training (Imo State Vigilantes Nigeria): Beasting’s helps the learning process!

May 22, 2013 Author: Category: Greg's Blog

Orlando Wilson For more info go to http://www.risks-inc.com Risks Inc. on Facebook: https://www.facebook.com/risksinc The Book “International Security”: http… Read More…. View full post on Hip Hop Security

read more

MODx 1.0.6 Brute Force / Path Disclosure

November 20, 2012 Author: Category: Greg's Blog

MODx versions 1.0.6 and below suffer from brute force and path disclosure vulnerabilities. View full post on Cracker Files ≈ Packet Storm View full post on The Cyber Wars

read more

Raytheon and Air Force testing UAS/air traffic control systems

November 15, 2012 Author: Category: Greg's Blog

Mark Rockwell Top Priority Sector:  airport_aviation_security The U.S. Air Force and Raytheon said on Nov. 15 they conducted concept evaluation demonstrations that showed existing air traffic control equipment could be modified to safely track the presence of nearby unmanned aircraft. The U.S. Government is preparing to allow unmanned aerial systems…

read more

Raytheon and Air Force testing UAS/air traffic control systems

November 15, 2012 Author: Category: Greg's Blog

Mark Rockwell Top Priority Sector:  airport_aviation_security The U.S. Air Force and Raytheon said on Nov. 15 they conducted concept evaluation demonstrations that showed existing air traffic control equipment could be modified to safely track the presence of nearby unmanned aircraft. The U.S. Government is preparing to allow unmanned aerial systems…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved