Use your computer fearlessly.

Mission Services Articles Research

Laptop with MMA Gloves Reflected in the Dark Screen

Using data science to provide state-of-the-art cybersecurity products and user awareness.


Clean-Up defendIT buttressIT answerIT Trojan Hunter StreetSmart Secure Coding seeIT

Incident Response

defendIT TM : Security
subscribe, login

buttressIT TM : Audit

answerIT TM : Expertise

Trojan Hunter TM

StreetSmart Secure Coding

locateIT TM

protectIT TM : Data Protection

Security Alerts for North America

Take Action: Secure our Internet

Understand: Articles on Cybersecurity


Have you been hacked?

at Home

answerIT -- for individuals
Trojan Hunter -- for individuals
Incident Response: Clean-Up -- for individuals
defendIT -- for IT professionals

Digital Forensics -- for individuals
Hardened Devices -- for targeted individuals
Travel Kits -- for international travelers

at Work

Trojan Hunter -- for corporations
Incident Response: Clean-Up -- for corporations
defendIT -- for IT professionals
buttressIT -- for corporations
buttressIT Stealth -- for corporations

StreetSmart Secure Coding
Digital Forensics -- for corporations
Cybercop Training -- for IT departments

Password-Free Seamless Authentication


Clean-Up Tutorial

Computer Security is Algorithmically Intractable - Aug. 17, 2018.
Quantum Communication - Aug. 13, 2018.
Panther Shadow: A Linux Worm - Jun. 29, 2018

buttressIT: Artificial Intelligence for Network Audits - Dec. 15, 2017

defendIT: Artificial Intelligence for Cybersecurity - Dec. 4, 2017

Cybersecurity in Salt Lake - Nov. 30, 2016
Cybersecurity in Boise - Sept. 9, 2016
Cybersecurity in Miami - Jul. 7, 2016
Cybersecurity in Montana - Jun. 25, 2016

Open Letter to Genetics Researchers - Jan. 5, 2016

Hacking as an Anathema to Computer Science - Dec. 27, 2015

Encouraging Vulnerability Bounties - Dec. 19, 2015.

INC Logo

What Is New? | Contact | Tips

© 2015-2023 Intrepid Net Computing. All rights reserved.