Roger K Emery

IT Specialist



Technical Security

Capable of using common computer penetration testing tools to anayse network components for potential vvunerabilities. Fully versed in firewalls, port managment and asignment. 


  • BlackBunto 
  • Nmap
  • WIreshark
  • Familiar with other "tools" typically used to evade security measures


This website was powered by Ewisoft Website Builder.