Roger K Emery

IT Specialist

 

 

Technical Security

Capable of using common computer penetration testing tools to anayse network components for potential vvunerabilities. Fully versed in firewalls, port managment and asignment. 

 

  • BlackBunto 
  • Nmap
  • WIreshark
  • Familiar with other "tools" typically used to evade security measures

 

This website was powered by Ewisoft Website Builder.