[do_widget id=nav_menu-4]

Free Articles

,

How you should be storing your guns

In this week’s Must-Read articles we cover… How using a tourniquet will save a life and how it’s used… Why more and more ham radios are being banned… Random survival tips you’ve never heard before… What the ‘best by’ dates actually mean on packages… And how you should be storing your guns. Let’s dive in! …

,

Great Self-Defense Moves for Kids

In this week’s mailbag we cover… What I look for when choosing a location to live… My recommendations on quality night vision goggles… The different ways a smartphone tracks your location… The risks of Kapersky antivirus software… Great self-defense moves to teach your children… Which Gerber multi-tools I prefer… And more! Let’s dive in… You are …

,

Surviving a Bear Attack

In this week’s Must-Read articles we cover… What to consider before setting up a bunker… The best survival skills we can learn from insurgents… The actual effects of a prolonged power grid failure… The Hazmat rule of thumb for surviving a disaster… And what you need to know about surviving a bear encounter. Let’s dive …

,

How to avoid a deadly bus crash

Millions of people visit Utah’s five national parks every year. Last year, about 87,000 people from China visited Utah, making them the fastest-growing group of Utah tourists, according to state data. More than half of visitors from China travel on tour buses, based off information from the Utah Office of Tourism. Recently, four Chinese tourists …

,

Lock Picking Done Right

In this week’s mailbag we cover… What to consider when deciding to work with the Chinese… How Amber Guyger entered the apartment… How to keep you storage water fresh… My recommendation on password creations… Whether or not a fireproof gun safe with work as a Faraday Cage… The damage done by lock picking… And more! …

,

What To Do About Unusual Account Activity?

It’s no surprise for consumers to receive notices of “unusual account activity” these days. Obviously, service providers are making account security a top priority so they regularly send out these types of letters after learning of a data breach that affected their customer base. Donald G. recently received an e-mail from his cell phone provider …