Mono by KUSA Projects

Native Node

Information Technology made simple 👍

Latest posts(9)

Network Node: V1.0
Network Node: V1.0

This is the bare bone node, version 1, where anything goes and most things fail. Here you will be able to follow the progress and testing of my first portable Off-Grid Network Node. The Plan Version 1.0 will be set up with a Telstra Mobile Repeater and Starlink internet

by Tyson Morris Sep 24, 2025
Portable Off-Grid Network Nodes
Portable Off-Grid Network Nodes

As 2025 moved into the second half of the year, I started thinking about new technology services that could serve remote Australia. I didn't want to just resell straight off the shelf, I wanted it to be something that I could design, build and deploy which is unique

by Tyson Morris Sep 24, 2025
Node Versions
Node Versions

Keep up to date with the progress being made on our Portable Off-Grid Network Nodes. Version One Node V1.0 Version Two Version 2.0 is stilling being pondered

by Tyson Morris Sep 24, 2025
Step-by-Step Forensic Genealogy Methodology
Step-by-Step Forensic Genealogy Methodology

A simplified step by step process of a forensic genealogy investigation. Step 1 Obtain and Assess DNA Data Receive the Single Nucleotide Polymorphism (SNP) profile from the DNA sample. The SNP profile is typically generated from a bone or tooth sample using whole-genome sequencing or a SNP array. The profile

by Tyson Morris Aug 25, 2025
Why Parrot OS for Digital Forensics?
Why Parrot OS for Digital Forensics?

Parrot OS, a Linux-based operating system tailored for security researchers and digital forensics investigators, is a great choice for conducting forensic investigations due to its lightweight design, privacy-focused features, and extensive suite of pre-installed tools. This is how Parrot OS can be used for digital forensics, with a detailed focus

by Tyson Morris Aug 08, 2025
The World of Digital Forensics
The World of Digital Forensics

the lines between the physical and virtual worlds are increasingly blurred. With the rise of technology, we've become accustomed to relying on digital devices and networks to manage our lives. As our dependence on these systems grows, so does the risk of digital crimes and cyber threats. What

by Tyson Morris Jul 30, 2025

Search by tags(5)

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.