Skip to content

Security for the Paranoid

I’d say I am not too far behind this article’s author. I think some of his measures are perhaps a bit extreme for a personal network and personal systems, but I agree with the general point. If you practice good security, regardless of the actual threat, then you are in good standing if a threat actually does materialize. For stealth exploits, what else can you really do, anyway?

Posted in Security.

0 Responses

Stay in touch with the conversation, subscribe to the RSS feed for comments on this post.

Some HTML is OK

or, reply to this post via trackback.

Creative Commons License
The Command Line by Thomas Gideon
is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.