Security for the Paranoid

I’d say I am not too far behind this article’s author. I think some of his measures are perhaps a bit extreme for a personal network and personal systems, but I agree with the general point. If you practice good security, regardless of the actual threat, then you are in good standing if a threat actually does materialize. For stealth exploits, what else can you really do, anyway?

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>