The Evolution of security - Security & Cryptography
Users browsing this thread: 2 Guest(s)
|
|||
You always have to prepare for the worst case scenario so proactive measures are my preference.
* Redundantly mirrored backups performed often. * Public Key Encryption of all sensitive data. * Regular software updates. * Etc. Security cannot remain static, it must evolve with every addition to every system. The alternative is the loss of online anonymity. BSD is what you get when a bunch of Unix hackers sit down to try to port a Unix system to the PC.
Linux is what you get when a bunch of PC hackers sit down and try to write a Unix system for the PC. |
|||
Messages In This Thread |
The Evolution of security - by venam - 28-08-2012, 11:42 AM
RE: The Evolution of security - by venam - 28-08-2012, 04:08 PM
RE: The Evolution of security - by Dritz - 29-08-2012, 03:20 AM
RE: The Evolution of security - by venam - 29-08-2012, 06:30 AM
RE: The Evolution of security - by D9u - 07-09-2012, 05:50 AM
RE: The Evolution of security - by venam - 07-09-2012, 06:36 AM
RE: The Evolution of security - by CrossFold - 25-09-2012, 02:00 PM
RE: The Evolution of security - by venam - 14-03-2015, 03:15 PM
RE: The Evolution of security - by z3bra - 14-03-2015, 04:13 PM
RE: The Evolution of security - by October - 19-04-2015, 02:49 PM
RE: The Evolution of security - by venam - 28-04-2015, 06:11 AM
RE: The Evolution of security - by venam - 16-03-2016, 04:14 AM
RE: The Evolution of security - by xero - 16-03-2016, 12:55 PM
RE: The Evolution of security - by dtnt - 23-03-2016, 09:38 AM
|