Avoiding cyberattack

Self-Protection

Article from Issue 120/2010
Author(s):

One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.

You have probably read about various options for high-performance computing with Linux in this month’s issue. But, what do the bad guys do when they need high-performance computing? They break into other people’s computers and use them. So, how can you avoid becoming part of a botnet and, more importantly, avoid having your personal information, banking details, and other sensitive information sold to someone in a foreign country?

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus