Avoiding cyberattack
Self-Protection
Article from Issue 120/2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.
You have probably read about various options for high-performance computing with Linux in this month’s issue. But, what do the bad guys do when they need high-performance computing? They break into other people’s computers and use them. So, how can you avoid becoming part of a botnet and, more importantly, avoid having your personal information, banking details, and other sensitive information sold to someone in a foreign country?
Buy this article as PDF
Express-Checkout as PDF
Price $2.95
(incl. VAT)
(incl. VAT)