Home » Research  |  IT vs OT |  When Facing The Insider Threat What Happend | Free Software vs Open Source | ask me |

Priscilla Felicia Harmanus · 1993 from the Netherlands · Last update: 28 may 2020

 

The Signs Of Suspicious Activity

Know the starting point of an attack

You Have Seen "Ubuntu/Linux" Installed in a Friends PC... " That's a Nice Program, Can I Have A Copy?"

∙ One man's trash is another man's identity. Dumpster diving can expose your information

 


 

 

 

to be continued