http://www.leeholmes.com/blog/2006/08/22/diy-cat-feeder-and-water-dispenser/
http://www.leeholmes.com/blog/2014/12/
When it comes to system defenses and security controls, there are many controls and mitigations you can employ:
- Antivirus
- AppLocker in “Deny” Mode (or another technology that does Application Blacklisting)
- AppLocker in “Allow” Mode (or another technology that does Application Whitelisting)
- Auditing (especially of implemented security controls)
- Forensic capture and analysis of host-based artifacts (filesystem, network, registry, etc.)
- Forensic capture and analysis of memory-only artifacts
沒有留言:
張貼留言
注意:只有此網誌的成員可以留言。