Skip to main content

电脑安全


发信人: youfellow (马甲一), 信区: Security
标  题: Re: 电脑安全
发信站: BBS 未名空间站 (Fri Nov 15 01:33:54 2013, 美东)

用公司的电脑和公司的网络,肯定是不安全的,
用公司的电脑自己的网络,也不安全,
就算你带了自己的电脑,但是用公司的网络,也是不安全的。只有带自己的电脑,用自
己的网络,公司才不会知道你在干什么。但是就算这样,公司可以申请NSA监视你,所
以还是不安全。比较安全的方法是不用电脑,有事情把人叫过来,到荒郊野外赤裸面谈,

发信人: youfellow (马甲一), 信区: Security
标  题: Re: 电脑安全
发信站: BBS 未名空间站 (Tue Nov 19 09:49:52 2013, 美东)

如果是本拉登,可能不安全,但是除非你是本拉登级别的,卫星和无人机不会跟踪你。

其实大部分人并不是怕被抓现行,而是怕秋后算账,最怕的就是留下记录被人搜索出来
揪小辫子被fire。所以最危险的就是email,次危险的是text message和诸如QQ,skype
,微信之类,其次是网站记录,然后是语音电话,因为有些公司语音电话也录制保存半
年一年的,

看看网站灌灌水,一般没问题,如果你找工作,需要用自己的电脑和自己的网络。
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...