Defensive computing: Difference between revisions

Content deleted Content added
m clean up, Replaced: <references/> → {{reflist}},, removed Stub tag using AWB
Line 10:
 
Not all firewall software will protect computers from sending unauthorized or harmful outbound traffic.
An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>fuck you mum your mum cuntes
 
=== Anti-Malware software ===