Defensive computing: Difference between revisions

Content deleted Content added
ClueBot (talk | contribs)
m Reverting possible vandalism by 217.42.36.47 to version by Bachrach44. False positive? Report it. Thanks, ClueBot. (513777) (Bot)
Line 10:
 
Not all firewall software will protect computers from sending unauthorized or harmful outbound traffic.
An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic.<ref name="two">[http://news.cnet.com/8301-13554_3-9923976-33.html http://news.cnet.com/8301-13554_3-9923976-33.html], The Pillars of Defensive Computing</ref>fuck you mum your mum cuntes
 
=== Anti-Malware software ===