Defensive computing: Difference between revisions

Content deleted Content added
See also: added link to Defensive Computing Priorities article
Line 44:
== See also ==
[http://blogs.computerworld.com/horowitz Defensive Computing Blog ] by Michael Horowitz at ComputerWorld.com
[http://blogs.computerworld.com/15280/defensive_computing_priorities Defensive computing priorities ] by Michael Horowitz December 2009
* [[Stopping e-mail abuse]]