I thought this line interesting: "using Tor for online anonymity, the benefits of no-contract cell phones, and how to trick keyloggers,"
What does that mean to trick a keylogger? On Wed, Jan 25, 2012 at 2:49 PM, Paul M Moriarty <p...@igtc.com> wrote: > On Jan 25, 2012, at 10:48 AM, Robert Slade wrote: > >> http://www.cjr.org/the_news_frontier/teaching_cyber-security.php >> >> Does this provide us with any level of comfort or confidence? (Those two >> are not necessarily equal ...) >> > > It's a step in the right direction, though clearly it will be a long journey. > > - Paul - > _______________________________________________ > Fun and Misc security discussion for OT posts. > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > Note: funsec is a public and open mailing list. _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.