On Tue, Mar 6, 2012 at 12:34 PM, michael-dev wrote:
> Hi,
>
> just to give you feedback that your thread is actually followed.
This is great!
> I believe the different types of configuration are good and correct and
> that a good threat analysis is a basic step to
Hi,
just to give you feedback that your thread is actually followed.
I believe the different types of configuration are good and correct and
that a good threat analysis is a basic step to proper security, though I
cannot say much about the isolation tricks on Windows. The important
think is,
OK,
I will continue to discuss this with my-self, as apparently what I am
showing is not significant enough to have a proper technical
discussion. There is nothing wrong in open mind to other
possibilities, evaluate and with rational select the best approach.
For the lazy people of us, I added