Once More into the Inevitable Breach - Learn the techniques real hackers use so you can build realistic defenses

Play Once More into the Inevitable Breach - Learn the techniques real hackers use so you can build realistic defenses
Sign in to queue

The Discussion

  • User profile image
    stahtufiang

    // components of a holistic security strategy. -fancy that- . do you really need to have two build in browsers on every version of your modern "very secure windows 10"? you've got thousand holes on the OS open by things that you never gonna use or don't need to be there in the first place. Microsoft should had build an entirely new section dedicated to security on the "new modern" OS , not an entire section dedicated to mobile apps running on desktop. you build the security for the new OS from the ground up, not port it from half century adding each time few lines of code, but who am I kidding nobody does that. it's the fault of the end user who doesn't know better that by clicking on a new e-mail will get him/her in trouble. our windows is a joke and the security is inexistent, but we stuck with it because there is not a better alternative to this. I hope you all got a giant back-up image of your system/s in case something goes south, at least I do.

Add Your 2 Cents