31 Aug
2013
31 Aug
'13
4:36 a.m.
On Sun, Aug 11, 2013 at 2:27 AM, coderman <coderman@gmail.com> wrote:
... 4. rootkit and backdoor your own systems - use the dirty tricks to observe and constrain your system before someone else uses dirty tricks to compromise your system.
a good presentation which suggests this technique, among other useful ideas: "Attack Driven Defense" http://www.slideshare.net/zanelackey/attackdriven-defense