top | item 45212892

(no title)

Crontab | 5 months ago

I am probably the only one but the geek in me would love to see an article where digital forensics are used against the most common operating systems in their most secure configuration - just to see how they compare with one another.

discuss

order

jijijijij|5 months ago

> most common operating systems in their most secure configuration

Air-gapped and turned off?