Avoiding cyberattack
Self-Protection
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.
You have probably read about various options for high-performance computing with Linux in this month’s issue. But, what do the bad guys do when they need high-performance computing? They break into other people’s computers and use them. So, how can you avoid becoming part of a botnet and, more importantly, avoid having your personal information, banking details, and other sensitive information sold to someone in a foreign country?