Avoiding cyberattack

Self-Protection

Author(s):

One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.

You have probably read about various options for high-performance computing with Linux in this month’s issue. But, what do the bad guys do when they need high-performance computing? They break into other people’s computers and use them. So, how can you avoid becoming part of a botnet and, more importantly, avoid having your personal information, banking details, and other sensitive information sold to someone in a foreign country?