- Jul 26, 2007
- 98
- 0
- 0
After reading a Tutorial about good practices to overall security in computer/internet enviroment, i asked myself and also mechBgon (Author of the Tutorial) what will be the effect of using a ShadowUser type of software in combination with the recommendations from the Tutorial or in a stand alone mode, in the implementation of the security strategy.
His good advice was to start a new thread with this topic and here i'am .
All comments are welcomed.
Thank you.
His good advice was to start a new thread with this topic and here i'am .
All comments are welcomed.
Thank you.