atomicStan

joined 1 week ago
[–] atomicStan@programming.dev 2 points 1 week ago (2 children)
  • Step 1. Upgrade to proactive security. Projects like HotCakeX' offer a streamlined method of attaining it.
  • Step 2. Commit to best practices. There's a long list of this, but the short of it would be:
    • Uphold a strong backbone of secure software that has proven to be committed to safe practices.
    • Ensure that your system and/or software is always up-to-date.
    • Don't visit unsafe/untrusted websites. Don't click on shady/untrusted links.
    • Don't execute untrusted/unsafe files. Especially not with administrator's rights.
    • Sandbox all activities. So that even if you're compromised, that the adversary can only access very little beyond the binary/program/software itself.
[–] atomicStan@programming.dev 8 points 1 week ago* (last edited 1 week ago) (2 children)

uses apt

May I ask why you seem to be married to the use of apt?

~~Just couldn't pass up on the opportunity to insert this banger.~~

view more: ‹ prev next ›