Topic: Threat model request — user side

Page 1 of 1  sorted by
Anonymous
Posts:
Date:

Threat model request — user side

Permalink   
 

Hi everyone,

 

 

 

I want to threat model the USER. Has anyone written a krnl executor tutorial that shows how NOT to be socially engineered by shady installers? Or a krnl executor tips latest version list that is purely OPSEC (vm isolation, network filtering, snapshot rollback)? If you have a krnl executor walkthrough where the “takeaway” is user-risk education, that’s exactly what I need to cite.



__________________
Page 1 of 1  sorted by
Simple Guestbook
Name **
Email **
How did you find about my homepage
Internet search
Link from another site
Word of mouth
Comments, suggestions
Private Message:


Create your own FREE Forum
Report Abuse
Powered by ActiveBoard