Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: How to prevent zero day attacks
May 22 2012 03:32PM
Stephanus J Alex Taidri (securityfocus ae taidri com)
Seconded to Rob....
Limit the OS to run with least privilege as possible instead of
granting administrator access to normal user.
This is common for Linux OS, Mac OS and Windows 7 onwards to have apps
running with normal user privilege and required User Access Control
(UAC) to confirmed any changes...
[ more ]
Copyright 2010, SecurityFocus