Saturday, April 19, 2014

Chapter 4

Chapter 4 covered the basic operation of the internet and also spent some time discussing the specific ways HTML, email, scripting, and cookies work.

The chapter then went into some detail about how any one of these things, used improperly, can be an attack vector. This is important to remember, in my opinion, because there's not much out there that is truly innocuous any more. Just about every type of file, code, and method of communication can be subverted somehow.

The chapter also went into some detail about the basic workings of cryptography, which reminds me that the next time I rebuild my system, I want to try doing full-disk encryption on my system drive.

No comments:

Post a Comment