root user

1 articles

Operating System Hardening Techniques and Security Strategies

By AJ Shipley In my last blog post, I focused on securing the device at a high level, and in this post, I’d like to dive a bit deeper into the technical aspects of device security; specifically, regarding defense against “run time,” or operational vulnerabilities, that a system is exposed to after it has booted up.  A defense in depth…