What’s Next?

We’ve covered some of the basic Windows defenses we should have in place. We’ve also seen how some of the more generic advice from earlier in the book (patch as soon as possible, make attacks noisier) shows up again in this chapter.

What can an attacker do if all these defenses are in place? Bypass them. We’ll take a look at phishing and what to do about it in our next chapter.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.134.90.44