On Sun, Aug 11, 2013 at 2:27 AM, coderman <[email protected]> wrote: > ... > 4. rootkit and backdoor your own systems - use the dirty tricks to > observe and constrain your system before someone else uses dirty > tricks to compromise your system.
a good presentation which suggests this technique, among other useful ideas: "Attack Driven Defense" http://www.slideshare.net/zanelackey/attackdriven-defense
