H
hjlbx
Thread author
This poll is meant as a general, conceptual poll; it can never cover all the possible user-specific scenarios and objectives.
Please... just have fun with it.
When I first started on my personal IT security quest I made just about every mistake that one can make. Back then, my goal was to build an "impenetrable fortress." That seemed, at that time, like the right thing to do.
As my understanding of IT security has grown, my perspective on home computing and security softs has changed. Today, my goal is not a fortress, but rather system responsiveness along with a high base-line security level. I've learned it is an achievable objective that includes an anti-executable, light virtualization and outbound network filtering modules.
What is the objective of your chosen security configuration ?
Pick the response that best reflects your intended security configuration end-goals...
Please note that, in my experience, while an "impenetrable fortress" configuration is possible, ultimately the toll on system resources or other problems - such as conflicts, complicated and tiresome usage, and system instability - make such configurations so troublesome that it degrades my user experience to a point where I get disgusted and do a complete reconfigure...
Please... just have fun with it.
When I first started on my personal IT security quest I made just about every mistake that one can make. Back then, my goal was to build an "impenetrable fortress." That seemed, at that time, like the right thing to do.
As my understanding of IT security has grown, my perspective on home computing and security softs has changed. Today, my goal is not a fortress, but rather system responsiveness along with a high base-line security level. I've learned it is an achievable objective that includes an anti-executable, light virtualization and outbound network filtering modules.
What is the objective of your chosen security configuration ?
Pick the response that best reflects your intended security configuration end-goals...
Please note that, in my experience, while an "impenetrable fortress" configuration is possible, ultimately the toll on system resources or other problems - such as conflicts, complicated and tiresome usage, and system instability - make such configurations so troublesome that it degrades my user experience to a point where I get disgusted and do a complete reconfigure...
Last edited by a moderator: