Skip Navigation

Posts
0
Comments
3
Joined
3 yr. ago

programmer / hacker / phreak / pirate / retrogamer / irc idler / stoner

  • Long story short.

    1. Be prepared for disaster.
    2. Scan it. Sandbox it if concerned.
    3. Firewall inspect/block/allow every outbound comm.
    4. Get it from a trusted source.

    Basically the same stuff you should be doing with all software.

    Edit for firewall clarification.

  • God bless the hackers, crackers, reverse engineers, and disrupters. Pray they help keep you free of too much pain.