I have posted the Exploits Explained document in the Files section for Intercept X. I would like to get some feedback on the document and start a discussion on what types of white papers people would like us to create and an understanding of what level of technical detail the community wants.
Take a read of the document and post some feedback good bad or other is fine.
Also if you have suggestions for additional white papers on other features of the product we can discuss them here.
My thoughts on the next White Papers we need are around CryptoGuard, Safe Browsing, Process Lockdown, and as new features get added like credential theft protection, I suspect folks will want to know what it is and a bit on how it works.
Thanks
Karl
This thread was automatically locked due to age.