This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Take a look at the Exploits Explained document and provide feedback

I have posted the Exploits Explained document in the Files section for Intercept X.  I would like to get some feedback on the document and start a discussion on what types of white papers people would like us to create and an understanding of what level of technical detail the community wants.

Take a read of the document and post some feedback good bad or other is fine.  

Also if you have suggestions for additional white papers on other features of the product we can discuss them here.

My thoughts on the next White Papers we need are around CryptoGuard, Safe Browsing, Process Lockdown, and as new features get added like credential theft protection, I suspect folks will want to know what it is and a bit on how it works. 

Thanks

Karl 



This thread was automatically locked due to age.