Google can sometimes serve as a tool for hackers to gain sensitive information from the Internet.

I wrote this article to explain how that works, and the best practices we can use to protect against it.

  • spectnullbyteOP
    link
    fedilink
    arrow-up
    2
    ·
    4 years ago

    Thank you, I am glad you’ve found it informative. I thought I’d list the operators first just in case the reader didn’t know them. This way, everyone would understand the examples section. However, I totally agree with you, there is still a risk of losing people before they could get to the interesting stuffs. I’ll keep this in mind for future posts.