Google can sometimes serve as a tool for hackers to gain sensitive information from the Internet.

I wrote this article to explain how that works, and the best practices we can use to protect against it.

    • spectnullbyteOP
      link
      fedilink
      arrow-up
      2
      ·
      4 years ago

      Thank you, I am glad you’ve found it informative. I thought I’d list the operators first just in case the reader didn’t know them. This way, everyone would understand the examples section. However, I totally agree with you, there is still a risk of losing people before they could get to the interesting stuffs. I’ll keep this in mind for future posts.