append delete 20 Jun 2015 13:05:36 Linux Spook http://www.asd.gov.au/infosec/top-mitigations/top-4-strategies-explained.htm http://www.asd.gov.au/publications/Top_4_Strategies_Explained.pdf