Contains good examples of the bad operational security mistakes one should avoid.