Comment by anukritisingh
Comment by anukritisingh 10 hours ago
Looks very useful, we should definitely build up on this!!!
Comment by anukritisingh 10 hours ago
Looks very useful, we should definitely build up on this!!!
Best to look at security policy using ecological predator-prey models. If you don't, than you fall victim to the assumption a "puzzle" you can't break is unbreakable in general.
Nuisance users don't publish CVE, and a zero trust model shows you something important. =3
Joel a little offtopic but looks like we have bumped into each other 3 times now (I remember you from VM comment and then today on a different comment and now this)
I am curious to ask now but why do you end every message with =3 & when did you start with this trend, really curious now xD
Hard pass...
In general, a public security policy is pointless. It is the one layer you want people to trip over when breaking a system. =3