☆ Yσɠƚԋσʂ ☆@lemmy.ml to Programmer Humor@lemmy.mlEnglish · 2 months agoDevOpsimagemessage-square7fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1imageDevOps☆ Yσɠƚԋσʂ ☆@lemmy.ml to Programmer Humor@lemmy.mlEnglish · 2 months agomessage-square7fedilink
minus-squaremctoasterson@reddthat.comlinkfedilinkarrow-up1·2 months agoThe most secure endpoint is one that is completely inaccessible because the underlying service isn’t running.
The most secure endpoint is one that is completely inaccessible because the underlying service isn’t running.