Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But relatively few of them are internet/user-facing in any given deployment. You only need to secure/audit the attack surface, not the whole stack.


Until a few days ago , I would not have called bash "internet facing".




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: