Obligatory "ignore this space" : https://sacoronavirus.co.za

Vulnerability is a difficult matter to discuss, but if a thing has permissions this is what needs to be assessed. Now, if a thing is vulnerable, which will be called a misconfiguration, how do we decide if an intrusion has taken place?

A probe cannot be dispensed with unless we're relying on our knowledge of configuration, and any tools we happen to have to help us verify it: if who calls for the probe matters, how are we going to encourage good habits?

From here we can be sure the next things to look at is 'denial of service,' but that does require an awful number of slaves, so we're not sure where 'distributed' jumped in.

••
• 1.51472/9