The low hanging fruit will already be scooped up. You have to get creative with emphasis on it being pronounceable first and brevity second. I feel the biggest mistake that gets made is waiting for the perfect name and overlooking a good one.
- 0 Posts
- 2 Comments
Joined 2 years ago
Cake day: August 16th, 2023
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
Hardening depends on your threat model and needs of the client. Have the system do what it is supposed to do nothing more or less. I pretty much use this as a guide line depending on client needs.
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/pdf/security_guide/red_hat_enterprise_linux-7-security_guide-en-us.pdf