Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Why would you run them without authentication? One mistake in your iptables shouldn't instantly compromise your operation...

Best practice is 'defense in depth', not 'we'll just lock down the perimeter'.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: