You must log in or # to comment.
Ok but hear me out we’ll just put it in a Docker container and that’ll make it better
Devs:
I have altered the code. Pray I do not alter it any further.
The most secure endpoint is one that is completely inaccessible because the underlying service isn’t running.
Less documentation means more job security.
“Can’t expect me to train my replacement if I don’t remember how I did it!”
“It works. What more do you want?”
What I stand up in AWS I don’t know how it works. How an I going to expect a hacker to figure it out?