186
DevOps
(lemmy.ml)
Devs:
I have altered the code. Pray I do not alter it any further.
What I stand up in AWS I don't know how it works. How an I going to expect a hacker to figure it out?
The most secure endpoint is one that is completely inaccessible because the underlying service isn't running.
Ok but hear me out we’ll just put it in a Docker container and that’ll make it better
Post funny things about programming here! (Or just rant about your favourite programming language.)