Anonymous
11/29/2016 (Tue) 23:46:32
No.5380
del
>>5344
Then make a mock test site, not a duplicate, yesh.
>No I don't.
This is bad. M8, when you can, study up on Sysadmin. Rule 37 of "After an attack" is to keep an archive of the exploit. You want to retrospect on
how malicious attacks are growing, so you proactively scope those vulnerabilities.