
We started out talking about Dorothy’s Cisco switch configuration. It quickly morphed into a conversation about vulnerabilities. It turns out that the switch doesn’t ssh. It could also have other vulnerabilities. Think of this conversation as a quick risk assessment. Rather than jumping up and down about possible security issues, we evaluate the situation. Sometimes things aren’t as bad as you think they are. LINKS Check out the Cisco config on our website Check out our Facebook Page 5i636i
Este programa no acepta comentarios anónimos. ¡Regístrate para comentar!
Te recomendamos
Ir a Internet y tecnología