06-25-2024, 05:31 PM
Hello,
Imagine being asked to audit a small system to determine what published information should not be there. For example, mail (where to check if credentials are secure?), the same with aliases. Where and how would you start?
Thanks for attention.
Imagine being asked to audit a small system to determine what published information should not be there. For example, mail (where to check if credentials are secure?), the same with aliases. Where and how would you start?
Thanks for attention.