11/29/2016 (Tue) 23:46:32
Then make a mock test site, not a duplicate, yesh.
>No I don't.
This is bad. M8, when you can, study up on Sysadmin. Rule 37 of "After an attack" is to keep an archive of the exploit. You want to retrospect on how
malicious attacks are growing, so you proactively scope those vulnerabilities.