top | item 46268692

(no title)

zymhan | 2 months ago

Because an attacker would never cover their tracks...

discuss

order

everfrustrated|2 months ago

Indeed, being able to trust your audit logs is imperative.