Hacker News new | past | comments | ask | show | jobs | submit login

So, this is a guide about how you can configure a broken out-of-the-box security framework, trying to convince me to enable it?

Thanks, but I'd rather start from something that works, and build adding security from there, not viceversa.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: