Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is the correct answer, and also the hardest answer because it's going to require you to have to swallow your pride.

Security will already be monitoring your traffic as a basic first step, which they will pipe straight into a SIEM or SOAR system. Doing this stuff will likely get you flagged for an audit.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: