TempestTiger@programming.dev to Programmer Humor@programming.dev · 1 year agoCommunity Member++programming.devimagemessage-square8fedilinkarrow-up1488arrow-down15cross-posted to: memes@not.alazy.dev
arrow-up1483arrow-down1imageCommunity Member++programming.devTempestTiger@programming.dev to Programmer Humor@programming.dev · 1 year agomessage-square8fedilinkcross-posted to: memes@not.alazy.dev
minus-squareIWriteDaCode@programming.devlinkfedilinkarrow-up9·1 year ago“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
minus-squareTempestTiger@programming.devOPlinkfedilinkarrow-up2·1 year agoStep 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.
“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
Step 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.