Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Interesting that the install instructions for Red Hat Linux distributions is far more complicated than that of other Linux distributions.

But seriously, if they are offering a free platform to anyone with an email address then what sort of precautions are they taking to prevent abuse?



Are we talking content abuse? It's in their ToS if we are. Not entirely sure how effective they're going to be at monitoring malicious content, but it's there.


Here's Matt describing what is done to create security and prevent abuse: http://www.youtube.com/watch?feature=player_embedded&v=y...!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: