Cyberoutsider , 29 days ago @jerry Similar to Need-to-know. No one needs to know how a system was built (that'd be a potential security weakness cause an attacker could read it to understand it, right?) - so why bother documenting anything you've done?
@jerry Similar to Need-to-know.
No one needs to know how a system was built (that'd be a potential security weakness cause an attacker could read it to understand it, right?) - so why bother documenting anything you've done?