What's up, people?
Compatibility should be equivalent to the architecture being used.
Whatever the scenario, there will always be the necessity of creating layers
of abstraction for security. One could create a jailed/chroot environment
for the compat layer. The next step would be creating a virtual and
headless machine.
SSH keys would need to be created. Create files in other jailed
environments.
Connect to the jailed environment from the desktop.

Yes, that is a lot, and, just on one side.

People use the excuse of, "I need an incentive."

No. You are going to do it when you want.

Anyway,
may all of you have a blessed and goodly day.

Reply via email to