Beside having an instance unprotected by iptables, what can the user do with it ? e.g., can he spoof other tenants' ip ?
Beside having an instance unprotected by iptables, what can the user do with it ?
e.g., can he spoof other tenants' ip ?