Why Do Hackers Find it Easy to Attack Centos Server?
 
                                                
                                                
                                                
                                                
                                            
                                                                                Recently I came across an article requesting for ways to fix a security loophole in Centos operating system. I have been thinking of installing Centos on my laptop but now I have reservations about this idea of installing a Linux operating system, especially Centos. I want to know the major issues you have found or you know of with regards to Centos.
 
                                            
                                            
                                            
                                         
		 
 
                                         
                                                         
                                                         
                                                            







