Good advice man
If you want to take it one step further:
Since day #1 in IT infrastructure - Best practice when it comes to any kind of system security, is to demote the admin to a userlvl with no right at all, and use another character as the real admin.
This goes for scripts, web or PC useraccounts.. everything.
By not removing the character, you have the bruteforce wannabe hackers try and hack a account with no rights instead of trying to find the real sysadmin account
|