Actually it's just a simple request response cycle , if you talk about adding firewalls and setting protocols. then i will do that in my cloud platform so when a user sent some request then it checks the authorization in cloud platform if the user have authentication then he can go further otherwise not .
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
Actually it's just a simple request response cycle , if you talk about adding firewalls and setting protocols. then i will do that in my cloud platform so when a user sent some request then it checks the authorization in cloud platform if the user have authentication then he can go further otherwise not .