On Fri, 08 Feb 2008 15:27:45 EST, keith@xxxxxxxxxxxxxx said: > Security research should go as follows, run some type of scanner to find > known issues (low hanging fruit). Use your skill to manually try to find > threats then manually create an exploit then report the issue after verified. About what actually happened here, except that there actually was low hanging fruit waiting to be picked...
Attachment:
pgpyZ1rBP6O7k.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/