Thomas Cameron wrote:
I understand
that the path to recovery from this kind of breach is incredibly
painful, and there are numerous folks managing that recovery.

Knowing that, doesn't it bother you that your system is very likely vulnerable to the same exploit - and that there are people who know how to do it?

--
   Les Mikesell
    [EMAIL PROTECTED]

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list

Reply via email to