I think that the poster of this message made a legitimate challenge:

The following is not intended to be a flame, but just an observation.

If you're going to flame a product without hard data to back it up, then
it's more of an opinion, and should be stated that way.  However, if
someone actually exploits a product, and it can be faithfully
reproduced, than that's data that has meaning and I'd be interested in
it.  I think that potential vendors of security products appreciate that
kind of homework, as well as informed security consultants.

I said all that to say this:  instead of making derogatory remarks about
someone's challenge, let's hear about it after you've hacked the system,
or after you've pointed us to some conclusive data that clearly
illustrates the flaws of the product/platform.

I really think some of you took the challenger's intentions out of
context.  Lighten up...  ;-)

kdl

--
Kelly D. Lucas                  / Netscape Communications
Systems Test Engineer        / OEM/Eng Dept.
[EMAIL PROTECTED]      / 650-937-3073
"Any opinions that I state are my own, and not Netscapes"


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to