Hi all

             The JWIG has got very good functionalities. But vulnerability
finding never states that technology should not be used but should
be carefully used. The vulnerability points should be taken into account
while implementing technology.

The growth counts.

Thats it.

Regards
Aditya K Sood
SecNiche Security.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to