On Fri, 08 Feb 2008 15:27:45 EST, [EMAIL PROTECTED] said:
> Security research should go as follows, run some type of scanner to find
> known issues (low hanging fruit). Use your skill to manually try to find
> threats then manually create an exploit then report the issue after verified.

About what actually happened here, except that there actually was low hanging
fruit waiting to be picked...

Attachment: pgpXppAsNybOI.pgp
Description: PGP signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to