On Fri, 08 Feb 2008 15:27:45 EST, [EMAIL PROTECTED] said: > Security research should go as follows, run some type of scanner to find > known issues (low hanging fruit). Use your skill to manually try to find > threats then manually create an exploit then report the issue after verified.
About what actually happened here, except that there actually was low hanging fruit waiting to be picked...
pgpXppAsNybOI.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
