On Thu, 16 Oct 2008 21:41:02 BST, n3td3v said:
> ... that criminal hackers use metasploit as well.

Criminals use gmail too. n3td3v uses Gmail. Therefor....

Criminals use the phone too. n3td3v probably knows how to use the phone. 
Therefor...

Criminals use beds to sleep. n3td3v probably uses a bed or a crib or something. 
Therefor..

You *really* don't want to follow that idea to its logical conclusion.

Attachment: pgpzQk6Rc1f3p.pgp
Description: PGP signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to