Hari,

yes, we can limit to security/vulnerability tests

Ziggy

please educate me on the issues, i have not thought thru,
and the game comment .... that was hilarious,
(i think the game was your comment on whois, u seemed to find joy in the
fact that i had not done a whois confirmation, but if u had done one, u
would have not made that comment)
this is serious business, the benefits are enormous and yes game changing

The arguments for controlled versus real world testing can be debated until
Jesus returns

its illegal to hack a website without permission, if you have permission
(read consent), i would like to be educated on what law you would be
breaking.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to