Hari, yes, we can limit to security/vulnerability tests
Ziggy please educate me on the issues, i have not thought thru, and the game comment .... that was hilarious, (i think the game was your comment on whois, u seemed to find joy in the fact that i had not done a whois confirmation, but if u had done one, u would have not made that comment) this is serious business, the benefits are enormous and yes game changing The arguments for controlled versus real world testing can be debated until Jesus returns its illegal to hack a website without permission, if you have permission (read consent), i would like to be educated on what law you would be breaking. -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
_______________________________________________ The Uganda Linux User Group: http://linux.or.ug Send messages to this mailing list by addressing e-mails to: [email protected] Mailing list archives: http://www.mail-archive.com/[email protected]/ Mailing list settings: http://kym.net/mailman/listinfo/lug To unsubscribe: http://kym.net/mailman/options/lug The Uganda LUG mailing list is generously hosted by INFOCOM: http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The mailing list host is not responsible for them in any way.
