On Wed, Jul 19, 2006 at 08:21:01PM +0200, Peter Philipp wrote:
> Hi I'm looking for clue.  Does anyone have any?

Given your recent questions, I would suggest further reading on Threat
Modeling and specifically Attack Trees.

-- 
Darrin Chandler            |  Phoenix BSD Users Group
[EMAIL PROTECTED]   |  http://bsd.phoenix.az.us/
http://www.stilyagin.com/  |

Reply via email to