On Wed, Jul 19, 2006 at 08:21:01PM +0200, Peter Philipp wrote: > Hi I'm looking for clue. Does anyone have any?
Given your recent questions, I would suggest further reading on Threat Modeling and specifically Attack Trees. -- Darrin Chandler | Phoenix BSD Users Group [EMAIL PROTECTED] | http://bsd.phoenix.az.us/ http://www.stilyagin.com/ |