That's not something encryption is going to help you with.

Thanks,

--
Daniel B. Cid
http://dcid.me

On Thu, Mar 22, 2012 at 6:16 PM, Michel Henrique Aquino Santos
<michel....@gmail.com> wrote:
> Hi,
> an attacker can read the rules file and use any directory or file is not
> monitored to carry out the attack.
>
> Em 22-03-2012 18:04, Castle, Shane escreveu:
>
> Just what is this vulnerability, specifically?
>
>
> --
> Att,
>
> Michel Henrique Aquino Santos
> Bacharelado em Ciência da Computação
> Universidade Federal de Lavras - UFLA
> Skype: michel_has
> Gtalk: michel.has
> michel....@gmail.com
>
> Linux User # 496756
>
> http://resolvidoslinux.blogspot.com/

Reply via email to