That's not something encryption is going to help you with. Thanks,
-- Daniel B. Cid http://dcid.me On Thu, Mar 22, 2012 at 6:16 PM, Michel Henrique Aquino Santos <michel....@gmail.com> wrote: > Hi, > an attacker can read the rules file and use any directory or file is not > monitored to carry out the attack. > > Em 22-03-2012 18:04, Castle, Shane escreveu: > > Just what is this vulnerability, specifically? > > > -- > Att, > > Michel Henrique Aquino Santos > Bacharelado em Ciência da Computação > Universidade Federal de Lavras - UFLA > Skype: michel_has > Gtalk: michel.has > michel....@gmail.com > > Linux User # 496756 > > http://resolvidoslinux.blogspot.com/