Thus spake Mate Wierdl ([EMAIL PROTECTED]):
> Not really.  There are many examples to the contrary---quoted in the
> book.  For example, there were buffer overflows discovered in Kerberos
> which had been in the code for 10 years, or Mailman had glaring
> security flows no one noticed for three years.

Great.  So why are you lamenting here instead of doing such an audit or
finding someone who will?  You are at a University, for God's sake,
where if not there can you find people who would actually be willing to
use something like Z?

Don't talk.  Do.

Felix

Reply via email to