On Mon, Dec 10, 2012 at 3:21 PM, James Lay wrote:
> On 2012-12-10 12:25, Hurgel Bumpf wrote:
> > Hi list,
> >
> >
> > i tried to contact google, but as they didn't answer my email, i do
> > forward this to FD.
> > This "security" feature is not cleary a google vulnerability, but
> > exposes webs
know how hard it is to solder that thing. Well, unless you've got
> really expensive equipment. And what do you do if you are out and it
> breaks? I'll stick with mine, thank you!!
>
> t
>
>
>
> On Aug 13, 2012, at 9:39 AM, Stefan Edwards wrote:
>
> That is
That is totally untrue. There is a partially-working and unmaintained
project on github that totally allows you to skip the plug, if you're
willing to just put in a bit of time to setup the entire suite of tools
necessary to run this one project.
On Mon, Aug 13, 2012 at 12:35 PM, Thor wrote:
> H
>From one of the earlier emails to the list:
"""Exploit Pack is an open source security framework developed by Juan
Sacco. It combines the benefits of a..."""
On Wed, Nov 30, 2011 at 10:58 PM, Gino wrote:
> Seems to have Juan Succo written all over it
>
> On 11/30/11 1:49 AM, Mario Vilas wrote: