>> On Wed, 5 Jan 2011 19:56:04 -0600, David Bronder <[email protected]> 
>> said:

> Allen S. Rout wrote:
>>
>> I'll echo "use the CAD".  It is straightforward.

> Too bad most TSM client security vulnerabilities have been in the CAD
> (notably, the remotely-exploitable ones)...

I concur.

- Allen S. Rout

Reply via email to