Interesting little blurb, raises some interesting perspectives on open vs.
closed source security.

http://news.com.com/2010-1071-980462.html

----------------------------------------------------------------------------
This communication is intended for the use of the recipient to which it is
addressed, and may contain confidential, personal, and or privileged
information. Please contact us immediately if you are not the intended
recipient of this communication, and do not copy, distribute, or take action
relying on it. Any communication received in error, or subsequent reply,
should be deleted or destroyed.

Reply via email to