Exactly.  He found the exploit and wrote it in a couple hours...took over
the mac in about as much time as it takes to go to a web page.  Same way
most windows machines are taken over.

On Wed, Jul 22, 2009 at 7:01 PM, Rev. Stewart Marshall <
[email protected]> wrote:

> But is that not what most hackers do?
>
> They examine and look at the OS they want to hack and then through trial
> and error find the way to do it.
>
> Stewart
>
> At 07:23 PM 7/22/2009, you wrote:
>
>  He didn't hack a Mac in 30 seconds. He ran a prepared script. Big
>> difference.
>>
>
> Rev. Stewart A. Marshall
> mailto:[email protected]
> Prince of Peace www.princeofpeaceozark.org
> Ozark, AL  SL 82
>
>
>
> *************************************************************************
> **  List info, subscription management, list rules, archives, privacy  **
> **  policy, calmness, a member map, and more at http://www.cguys.org/  **
> *************************************************************************
>


*************************************************************************
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*************************************************************************

Reply via email to