Carlos Alberto Lopez Perez <[email protected]> writes: > Attackers usually don't start trying to probe exploit after exploit.
Of course they do. That is, *by far*, the most common attacker strategy on the Internet. Just look at the logs of any Internet-facing service. -- Russ Allbery ([email protected]) <http://www.eyrie.org/~eagle/>

