Carlos Alberto Lopez Perez <[email protected]> writes:

> Attackers usually don't start trying to probe exploit after exploit.

Of course they do.  That is, *by far*, the most common attacker strategy
on the Internet.  Just look at the logs of any Internet-facing service.

-- 
Russ Allbery ([email protected])               <http://www.eyrie.org/~eagle/>

Reply via email to