If they use zero-day exploits then thats illegal.

Secondly, are they using zero-day exploits post on public mailing
lists or using their own home grown exploits that the bad guys and
potentially the vendor doesn't know about?

On Mon, Dec 1, 2008 at 10:44 PM, Aaron Gray <[EMAIL PROTECTED]> wrote:
> "proof", did you read the article ?
> They are after your bad guys and probably using zero day exploits !?
> On Mon, Dec 1, 2008 at 9:13 PM, n3td3v <[EMAIL PROTECTED]> wrote:
>>
>> http://news.bbc.co.uk/1/hi/technology/7758127.stm
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to