Isn't it still a hack depending on how the u/p were obtained? Could someone please explain the definition based difference between a breach and a hack?
Sent from my BlackBerry® wireless device -----Original Message----- From: Bill Hicks <[email protected]> Sender: [email protected] Date: Wed, 27 Oct 2010 10:13:33 To: <[email protected]> Subject: Re: [Full-disclosure] African ISP SekuritY _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
