Isn't it still a hack depending on how the u/p were obtained? 

Could someone please explain the definition based difference between a breach 
and a hack?

Sent from my BlackBerry® wireless device

-----Original Message-----
From: Bill Hicks <[email protected]>
Sender: [email protected]
Date: Wed, 27 Oct 2010 10:13:33 
To: <[email protected]>
Subject: Re: [Full-disclosure] African ISP SekuritY

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to