-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
i could not have said this better. why has this not been discussed? who knows. :: My only question to these so called iDefense advisories is. How the fuck do they qualifty as iDefense advisories when 'iDefense researchers' aren't finding these vulnerabilities? I would ask if iDefense researchers have any skill whatsoever or do they rely solely on the research they purchase from the shameless monkies selling their advisories, but I'm sure we all know the answer. ( no offense to the shameless monkies ) heh ;) So to make a security company and call employees security 'professionals' all we have to do is affford to buy other people's work and sell it to companies who are in need of security? hrm... What next blackmailing researchers? Paying smaller software companies to write vulnerable software and let you disclose the vulnerabilities ? :: -----BEGIN PGP SIGNATURE----- Version: Hush 2.2 (Java) Note: This signature can be verified at https://www.hushtools.com/verify wloEARECABoFAj2cazYTHG11dGV4QGh1c2htYWlsLmNvbQAKCRBLR9YdGwjQEK88AJwO pv4i42HdP6o+FMrhwBFeYXc4NACfRSVA5Cc29F59PpbOkKUiveHaDys= =5dpE -----END PGP SIGNATURE----- Get your free encrypted email at https://www.hushmail.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
