Hello,

Is there anybody who is common with the technique described in this article?

http://www.ebcvg.com/articles.php?id=207

It says something about using Google to target servers by searching paths to vulnerabilities.

Any thoughts on that?

Kind regards,

Aschwin Wesselius

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to